Document

advertisement
Multiple-Image Encryption
by Rotating Random Grids
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei
Source: Proceedings of The 8th International Conference on
Intelligent System Design and Applications (ISDA 2008)
學生:張若怡 P78011044
許伯誠 P76011242
Date: 2013/01/18
Outline
 Introduction
 Motivation
 Related Work
 Research Methods
• Encryption phase
• Decryption phase
 Research Results
 Conclusion
2
Introduction – Visual Cryptography
 Traditional Cryptography
- Encryption and Decryption by computer
 Visual Cryptography (VC), also called Visual Secret
Sharing (VSS)
- Encrypted by computer, Decrypted by human vision
3
Introduction
Traditional VC and Random Grid
• VSS
Traditional VC-based VSS (Codebook)
RG-based VSS (Random Grid)
• Traditional VC-based VSS has at least two
drawbacks as follows :
1. Codebook design
2. Pixel expansion
4
Introduction
Pixel expansion
Traditional VC-based VSS:
Share1
Secret image
Share2
Share1 + Share2
5
Introduction
Traditional VC and Random Grid
• VSS
Traditional VC-based VSS (Codebook)
RG-based VSS (Random Grid)
• Traditional VC-based VSS has at least two
drawbacks as follows :
1. Codebook design
2. Pixel expansion
6
Motivation
SA
G1
G2
SA
SB
SA’
SA’
G1
G2
SB’
7
Related Work
In 1987, Kafri and Keren propose three different algorithms to encrypt a binary secret image.
Random Grid Algorithm1:
for(i=0 ; i<w ; i++)
for(j=0 ; j<h ; j++)
if(B[i][j] == 0) G2[i][j] = G1[i][j];
else G2[i][j] = G1[i][j];
Output(G1 , G2);
SA
b
g1
g2
g1⊕g2
0
0
1
0
1
0
1
1
0
1
1
1
0
1
G1
G2
O. Kafri, and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, 1987, pp. 377-379.
8
Research Methods
9
Research Methods
Encryption phase:
Step 1: SA(i, j) ← f RSP(SA).
 Randomly select a pixel SA(i, j) from the first secret image SA, where the ith row and the j-th column of the matrix SA are in the range of [0,m-1].
Step 2: G1(i, j)||G2(i, j) ← f RG(SA(i, j))
10
Research Methods
11
Research Methods
12
Research Methods
Step 8: G1((m-1)-j, i) ← random(0,1)
13
Research Methods
Decryption phase
14
Research Results
 Simulation 1: binary secrets, 90-degree rotation
• Two secret images SA and SB with the size of 512×512
15
Research Results
 Simulation 2: Halftone secrets, 90-degree rotation
• Two gray-level secret images SA and SB with the size of
512×512
16
Research Results
Simulation 3: binary secrets, 180-degree rotation
Simulation 4: binary secrets, 270-degree rotation
17
Conclusion
Property 1: No extra codebook redesigned
Property 2: No extra pixel expansion introduced
Property 3: Multiple secrets encoded
Property 4: Bandwidth and storage saving
Property 5: Wide image format
18
Download