SlideShare a Scribd company logo
VISUAL
CRYPTOGRAPHY
Dr. Qaim Mehdi
Department of Computer Science
What is Cryptography?
 Cryptography is the science of information security.
 The main objective of cryptography is information hiding.
What is Cryptography?
 Cryptography is the science of information security.
 The main objective of cryptography is information hiding.
History of Cryptography-1: Hieroglyphics
Cryptography probably began in or around 2000 BC in Egypt, where
hieroglyphics were used to decorate the tombs of deceased rulers and
kings.
COMPUTER SCIENCE
COMPUTER SCIENCE
History of Cryptography-2: Wax Tablet
A wax tablet is a tablet made of wood and covered with a layer of wax. It
was used as a reusable and portable writing surface in the 1400 BC.
History of Cryptography-3: Caesar Cipher
The first known use of a modern cipher was introduced by Julius Caesar
(100 BC to 44 BC), who did not trust his messengers when
communicating with his governors.
Failure is success if we learn from it.
Idloxuh lv vxffhvv li zh ohcuq iurp lw.
Visual Cryptography
It is a new type of cryptographic scheme, which can decode concealed
images without any cryptographic computations. The scheme is perfectly
secure and very easy to implement.
Visual Cryptography
It is a new type of cryptographic scheme, which can decode concealed
images without any cryptographic computations. The scheme is perfectly
secure and very easy to implement.
Adi Shamir is a cryptographer and co-inventor of the famous RSA
algorithm.
Moni Naor is a computer scientist and also famous for his Turing Test
on verification of a human in the loop.
Pixel
Pixel is the smallest addressable element in a picture element.
Grayscale-level
Grayscale Level is the brightness value assigned to a pixel; values range
from black, through gray, to white.
Qualified Participants
A qualified set of participants is a subset of Ρ whose shares visually reveal
the 'secret' image when stacked together.
Qualified Participant Qualified Participant
Forbidden Participant
Qualified Participants
A forbidden set of participants is a subset of Ρ whose shares reveal
absolutely no information about the 'secret' image when stacked
together.
Forbidden Participant Qualified Participant
Qualified Participant
Visual Cryptography: The Objective
Encrypting written material (printed text, handwritten notes, pictures,
etc.) in a perfectly secure way which can be decoded directly by the
human visual system.
Visual Cryptography: The Approach
 The message consists of a collection of black and white pixels and each
pixel is handled separately.
 Each original pixel appears in n modified versions (called shares), one
for each transparency.
Visual Cryptography: The Approach
 The message consists of a collection of black and white pixels and each
pixel is handled separately.
 Each original pixel appears in n modified versions (called shares), one
for each transparency.
Horizontal Share Vertical Share Diagonal Share
Visual Cryptography: The Process
Continue…
Original Pixel
Share 1
Share 2
Overlaid
Visual Cryptography: The Process
Original Pixel
Share 1
Share 2
Overlaid
1 0
0
1
0
1
0
1
0
11
1
0
Continue…
Illustration of Visual Cryptography
Pixel (0)
Pixel (1)
Illustration of Visual Cryptography
m sub-pixels
m sub-pixels
n shares
pixel
or
or
Example. n = 2, m = 4
Continue…
Illustration of Visual Cryptography
horizontal
shares
vertical
shares
diagonal
shares
Secret
Message
Continue…
Illustration of Visual Cryptography
horizontal
shares
vertical
shares
diagonal
shares
Continue…
Concluding Remarks
Concluding Remarks
Future Scope
 We can improve result by removing digital noise(gray-shades).
 With some minor changes, we can implement visual cryptography on
color images.
References
 M. Naor and A. Shamir, Visual cryptography, in "Advances in Cryptology { EUROCRYPT '94", A. De Santis, ed., Lecture
Notes in Computer Science 950 (1995), 1-12.
 G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information
and Computation 129 (1996), 86-106.
 C. Blundo, A. Giorgia Gaggia and D. R. Stinson, On the dealer's randomness required in secret sharing schemes,
Designs, Codes and Cryptography 11 (1997), 107-122.
 W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, technical report
TR001001, Florida State University (2000).
 Nakajima, M. and Yamaguchi, Y., Extended Visual Cryptography for Natural Images, WSCG02 (2002), 303.
 D Chaum, Secret-ballot receipts: True voter-veriable elections, IEEE Security and Privacy (2004), 38-47.
 A.Klein, M. Wessler, Extended Visual Crypotography Schemes, Science Direct (2007), 716-732.
 A. Bonis and A.Santis, Randomness in secret sharing and visual cryptography schemes, Theoretical Comp. Sci. 314
(2004), 351-374.
Thanks
Queries

More Related Content

What's hot

steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compressionasodariyabhavesh
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
Chapter 14 AutoEncoder
Chapter 14 AutoEncoderChapter 14 AutoEncoder
Chapter 14 AutoEncoderKyeongUkJang
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesPrincy Joy
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portionMoe Moe Myint
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)danishrafiq
 
Image segmentation
Image segmentation Image segmentation
Image segmentation Amnaakhaan
 
introduction to colors in images and videos
introduction to colors in images and videosintroduction to colors in images and videos
introduction to colors in images and videoswasrse
 

What's hot (20)

steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Encryption
EncryptionEncryption
Encryption
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Steganography
SteganographySteganography
Steganography
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Steganography
SteganographySteganography
Steganography
 
