verifiable visual cryptography
DESCRIPTION
Verifiable visual cryptography. Shuo -Fang Hsu, Yu- Jie Chang, Ran- Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing. (a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image. - PowerPoint PPT PresentationTRANSCRIPT
Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang
2012 sixth international conference on genetic and evolutionary computing
*Verifiable visual cryptography
(a) Secret image. (b) Tag image 1. (c) Tag image 2.
Share 1. Share 2. Recovered secret image.
Recovered tag image 1. Recovered tag image 2.
Folding up share 1. Folding up share 2.
(a) Secret image. (b) Verification image.
Share 1. Share 2. Recovered secret image.
Recovered verification image.
Stack them by share1 right-half to share2 left-half, and share1 left-half to share2 right-half.
w[0] V
b[1]
If Verification image pixel = “b”, but corresponding pixels both are “w”.Random choose one pixel to set black.
w[0]Share1 Share2
b[1]
w[0]Share1 Share2
If Verification image pixel = “w”, but one of corresponding pixel are “w”.Have ¼ probability to set “w” to “b”.
w[0] V
w[0] b
[1]Share1 Share2
b[1]
b[1]Share1 Share2
T corresponding pixel on share
Whether the pixel need to change or
not
stack result
b w w b w b
w b b
w b w b b
b w b w b
b b b b b
w w w w w w
w b b
b w b
w b w b b
b b b
b w b w b
b b b
b b b b b