multiple-image encryption by rotating random grids
DESCRIPTION
Multiple-Image Encryption by Rotating Random Grids. Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008) 學生:張若怡 P78011044 許伯誠 P76011242 Date: 2013/01/18. Outline. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/1.jpg)
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008)
學生:張若怡 P78011044 許伯誠 P76011242
Date: 2013/01/18
Multiple-Image Encryption by Rotating Random Grids
![Page 2: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/2.jpg)
Outline
Introduction Motivation Related Work Research Methods
• Encryption phase
• Decryption phase Research Results Conclusion
2
![Page 3: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/3.jpg)
Introduction – Visual Cryptography
3
Traditional Cryptography- Encryption and Decryption by computer
Visual Cryptography (VC), also called Visual Secret Sharing (VSS)- Encrypted by computer, Decrypted by human vision
![Page 4: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/4.jpg)
Introduction
Traditional VC and Random Grid Traditional VC and Random Grid
4
• VSS
Traditional VC-based VSS (Codebook)
RG-based VSS (Random Grid)
• Traditional VC-based VSS has at least two drawbacks as follows :
1. Codebook design
2. Pixel expansion
![Page 5: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/5.jpg)
Introduction
Pixel expansionPixel expansion
5
Secret image
Share1
Share2
Share1 + Share2
Traditional VC-based VSS:
![Page 6: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/6.jpg)
Introduction
Traditional VC and Random Grid Traditional VC and Random Grid
6
• VSS
Traditional VC-based VSS (Codebook)
RG-based VSS (Random Grid)
• Traditional VC-based VSS has at least two drawbacks as follows :
1. Codebook design
2. Pixel expansion
![Page 7: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/7.jpg)
Motivation
7
SA G1 G2 SA’
G1 G2
SA
SB
SA’
SB’
![Page 8: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/8.jpg)
Related Work
8
b g1 g2 g1⊕ g2
0 0 0 0
1 1 1
1 0 1 1
1 0 1
SA G1
for(i=0 ; i<w ; i++) for(j=0 ; j<h ; j++) if(B[i][j] == 0) G2[i][j] = G1[i][j]; else G2[i][j] = G1[i][j];Output(G1 , G2);
G2
Random Grid Algorithm1:
O. Kafri, and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, 1987, pp. 377-379.
In 1987, Kafri and Keren propose three different algorithms to encrypt a binary secret image.
![Page 9: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/9.jpg)
Research Methods
9
![Page 10: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/10.jpg)
Research Methods
Encryption phase:Step 1: SA(i, j) ← f RSP(SA).
Randomly select a pixel SA(i, j) from the first secret image SA, where the i-th row and the j-th column of the matrix SA are in the range of [0,m-1].
Step 2: G1(i, j)||G2(i, j) ← f RG(SA(i, j))
10
![Page 11: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/11.jpg)
Research Methods
11
![Page 12: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/12.jpg)
Research Methods
12
![Page 13: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/13.jpg)
Research Methods
Step 8: G1((m-1)-j, i) ← random(0,1)
13
![Page 14: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/14.jpg)
Research Methods
Decryption phase
14
![Page 15: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/15.jpg)
Research Results
Simulation 1: binary secrets, 90-degree rotation • Two secret images SA and SB with the size of 512×512
15
![Page 16: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/16.jpg)
Research Results
Simulation 2: Halftone secrets, 90-degree rotation • Two gray-level secret images SA and SB with the size of
512×512
16
![Page 17: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/17.jpg)
Research Results
Simulation 3: binary secrets, 180-degree rotation
Simulation 4: binary secrets, 270-degree rotation
17
![Page 18: Multiple-Image Encryption by Rotating Random Grids](https://reader034.vdocuments.site/reader034/viewer/2022052510/56813afb550346895da38de6/html5/thumbnails/18.jpg)
Conclusion
Property 1: No extra codebook redesigned
Property 2: No extra pixel expansion introduced
Property 3: Multiple secrets encoded
Property 4: Bandwidth and storage saving
Property 5: Wide image format
18