Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu.

Slides:



Advertisements
Similar presentations
Low-Complexity Transform and Quantization in H.264/AVC
Advertisements

MPC for Comparing Two Shared Secrets without Bit-Decomposition Takashi Nishide * Kazuo Ohta The University of Electro-Communications * Hitachi Software.
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
MATRICES. Matrices A matrix is a rectangular array of objects (usually numbers) arranged in m horizontal rows and n vertical columns. A matrix with m.
CSE 504 Discrete Mathematics & Foundations of Computer Science
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 Integer transform Wen - Chih Hong Graduate Institute of Communication Engineering National Taiwan University, Taipei,
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
EE5393, Circuits, Computation, and Biology Computing with Probabilities 1,1,0,0,0,0,1,0 1,1,0,1,0,1,1,1 1,1,0,0,1,0,1,0 a = 6/8 c = 3/8 b = 4/8.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
1 Closures of Relations: Transitive Closure and Partitions Sections 8.4 and 8.5.
Reversible watermarking Wu Dan Introduction What?
Slide Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley.
DIGITAL COMMUNICATIONS Linear Block Codes
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
An efficient Video Coding using Phase-matched Error from Phase Correlation Information Manoranjan Paul 1 and Golam Sorwar IEEE.
Chapter 2 … part1 Matrices Linear Algebra S 1. Ch2_2 2.1 Addition, Scalar Multiplication, and Multiplication of Matrices Definition A matrix is a rectangular.
Greatest Common Divisors & Least Common Multiples  Definition 4 Let a and b be integers, not both zero. The largest integer d such that d|a and d|b is.
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 How to Multiply Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. integers, matrices, and polynomials.
INFORMATION THEORY Pui-chor Wong.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
Low-Complexity Lossless Compression of Hyperspectral Imagery via Linear Prediction Presented by: Robert Lipscomb and Hemalatha Sampath.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Array Multiplier Haibin Wang Qiong Wu. Outlines Background & Motivation Principles Implementation & Simulation Advantages & Disadvantages Conclusions.
EE5393, Circuits, Computation, and Biology Computing with Probabilities 1,1,0,0,0,0,1,0 1,1,0,1,0,1,1,1 1,1,0,0,1,0,1,0 a = 6/8 c = 3/8 b = 4/8.
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
A New Image Compression Scheme Based on Locally Adaptive Coding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing 109 (2015) 317–333
A Digital Watermarking Scheme Based on Singular Value Decomposition
Hiding Data in a Color Palette Image with Hybrid Strategies
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
A Secret Enriched Visual Cryptography
第 九 章 影像邊緣偵測 9-.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Department of Computer Science, University of Central Florida ,Orlando
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu

Definition 1. Image matrix exclusive-OR operation Case 1: Binary image matrix A ⊕ B=[a i,j,b i,j ], where i,j=0,1,…p-1 and ⊕ is bit-wise exclusive-OR operation ⊕ AB A⊕BA⊕B Case 2: For 256-gray-level image, each pixel is represented with eight bits. 256-gray-level image matrix A ⊕ B=[a i,j,k b i,j,k ], where i,j=0,1…..,p-1, k=0,1,….,7. AB ⊕ A⊕BA⊕B 236 a 1.1 =136= b 1.1 =100= a 1.1 ⊕ b 1.1 =236=

Case 3: For 24-bit color image,assume the additive model is adoptedfor example. Each color pixel is represented with three primary colors, red(R), green(G), and blue(B),in which each is represented with eight bits.24-bit color image matrix A ⊕ B=[a i,j,kr,kg,kb ⊕ b i,j,kr,kg,kb ], where i,j=0,1,…,p-1, kr=0,1,…,7, kg=0,1,….,7, kb=0,1,…,7. AB (56,100,73)(110,54,196) ⊕ A⊕BA⊕B (86,82,141) a 1,1 = , , b 1,1 = , , a 1,1 ⊕ b 1,1 = , , Thus, it satisfies (1)A ⊕ B=B ⊕ A; (2)A ⊕ A=0; (3)A ⊕ C is random ; and (4)A ⊕ C=D implies C ⊕ D=A.

Definition 2. Image matrix chain exclusive-OR operation A i, i=1,….,k, are image matrices with the same dimension p×p. The exclusive-OR operation to all A i is defined as A i = A 1 ⊕ A 2 ⊕ A 3 …, A k. The encoding process involves two steps: Step 1: Generate n-1 random matrices B 1, B 2, ….., and B n-1. Note that if a well-defined random number generator, such as a ‘‘linear feedback shift register’’, the generated random matrices B 1, B 2, ….., and B n-1 will be distinct Step 2: Compute the share images S i (i=1,…..,n) by the following operations : G is secret the image

Example S 1 =77 : B 1 =89 : S 2 =20 : G 假設 n=4 S1S1 B1B1 100 B2B2 B3B ⊕⊕ ⊕ 77 B 2 =89 : B 3 =200 : S 3 =133 : B 3 = 200 : G=100 : S 4 =184 : S2S2 20 S3S3 133 S4S4 184 心得報告

Example S 1 =77 : B 1 =89 : S 2 =20 : G 假設 n=4 S1S1 B1B1 100 B2B2 B3B ⊕⊕ ⊕ 77 B 2 =89 : B 3 =200 : S 3 =133 : B 3 = 200 : G=100 : S 4 =184 : S2S2 20 S3S3 133 S4S4 184 B1 ⊕ B2 B2 ⊕ B3B3 ⊕ G B1

