verifiable visual cryptography

7
Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing * Verifiable visual cryptography

Upload: kirby-fletcher

Post on 31-Dec-2015

32 views

Category:

Documents


0 download

DESCRIPTION

Verifiable visual cryptography. Shuo -Fang Hsu, Yu- Jie Chang, Ran- Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing. (a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Verifiable  visual cryptography

Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang

2012 sixth international conference on genetic and evolutionary computing

*Verifiable visual cryptography

Page 2: Verifiable  visual cryptography

(a) Secret image. (b) Tag image 1. (c) Tag image 2.

Share 1. Share 2. Recovered secret image.

Recovered tag image 1. Recovered tag image 2.

Folding up share 1. Folding up share 2.

Page 3: Verifiable  visual cryptography

(a) Secret image. (b) Verification image.

Share 1. Share 2. Recovered secret image.

Recovered verification image.

Stack them by share1 right-half to share2 left-half, and share1 left-half to share2 right-half.

Page 4: Verifiable  visual cryptography

w[0] V

b[1]

If Verification image pixel = “b”, but corresponding pixels both are “w”.Random choose one pixel to set black.

w[0]Share1 Share2

b[1]

w[0]Share1 Share2

Page 5: Verifiable  visual cryptography

If Verification image pixel = “w”, but one of corresponding pixel are “w”.Have ¼ probability to set “w” to “b”.

w[0] V

w[0] b

[1]Share1 Share2

b[1]

b[1]Share1 Share2

Page 6: Verifiable  visual cryptography

T corresponding pixel on share

Whether the pixel need to change or

not

stack result

b w w b w b

w b b

w b w b b

b w b w b

b b b b b

w w w w w w

w b b

b w b

w b w b b

b b b

b w b w b

b b b

b b b b b

Page 7: Verifiable  visual cryptography