Hefei Electronic Engineering Institute, Hefei , China

Slides:



Advertisements
Similar presentations
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
A Memory-efficient Huffman Decoding Algorithm
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A general (k, n) scalable secret image sharing scheme with the smooth scalability Ching-Nung Yang, Yu-Ying Chu The Journal of Systems and Software 84 (2011)
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
LOP_RE: Range Encoding for Low Power Packet Classification Author: Xin He, Jorgen Peddersen and Sri Parameswaran Conference : IEEE 34th Conference on Local.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Lightweight Mutual Authentication for IoT and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
Efficient Time-Bound Hierarchical Key Assignment Scheme
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source : Signal Processing, Volume 133, April 2017, Pages
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
Physics-based simulation for visual computing applications
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source: Signal Processing 109 (2015) 317–333
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hiding Data in a Color Palette Image with Hybrid Strategies
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Controllable and Trustworthy Blockchain-based Cloud Data Management
Dynamic embedding strategy of VQ-based information hiding approach
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Sharing Technologies for Cloud Computing
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source: Pattern Recognition Letters 29 (2008)
Title Introduction: Discussion & Conclusion: Methods & Results:
Color image noise removal algorithm utilizing hybrid vector filtering
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Rich QR Codes With Three-Layer Information Using Hamming Code
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions Hefei Electronic Engineering Institute, Hefei 230037, China Source: Journal of Real-Time Image Processing (2017): 1-16. Authors: Wan Song, Lu Yuliang, Yan Xuehu, Wang Yongjie, Chang Chao Speaker: Huang Peng-Cheng Date: 1/15/2019

Outline Introduction Related works Proposed scheme Simulation results Extensions Conclusions Comments

Introduction(1/1) --visual cryptography scheme(VCS)

Related works(1/2) –Wang et al.’s scheme Wang, G., Liu, F., Yan, W.Q.: 2D barcodes for visual cryptography. Multimed. Tools Appl. 75, 1–19 (2016)

Related works(2/2) Chow, et al.’s scheme Chow, Y.W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Springer International Publishing, New York (2016)

Proposed scheme (1/4) -- encoding process(1/1) Encoding procedure {QR1,…,QRn} {SC1,…,SCn}

Proposed scheme (2/4) --decoding process(1/1)

Proposed scheme(3/4) -- The algorithm (1/2) (7, 7)

Proposed scheme(4/4) -- An example for encoding process (2, 2) VSSQR 1 QR1 1 A1 A2 A3 A4 QR2 QR1 QR2 before after

Simulation results (1/5) (2, 2) VSSQR

Simulation results (2/5) (2, 3) VSSQR

Simulation results (3/5) (2, 3) VSSQR

Simulation results (4/5) (3, 3) VSSQR

Simulation results (5/5) Visual quality of the revealed secret images Contrast:

Extensions

Conclusions Meaningful shares => the decodable of QR code. Two ways of secret revealing: Stacking => OR operation => do not need any computational device. XOR operation => lightweight device.

Comments (k, n) or (n, n)? (2, 100)?