Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)

Slides:



Advertisements
Similar presentations
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Advertisements

Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
9/21/12. I can identify which factors are prime numbers. LEARNING TARGET.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Secret Sharing Algorithms
Applications of agent technology in communications: a review S. S. Manvi &P. Venkataram Presented by Du-Shiau Tsai Computer Communications, Volume 27,
Introduction to WEKA Aaron 2/13/2009. Contents Introduction to weka Download and install weka Basic use of weka Weka API Survey.
Wednesday, October 3 Variability. nominal ordinal interval.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Cultural Visual Literacy Images Americans Should Recognize.
Introduction To Time Management Siddharth Misra Background  Distributed Simulation which is nothing but simulation on LAN became a popular tool for.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
computer
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
A copyright protection scheme for digital images using visual cryptography technique Der-Chyuan Lou, Hao-Kuan Tso and Jiang-Lung Liu The Computer Standards.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Visual Cryptography for Gray-Level Images by Dithering Techniques
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Flight Simulator Overview Flight Compartment Host Computer Motion Control Cabinet Motion Platform 13/6/2016 Visual Display Visual Image Generator Interface.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Two-Image Encryption by Random Grids 1 Joy Jo-Yi Chang, Ming-Jheng Li, Yi-Chun Wang and Justie Su-Tzu Juan National Chi Nan University.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Monday, September 27 More basics.. _ “Life is a series of samples, you can infer the truth from the samples but you never see the truth.”
Image from
Introduction Intro Problem Materials Hypothesis Procedure Results
Palette Partition Based Data Hiding for Color Images
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Introduction to Modern Cryptography
Source: Mobile Information Systems, vol. 2017, 2017.
Physics-based simulation for visual computing applications
مناهــــج البحث العلمي
Chapter 1: Introduction
نجاح وفشل المنشآت الصغيرة
The Recent Developments in Visual Secret Sharing
Hefei Electronic Engineering Institute, Hefei , China
Суури мэдлэг Basic Knowledge
1 C PIPE"' · I - I. 0I0I .. ) sasa /.
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
Steganography in halftone images: conjugate error diffusion
Data hiding method using image interpolation
Success Bellwork: Think about it….
Partial reversible data hiding scheme using (7, 4) hamming code
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Secret image sharing with steganography and authentication
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Find the limit {image} ,024 2,160 -1,
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Secret Image Sharing Presented by Du-Shiau Tsai

2 Introduction Secret image sharing (Tsai)

3 Introduction Classification of SIS (Tsai) Secret image sharing visual cryptography variant visual secret sharing interpolation method

4 Introduction Classification of SIS (Tsai) Secret image sharing visual cryptography variant visual secret sharing interpolation method

5 Introduction Visual cryptography is a secret sharing procedure for image data Recover the secret by the human visual system Without additional computations and any knowledge of cryptography.

6 2-out-of-3 Visual Cryptography SASA SBSB SCSC

7 2-out-of-2 Visual Cryptography B

8 Introduction Classification of SIS (Tsai) Secret image sharing visual cryptography variant visual secret sharing interpolation method

9 n-out-of-n VVSS-based scheme