bit-level based secret sharing for image encryption

13
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau T tern Recognition 38 (2005) 767 – 772

Upload: dieter-reese

Post on 01-Jan-2016

20 views

Category:

Documents


0 download

DESCRIPTION

Bit-level based secret sharing for image encryption. Rastislav Lukac, Konstantinos N. Plataniotis. Pattern Recognition 38 (2005) 767 – 772. Presented by Du-Shiau Tsai. Contents. 1. Introduction 2. Visual Cryptography 3. The proposed scheme 4. Experiment results 5. Conclusions. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Bit-level based secret sharing for image encryption

Bit-level based secret sharing for image encryption

Rastislav Lukac, Konstantinos N. Plataniotis

Presented by Du-Shiau Tsai

Pattern Recognition 38 (2005) 767 – 772

Page 2: Bit-level based secret sharing for image encryption

2

ContentsContents

1. Introduction 2. Visual Cryptography3. The proposed scheme4. Experiment results5. Conclusions

Page 3: Bit-level based secret sharing for image encryption

3

IntroductionIntroduction

Secret image sharing (Tsai)

Page 4: Bit-level based secret sharing for image encryption

4

IntroductionIntroduction

Classification of SIS (Tsai)

SIS

visual Cryptography(1994)

variant visual secret sharing(2000)

interpolation method (2002)

Page 5: Bit-level based secret sharing for image encryption

5

IntroductionIntroduction

Visual cryptography is a secret sharing procedure for image data

Recover the secret by the human visual systemWithout additional computations and any knowledge of cryptography .

Page 6: Bit-level based secret sharing for image encryption

6

IntroductionIntroductionUnfortunately, visual sharing schemes cannot restore to its original quality when the original input is a natural image.

The proposed scheme operates directly on the bit planes of the digital image

Page 7: Bit-level based secret sharing for image encryption

7

2-out-of-3 Visual Cryptography

SA

SB

SC

Page 8: Bit-level based secret sharing for image encryption

8

2-out-of-2 Visual CryptographyB

Page 9: Bit-level based secret sharing for image encryption

9

2-out-of-2 Visual Cryptography

More reasons for the proposed schemecannot provide perfect reconstruction

intensity or spatial resolution

is not appropriate for real-time applications.

Page 10: Bit-level based secret sharing for image encryption

10

The proposed schemeThe proposed scheme

Page 11: Bit-level based secret sharing for image encryption

11

Example: The (2,2) proposed scheme for 4-bit imageExample: The (2,2) proposed scheme for 4-bit image

12=1011=1*23 + 0*22 + 1*21 + 15=0101=0*23 + 1*22 + 0*21 + 1

Page 12: Bit-level based secret sharing for image encryption

12

Experiment resultsExperiment results

Page 13: Bit-level based secret sharing for image encryption

13

ConclusionsConclusions

Preserve all the features of traditional k-out-n sharing schemesAllow for perfect reconstruction of the input B-bit imageEncrypts binary, gray-scale and color imagesCan be effectively implemented either in software or hardware