1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (

Slides:



Advertisements
Similar presentations
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids Xiaotian Wu, Lu Dai, Duanhao Ou, Wei Sun 報告者: 李宏恩.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Introduction to Visual Cryptography
Visual Cryptography for Gray-Level Images by Dithering Techniques
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Halftone Visual Cryptography
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
The Recent Developments in Visual Cryptography
Embedding Secret Messages in Texts
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganography in halftone images: conjugate error diffusion
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
Secret image sharing with steganography and authentication
Information Hiding Techniques Using Magic Matrix
Improvements of Image Sharing with Steganography and Authentication
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University ( 逢甲大學 )

2 Outlines Concept of Secret Sharing Concept of visual cryptography Visual cryptography for binary images Visual cryptography for grayscale images Meaningful visual cryptography for grayscale images Meaningful and progressive visual cryptography Visual cryptography for color images Authenticatable VSS Scheme

3 shadows secret message Traditional (t, n)-secret sharing (Shamir ’ s Method 1979) secret retrieval (2, 3)- secret sharing AliceKenBob Shamir, A. (1979): How to Share a Secret, CACM, Vol. 22, Nov. 1979, pp

4 Ex: (2, 3)-threshold Scheme (The secret k=7) 3 shadows: (1, 9), (2, 0), (3, 2) x y (1, 9) (2, 0) (3, 2) How to Share a Secret (t, n)-threshold Scheme

5 Ex: (3, 5)-threshold Scheme (t=3, n=5, k=13, p=17) Alice KenBobJesseEva ID 1 =1ID 2 =2ID 3 =3ID 4 =4ID 5 =5 (1, 8)(3, 10)(5, 11) Lagrange Interpolation k How to Share a Secret (t, n)-threshold Scheme

6 Concept of Visual Cryptography Cryptography Traditional Cryptography Symmetric: DES, AES Asymmetric: RSA The encryption and decryption processes need high computation costs Need secret key for decoding Visual Cryptography low computation Fast decoding Without the secret key

7 Hidden in The Basis Image: Mickey The Counterfeit Image: Minnie The Secret Image: Airplane

8 The Basis Image: Mickey The Counterfeit Image: Minnie The Expanded Basis Image: Mickey-3X3 The Expanded Counterfeit Image: Minnie-3X3

9 Airplane Mickey-3X3Minnie-3X3

10 Naor and Shamir (1994) proposed a (k, k) – VSS scheme Extend a secret pixel into a block of 2  2 sub-pixels Contain two white pixels and two black pixels for each block White pixel: transparent Black pixel: black Visual Cryptography for Binary Image

11 Secret pixel stacked result Secret image Share 1 Share 2

12

13 Transfer the grayscale image to the halftone image Utilize the density of black dots to simulate the content of grayscale image White area: low density of black dots Black area: high density of black dots Visual Cryptography for Grayscale Image

14 Share 1Share 2

15 shadow 1shadow 2 camouflage cover image stego image1stego image2 secret image Meaningful Visual Cryptography for Grayscale Image

cover image shadow1 140 transparent stego image shadow2 stego image shadow1 shadow2

stego image1 stego image2 stacked result

18 Experimental Results shadow1 cover image1stego image1 shadow2 cover image2stego image2

19 stego image1 stego image2 stacked result

20 shadow1 cover image1stego image1 shadow2 cover image2stego image2

21 stego image1 stego image2 stacked result

22 Meaningful and Progressive Visual Cryptography Meaningful shares: friendly content Progressive visual cryptography Improve the stacked result progressively

23 Progressive Visual Cryptography (t, 6) (2, 6)(3, 6)(4, 6)(5, 6)(6, 6)

24 Meaningful shares: friendly content Progressive & Meaningful Visual Cryptography shadow 1shadow n camouflage cover image stego image1stego image n … … secret image

25 secret image cover image secret imagecover imageshadow image extended secret image shadow image 1shadow image 2shadow image 3shadow image 4

26 secret image cover image t =2t = 3

27 (2, 6)(3, 6)(4, 6)(5, 6)(6, 6) Experimental Results

28 RGB: TV ’ s and Monitors CMY: Color Printing Press Visual Cryptography for Color Image

29

30

31 shadow image 1shadow image 2stacked image 2 Experimental Results

32 Participant 1 Participant 2 Share 1 Share 2 Stack Recovered secret image Hacker Authentication Original secret image

33 Share 1 Share 2 Correct stacking result Share 1 Share 2 Correct stacking result Legal extra confidential image Legal revealed secret image Authentication

34 Tampered share 1 Share 2 Tampered share 1 Share 2 Tampered secret image Nothing Tampered revealed secret image Authentication

35 Grayscale image LenaGrayscale image BaboonBinary main secret Halftone image of LenaHalftone image of BaboonBinary extra confidential image Authenticatable VSS Scheme for Binary Secret

36 Share image AShare image B Stacking resultRevealed extra confidential image Authenticatable VSS Scheme for Binary Secret

37 Color image Lena Color image Baboon Color main secret Color halftone image of Lena Color halftone image of Baboon Color halftone extra confidential image Authenticatable VSS Scheme for Color Secret

38 Share image AShare image B Stacking resultRevealed extra confidential image Authenticatable VSS Scheme for Color Secret

39 Visual cryptography (Cont.) Share 1 Share 2 Secret 1 “ VISUAL ” Secret 2 “ SECRET ” Stacking Rotating 40 o

40 Steganography (Cont.) Text 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

41 Conclusions An alternative for hiding visual secret Less secret Low computation cost

42