Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)

Slides:



Advertisements
Similar presentations
Image Display MATLAB functions for displaying image Bit Planes
Advertisements

A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Digital Image Processing
Data Structures For Image Analysis
Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)
3. Introduction to Digital Image Analysis
Ensemble Tracking Shai Avidan IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE February 2007.
Texture Classification Using QMF Bank-Based Sub-band Decomposition A. Kundu J.L. Chen Carole BakhosEvan Kastner Dave AbramsTommy Keane Rochester Institute.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
1 Introduction What IS computer vision? Where do images come from? the analysis of digital images by a computer.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Computer Vision Lecture 3: Digital Images
My Research Experience Cheng Qian. Outline 3D Reconstruction Based on Range Images Color Engineering Thermal Image Restoration.
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
BACKGROUND LEARNING AND LETTER DETECTION USING TEXTURE WITH PRINCIPAL COMPONENT ANALYSIS (PCA) CIS 601 PROJECT SUMIT BASU FALL 2004.
Random Encryption Program Patrick Lowe EKU - Department of Technology CEN.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Local Non-Negative Matrix Factorization as a Visual Representation Tao Feng, Stan Z. Li, Heung-Yeung Shum, HongJiang Zhang 2002 IEEE Presenter : 張庭豪.
September 5, 2013Computer Vision Lecture 2: Digital Images 1 Computer Vision A simple two-stage model of computer vision: Image processing Scene analysis.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Digital Image Processing, 2nd ed. © 2002 R. C. Gonzalez & R. E. Woods Image Processing Example.
Digital Image Processing, 2nd ed. © 2002 R. C. Gonzalez & R. E. Woods Chapter 1: Introduction -Produced by Bartlane cable picture.
Lecture 7: Intro to Computer Graphics. Remember…… DIGITAL - Digital means discrete. DIGITAL - Digital means discrete. Digital representation is comprised.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Image Compression Based On BTC-DPCM And It ’ s Data-Driven Parallel Implementation Author : Xiaoyan Yu 、 Iwata, M. Source : Image Processing, ICIP.
1-1 Chapter 1: Introduction 1.1. Images An image is worth thousands of words.
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Dr. Norman Swindells Ferroday Ltd Birkenhead, U.K. Conservation of digital data.
Introduction to Visual Cryptography
Visual Cryptography for Gray-Level Images by Dithering Techniques
Introduction Performance of metric learning is heavily dependent on features extracted Sensitive to Performance of Filters used Need to be robust to changes.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
An Introduction to Digital Image Processing Dr.Amnach Khawne Department of Computer Engineering, KMITL.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Image Processing.
physics-chemistry-interactive-flash-animation
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
DONE BY S.MURALIRAJAN M.NIRMAL
The Recent Developments in Visual Cryptography
Rob Fergus Computer Vision
Chair Professor Chin-Chen Chang Feng Chia University
Introduction What IS computer vision?
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Electronic Door Unlock with Face Recognition
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
Ceng466 Fundamentals of Image Processing
Magnetic Resonance Imaging
Data hiding method using image interpolation
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Number Systems Today, I’ll be giving an introduction to:
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005) 767 – 772

2 Contents 1. Introduction 2. Visual Cryptography 3. The proposed scheme 4. Experiment results 5. Conclusions

3 Introduction Secret image sharing (Tsai)

4 Introduction Classification of SIS (Tsai) SIS visual Cryptography (1994) variant visual secret sharing (2000) interpolation method (2002)

5 Introduction Visual cryptography is a secret sharing procedure for image data Recover the secret by the human visual system Without additional computations and any knowledge of cryptography.

6 Introduction Unfortunately, visual sharing schemes cannot restore to its original quality when the original input is a natural image. The proposed scheme operates directly on the bit planes of the digital image

7 2-out-of-3 Visual Cryptography SASA SBSB SCSC

8 2-out-of-2 Visual Cryptography B

9 More reasons for the proposed scheme cannot provide perfect reconstruction intensity or spatial resolution is not appropriate for real-time applications.

10 The proposed scheme

11 Example: The (2,2) proposed scheme for 4-bit image 12=1011=1* * * =0101=0* * *

12 Experiment results

13 Conclusions Preserve all the features of traditional k-out-n sharing schemes Allow for perfect reconstruction of the input B- bit image Encrypts binary, gray-scale and color images Can be effectively implemented either in software or hardware