Image compression
Image compressionImage compression
Image compression
 
Chapter 14 AutoEncoder
Chapter 14 AutoEncoderChapter 14 AutoEncoder
Chapter 14 AutoEncoder
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniques
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portion
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Jpeg dct
Jpeg dctJpeg dct
Jpeg dct
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
introduction to colors in images and videos
introduction to colors in images and videosintroduction to colors in images and videos
introduction to colors in images and videos
 

Similar to Visual Cryptography

"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...AM Publications
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixelsmuhammed jassim k
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Computer network
Computer networkComputer network
Computer networksnegacmr
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 

Similar to Visual Cryptography (20)

J017335863
J017335863J017335863
J017335863
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Stegnography
StegnographyStegnography
Stegnography
 
Computer network
Computer networkComputer network
Computer network
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 

Recently uploaded

Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIAlejandraGmez176757
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单ukgaet
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单ewymefz
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?DOT TECH
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .NABLAS株式会社
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单nscud
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sMAQIB18
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单vcaxypu
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundOppotus
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单ocavb
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单yhkoc
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单enxupq
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单nscud
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhArpitMalhotra16
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单vcaxypu
 

Recently uploaded (20)

Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 

Visual Cryptography

  • 2. What is Cryptography?  Cryptography is the science of information security.  The main objective of cryptography is information hiding.
  • 3. What is Cryptography?  Cryptography is the science of information security.  The main objective of cryptography is information hiding.
  • 4. History of Cryptography-1: Hieroglyphics Cryptography probably began in or around 2000 BC in Egypt, where hieroglyphics were used to decorate the tombs of deceased rulers and kings. COMPUTER SCIENCE COMPUTER SCIENCE
  • 5. History of Cryptography-2: Wax Tablet A wax tablet is a tablet made of wood and covered with a layer of wax. It was used as a reusable and portable writing surface in the 1400 BC.
  • 6. History of Cryptography-3: Caesar Cipher The first known use of a modern cipher was introduced by Julius Caesar (100 BC to 44 BC), who did not trust his messengers when communicating with his governors. Failure is success if we learn from it. Idloxuh lv vxffhvv li zh ohcuq iurp lw.
  • 7. Visual Cryptography It is a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement.
  • 8. Visual Cryptography It is a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. Adi Shamir is a cryptographer and co-inventor of the famous RSA algorithm. Moni Naor is a computer scientist and also famous for his Turing Test on verification of a human in the loop.
  • 9. Pixel Pixel is the smallest addressable element in a picture element.
  • 10. Grayscale-level Grayscale Level is the brightness value assigned to a pixel; values range from black, through gray, to white.
  • 11. Qualified Participants A qualified set of participants is a subset of Ρ whose shares visually reveal the 'secret' image when stacked together. Qualified Participant Qualified Participant Forbidden Participant
  • 12. Qualified Participants A forbidden set of participants is a subset of Ρ whose shares reveal absolutely no information about the 'secret' image when stacked together. Forbidden Participant Qualified Participant Qualified Participant
  • 13. Visual Cryptography: The Objective Encrypting written material (printed text, handwritten notes, pictures, etc.) in a perfectly secure way which can be decoded directly by the human visual system.
  • 14. Visual Cryptography: The Approach  The message consists of a collection of black and white pixels and each pixel is handled separately.  Each original pixel appears in n modified versions (called shares), one for each transparency.
  • 15. Visual Cryptography: The Approach  The message consists of a collection of black and white pixels and each pixel is handled separately.  Each original pixel appears in n modified versions (called shares), one for each transparency. Horizontal Share Vertical Share Diagonal Share
  • 16. Visual Cryptography: The Process Continue… Original Pixel Share 1 Share 2 Overlaid
  • 17. Visual Cryptography: The Process Original Pixel Share 1 Share 2 Overlaid 1 0 0 1 0 1 0 1 0 11 1 0 Continue…
  • 18. Illustration of Visual Cryptography Pixel (0) Pixel (1)
  • 19. Illustration of Visual Cryptography m sub-pixels m sub-pixels n shares pixel or or Example. n = 2, m = 4 Continue…
  • 20. Illustration of Visual Cryptography horizontal shares vertical shares diagonal shares Secret Message Continue…
  • 21. Illustration of Visual Cryptography horizontal shares vertical shares diagonal shares Continue…
  • 24. Future Scope  We can improve result by removing digital noise(gray-shades).  With some minor changes, we can implement visual cryptography on color images.
  • 25. References  M. Naor and A. Shamir, Visual cryptography, in "Advances in Cryptology { EUROCRYPT '94", A. De Santis, ed., Lecture Notes in Computer Science 950 (1995), 1-12.  G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information and Computation 129 (1996), 86-106.  C. Blundo, A. Giorgia Gaggia and D. R. Stinson, On the dealer's randomness required in secret sharing schemes, Designs, Codes and Cryptography 11 (1997), 107-122.  W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, technical report TR001001, Florida State University (2000).  Nakajima, M. and Yamaguchi, Y., Extended Visual Cryptography for Natural Images, WSCG02 (2002), 303.  D Chaum, Secret-ballot receipts: True voter-veriable elections, IEEE Security and Privacy (2004), 38-47.  A.Klein, M. Wessler, Extended Visual Crypotography Schemes, Science Direct (2007), 716-732.  A. Bonis and A.Santis, Randomness in secret sharing and visual cryptography schemes, Theoretical Comp. Sci. 314 (2004), 351-374.