Date post: | 22-Dec-2015 |
Category: |
Documents |
View: | 216 times |
Download: | 1 times |
Bit-level based secret sharing for image encryption
Rastislav Lukac, Konstantinos N. Plataniotis
Presented by Du-Shiau Tsai
Pattern Recognition 38 (2005) 767 – 772
2
ContentsContents
1. Introduction 2. Visual Cryptography3. The proposed scheme4. Experiment results5. Conclusions
4
IntroductionIntroduction
Classification of SIS (Tsai)
SIS
visual Cryptography(1994)
variant visual secret sharing(2000)
interpolation method (2002)
5
IntroductionIntroduction
Visual cryptography is a secret sharing procedure for image data
Recover the secret by the human visual systemWithout additional computations and any knowledge of cryptography .
6
IntroductionIntroductionUnfortunately, visual sharing schemes cannot restore to its original quality when the original input is a natural image.
The proposed scheme operates directly on the bit planes of the digital image
9
2-out-of-2 Visual Cryptography
More reasons for the proposed schemecannot provide perfect reconstruction
intensity or spatial resolution
is not appropriate for real-time applications.
11
Example: The (2,2) proposed scheme for 4-bit imageExample: The (2,2) proposed scheme for 4-bit image
12=1011=1*23 + 0*22 + 1*21 + 15=0101=0*23 + 1*22 + 0*21 + 1