VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
Fifth International Conference on Information
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Systems of Equations as Matrices and Hill Cipher.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
A copyright protection scheme for digital images using visual cryptography technique Der-Chyuan Lou, Hao-Kuan Tso and Jiang-Lung Liu The Computer Standards.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Introduction to Visual Cryptography
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Visual Cryptography for Gray-Level Images by Dithering Techniques
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
The Advanced Encryption Standard Part 2: Mathematical Background
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
A Secret Information Hiding Scheme Based on Switching Tree Coding
A class of binary images thinning using two PCNNs
The Recent Developments in Visual Cryptography
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
Source: Mobile Information Systems, vol. 2017, 2017.
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Image Coding and Compression
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
Sharing Technologies for Cloud Computing
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Secret Image Sharing Based on Encrypted Pixels
Information Protection and Recovery with Reversible Data Hiding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng Lin, Ja-Chen Lin Pattern Recognition Society, 2007 指導老師:李南逸 Speaker : Tzu-Chen Huang 1

Outline Introduction Visual cryptography PSS Encoding Decoding Conclusion 2

Introduction If the decoding computer is temporarily not available, we can stack to get a vague black- and-white view of the secret image. The computer is finally available, we can get a much finer gray-valued view of the secret image using the information hidden earlier in the shadows. 3

Visual cryptography Input: An integer threshold t, and an integer n (t ≦ n). Output: A pair of basis matrices [B0] and [B1] 4

Visual cryptography 5

PSS To share an image by Thien and Lin’s sharing scheme 6

SSecret image HHalftone binary version of the image S Compressed version of S Shadows Transparency LTable L which has entries. wWhite elements bBlack elements tGet the shared secret in n transparencies KA security key nProduced n transparencies 7

Encoding The flowchart to summarize the idea of encoding 1 8

Encoding Input :S,L,K Output:  Step 1. Compressed S obtain a  Step 2. Use K to encrypt  Step 3. create 9

Encoding Step 4. S transformed the halftone version (H). Step 5. H is created to Step 6. Partition the S to n regions (S/n block) Step 7. 10

Decoding The flowchart of the decoding algorithm. 11

Decoding of stacking Input : Any t of the n transparencies, L Output : H  Step 1. Stack all t collected transparencies to get an enlarged H.  Step 2. By counting black/white elements of each block, we get H. 12

Decoding of extraction Input : Any t of the n transparencies, L,K Output :  Step 1. Extract the hidden in region I of the i) Use L inspecting the |S|/n blocks in region i of  Step 2. Get of the n shadows i) is a digit string of |S|/n, and each digit is in ii) each digit string from base  Step 3. Recover (encrypted) from the t shadows { } i) Using the inverse processing of the PSS ii) Recover the t coefficients { }  Step 4. Decrypt by K  Step 5. Get the gray-value secret image 13

Conclusion Proposed a new method which combines two major branches of image sharing. In the decoding issue, this new method is more flexible than applying VC or PSS. 14

2007/8/29 meeting 再找看看有沒有更新的 Paper 來看 (2007 年 ) 。 15