Definition 2. Image matrix chain exclusive-OR operation In the decoding phase, n share images are used to reveal the secret image by exclusive-OR operation as follows: S1S1 S2S2 S3S3 S4S ⊕⊕ ⊕ G 100 S 1 =77 : S 2 =20 : B 2 =89 : S 3 =133 : B 3 =200 : S 4 =184 : G=100 : B1 ⊕ B2 B2 ⊕ B3B3 ⊕ G B1

The proposed secret sharing scheme for multiple secret images n secret images G i, i=0,1,….. n-1, are encoded into n+1 share images S m, m=0,1,2,…..n. The encoding phase consists of three steps: Step 1:Generate a random integer matrix as the first share image S 0 with the same size of secret images.The random values in S 0 are in the range between 0 and 255. Step 2:Generaten1 random matrices B i by the following operations: Step 3: Compute the other share images S i by the following operations:

G2G2 G1G1 G0G0 S0S B 1 =G 1 ⊕ S 0 G 1 :85= S 0 :125= B 1 :40= B 2 =G 2 ⊕ S 0 G 2 :110= S 0 :125= B 2: 19= B1B1 40 B2B2 19 ⊕⊕ Example n=3

G2G2 G1G1 G0G0 S0S B 1 =G 1 ⊕ S 0 G 1 :85= S 0 :125= B 1 :40= B 2 =G 2 ⊕ S 0 G 2 :110= S 0 :125= B 2: 19= B1B1 40 B2B2 19 ⊕⊕ Example n=3 G2⊕S0G2⊕S0 G1 ⊕S0G1 ⊕S0

Example n=3 S 3 =G 0 ⊕ B 2 G 0 :132= B 2 :19= S 3 :151= S 2 =B 1 ⊕ B 2 B 1 :40= B 2 :19= S 2 :59= S0S0 125 S1S1 40 S2S2 59 S3S3 151 B2B2 B1B G0G0 132 ⊕ ⊕

Example n=3 S 3 =G 0 ⊕ B 2 G 0 :132= B 2 :19= S 3 :151= S 2 =B 1 ⊕ B 2 B 1 :40= B 2 :19= S 2 :59= S0S0 125 S1S1 40 S2S2 59 S3S3 151 B2B2 B1B G0G0 132 ⊕ ⊕ G1 ⊕S0G1 ⊕S0 G2⊕S0G2⊕S0 B1⊕B2B1⊕B2 G0⊕B2G0⊕B2 B1B1

The proposed decoding scheme for multiple secret images The decoding phase consists of three steps: Step 1: All n+1 share images collected together are used to reconstruct the first secret image as follows Step 2: Generaten1 random matrices Bi, which are obtained as follows: Step 3: Reconstruct the other(n-1) secret images Gk by the following operations:

Example S1S1 S3S3 40 S2S ⊕ ⊕ G0G0 132 S 1 :40= S 2 :59= B 2 :19= S 3 :151= G 0 :132= B1B1 40 S1S1 B2B2 19 B1B1 40 S2S2 59 ⊕ S 2 :59= B 1 :40= B 2 :19= B1⊕B2B1⊕B2 G0⊕B2G0⊕B2 B1B1 B1⊕B2B1⊕B2

Example S0S0 125 B1B1 40 B2B2 19 G2G2 110 G1G1 85 ⊕ ⊕ G0G0 132 S 1 :40= S 0 :125= G 1 :85= B 2 :19= S 0 :125= G 2 :110= G1 ⊕S0G1 ⊕S0 G2⊕S0G2⊕S0

Theorem Assume that n (n>1) distinct secret images Gk with high entropy, k=0,1,…, n-1, are encoded into n+1 share images Sm, m=0,1,2,…., n. The secret images can be reconstructed correctly by the following formula: S1S1 S3S3 S2S2 S0S G0G0 132 G2G2 110 G1G1 85 ⊕ ⊕ ⊕ S 1 :40= S 2 :59= B 2 :19= S 3 :151= G 0 :132= S 1 :40= S 0 :125= G 1 :85=

Theorem Assume that n (n>1) distinct secret images Gk with high entropy, k=0,1,…, n-1, are encoded into n+1 share images Sm, m=0,1,2,…., n. The secret images can be reconstructed correctly by the following formula: S1S1 S3S3 S2S2 S0S G0G0 132 G2G2 110 G1G1 85 ⊕ ⊕ ⊕ S 1 =G 1 ⊕ S 0 S 2 =G 1 ⊕ S 0 ⊕ G 2 ⊕ S 0 S 3 =G 2 ⊕ S 0 ⊕ G 0 G 0 =G 1 ⊕ S 0 ⊕ G 1 ⊕ S 0 ⊕ G 2 ⊕ S 0 ⊕ G 2 ⊕ S 0 ⊕ G 0 G 1 =S0 ⊕ G 1 ⊕ S 0 G 2 =S0 ⊕ G 1 ⊕ S 0 ⊕ G 1 ⊕ S 0 ⊕ G 2 ⊕ S 0

Functionality comparison between the related image sharing and the proposed scheme

Comparison between the related image hiding and the proposed scheme.

Computational complexity comparison between the related works and the proposed scheme in the decoding phase

Conclusions Compared with tradition VSS-based image sharing schemes, the proposed scheme benefits valuable merits including lossless secret reconstruction, no pixel expansion, generalization of image format, no not-easy- to-align problem, and no codebook required. Compared with the schemes combining VSS and image hiding technique, the proposed scheme has the two main advantages: high sharing capacity and computational efficiency of multi-secret sharing.

⊕ ⊕ = = B1B1 B2B2 S 0 is random martix

B1B1 B2B2 ⊕ ⊕

⊕⊕ ⊕ ⊕⊕