1 / 7

Verifiable visual cryptography

Verifiable visual cryptography. Shuo -Fang Hsu, Yu- Jie Chang, Ran- Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing. (a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image.

Download Presentation

Verifiable visual cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Verifiable visual cryptography Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing

  2. (a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image. Folding up share 1. Folding up share 2. Recovered tag image 1. Recovered tag image 2.

  3. (a) Secret image. (b) Verification image. Share 1. Share 2. Recovered secret image. Stack them by share1 right-half to share2 left-half, and share1 left-half to share2 right-half. Recovered verification image.

  4. If Verification image pixel = “b”, but corresponding pixels both are “w”. Random choose one pixel to set black. b [1] V Share2 Share1 w [0] b [1] w [0] w [0] Share2 Share1

  5. If Verification image pixel= “w”, but one of corresponding pixel are “w”. Have ¼ probability to set “w” to “b”. w [0] V Share2 Share1 w [0] b [1] b [1] b [1] Share2 Share1

More Related