70 likes | 178 Views
Verifiable visual cryptography. Shuo -Fang Hsu, Yu- Jie Chang, Ran- Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing. (a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image.
E N D
Verifiable visual cryptography Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang 2012 sixth international conference on genetic and evolutionary computing
(a) Secret image. (b) Tag image 1. (c) Tag image 2. Share 1. Share 2. Recovered secret image. Folding up share 1. Folding up share 2. Recovered tag image 1. Recovered tag image 2.
(a) Secret image. (b) Verification image. Share 1. Share 2. Recovered secret image. Stack them by share1 right-half to share2 left-half, and share1 left-half to share2 right-half. Recovered verification image.
If Verification image pixel = “b”, but corresponding pixels both are “w”. Random choose one pixel to set black. b [1] V Share2 Share1 w [0] b [1] w [0] w [0] Share2 Share1
If Verification image pixel= “w”, but one of corresponding pixel are “w”. Have ¼ probability to set “w” to “b”. w [0] V Share2 Share1 w [0] b [1] b [1] b [1] Share2 Share1