• Title/Summary/Keyword: Visual Cryptography

Search Result 34, Processing Time 0.02 seconds

Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography

  • Yang, Ching-Nung;Wu, Chih-Cheng;Lin, Yi-Chin;Kim, Cheonshik
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.979-989
    • /
    • 2015
  • Recently, Hou and others introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS) in which image blocks can be gradually recovered step by step. In Hou and others' (2, n)-BPVCS, a secret image is subdivided into n non-overlapping image blocks. When t ($2{\leq}t{\leq} n$) participants stack their shadow images, all the image blocks associated with these t participants will be recovered. However, Hou and others' scheme is only a simple 2-out-of-n case. In this paper, we discuss a general (k, n)-BPVCS for any k and n. Our main contribution is to give two constructions (Construction 1 and Construction 2) of this general (k, n)-BPVCS. Also, we theoretically prove that both constructions satisfy a threshold property and progressive recovery of the proposed (k, n)-BPVCS. For k = 2, Construction 1 is reduced to Hou and others' (2, n)-BPVCS.

Visual Cryptography Based on an Interferometric Encryption Technique

  • Lee, Sang-Su;Na, Jung-Chan;Sohn, Sung-Won;Park, Chee-Hang;Seo, Dong-Hoan;Kim, Soo-Joong
    • ETRI Journal
    • /
    • v.24 no.5
    • /
    • pp.373-380
    • /
    • 2002
  • This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated nuder the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.

  • PDF

A human identification scheme using visual cryptography (시각암호에 의한 개인 인증 방식)

  • 김미라;박지환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1546-1553
    • /
    • 1998
  • In this paper, we investigate a human identification scheme using visual cryptography, which can decode concealed images without and crytographic computations. T.Katoh & H.Imai proposed a secret sharing scheme which can conceal two query images into one displayed image for the identification. the generalized construction of the share matrix is proposed to conceal the multiple query images by stacking user slides o the displayed image. Furthermore, an extended methodis proposed in which group of slides can conceal an independent secret image as well as the pairs of slides can.

  • PDF

Contrast Analysis According to Hierarchical Access Structure on Visual Cryptography Scheme and Its Application into Human identification (시각암호에서 계층적 접근구조에 따른 휘도분석과 식별에 응용)

  • 최창근
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.2
    • /
    • pp.13-26
    • /
    • 1998
  • 시각암호는 비밀화상을 share라 불리는 암호화된 형태로 분산하는 방법으로서n명의 참여자로 이루어진 잡합 p에 대하여, 각 참여자는 share로 구성된 슬라이드(transparency)를 한장씩 부여받는다. 참여자들의 인가된 부분집합은 슬라이드를 중첩시켜 시각적으로 비밀정보를 복원할 수 있지만, 다른 부분집합은 비밀 정보를 복원 할 수 없다. 이 방법은 비밀정보를 복원라기 위하여 인간의 시각 체계를 이용하므로 컴퓨터를 사용한 복잡한 연산이 필요 없는 이점이 있는 반면에 복원화상의 휘도가 손실되는 단점이 있다. 이논문에서는 참여자의 계층화를 고려한 (2, n) VCS(Visual Cryptography Scheme)를 구성하기 위한 새로운 모델을 제안하고 계층적 접근구조에 의해 휘도를 개선하는 방법을 보인다. 제안하는 방법의 효율을 평가하기 위하여 (2, n) VC로 재구성되는 화상의 휘도를 분석한다. 또한 그 응용으로서 한 장의 슬라이드로 사용자와 시스템 사이에 상호식별이 가능한 메카니즘을 제시한다.

New Construction for Reducing the Number of Subpixel in Visual Cryptography (시각암호에서 부화소를 줄이기 위한 새로운 구성법)

  • 양신석;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.205-209
    • /
    • 1998
  • 시각암호는 n개로 분산된 비밀화상을 슬라이드와 같이 물리적으로 중첩 가능한 곳에 인쇄하여 그룹내 n명에게 슬라이드를 배포한 후, 임의의 k명 이상의 슬라이드를 겹치면 비밀 화상을 복원할 수 있지만, k-1명 이하의 슬라이드를 겹치는 경우에는 비밀화상을 복원할 수 없는 방식이다. 이 논문에서는 (k, n) 시각암호의 휘도(contrast)를 개선하기 위한 구성법에서 모든 경우에 동일 휘도를 유지하면서 부화소의 수를 줄이기 위한 새로운 구성법을 제안한다.

  • PDF

Visual Cryptography for Multi Images Using Constant Weight Codes (고정 가중치 부호에 의한 복수 화상용 시각암호)

  • 김미라;박상우;박지환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.261-271
    • /
    • 1996
  • M.Naor와 A.Shamir의 시각암호는 기존의 비밀 분산법에서 분산/복호시 연산량이 많은 것과는 달리 인간의 시각에 의해서 직접 복호될 수 있는 방식이다. 본 논문에서는 시각암호의 화장 방식인 복수 화상을 숨기는 방식에서 숨기려는 비밀화상의 수가 증가함에 따라 share 크기가 기하 급수적으로 커지는 문제점을 해결하기 위하여 고정 가중치부호의 해밍 거리를 조정하여 share 크기를 줄이는 방법을 제안한다.

  • PDF

Secret Sharing Scheme Using Visual Cryptography (시각암호에 의한 비밀 분산법)

  • 김미라
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.4
    • /
    • pp.37-50
    • /
    • 1997
  • 시각암호는 기존의 비밀 분산법이 비밀을 분산/복호시의 방대한 연산량을 수반하는 것과는 달리 인간의 시각에 의해 직접 복호되기 때문에 복잡한 연산이 필요없는 방식이다. 본 논문에서는 중첩하는 슬라이드의 매수에 따라 복수의 비밀화상이 복원되는 시각암호에 대해 알아보고, 그 안전성을 검증한다. 분산하고자 하는 비밀화상의 수가 증가함에 따라 크기가 기하 급수적으로 커지기 때문에 복원화성의 인식이 어렵게 된다. 따라서 고정 가중치 부호의 해밍 거리를 조정하여 줄임으로서 복원화상의 해상도를 개선하는 방법을 제안한다.

Ramdomg Hash for Integrity Verification Method of Multimedia Data in Surveillance System (비디오 감시 장치 무결성 검증을 위한 랜덤 해시 방법)

  • Ghimire, Sarala;Lee, Bumshik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.165-168
    • /
    • 2019
  • The advancement in technology has led to the enormous use of multimedia applications. The video/image recorded by such applications provides critical information that can be used as a visual evidence. However, owing to the adequacy in using different editing tools, it is susceptible to malicious alterations. Thus, the reliability or the integrity of the visual information should be verified before using it as an evidence. In this paper, we propose an integrity verification method for the surveillance system using randomized hashing. The integrity value of the surveillance data is generated using the randomized hashing and elliptic curve cryptography (ECC), which is used later for the validation. The experimental results obtained from the embedded accident data recorder (ADR) system shows that the proposed method is very efficient and provides a high level of security.

  • PDF

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung;Ye, Guo-Cin;Kim, Cheon-Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.457-476
    • /
    • 2011
  • This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.