advanced information security march 11, 2010 presenter: semin kim

19
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim

Upload: xia

Post on 23-Feb-2016

48 views

Category:

Documents


0 download

DESCRIPTION

Visual Cryptography. Advanced Information Security March 11, 2010 Presenter: Semin Kim. Overview. Introduction of Paper Visual Cryptography How to make? Basic Idea Color Visual Cryptography Conclusions. Overview. Introduction of Paper Visual Cryptography How to make? Basic Idea - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Visual Cryptography

Advanced Information SecurityMarch 11, 2010

Presenter: Semin Kim

Page 2: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Overview

Introduction of Paper

Visual Cryptography How to make? Basic Idea

Color Visual Cryptography

Conclusions

-2/19-

Page 3: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Overview

Introduction of Paper

Visual Cryptography How to make? Basic Idea

Color Visual Cryptography

Conclusions

-3/19-

Page 4: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Introduction of paper

Title Visual Cryptography

Conference Eurocrypt ’94

Authors Modi Noar, Adi Shamir

-4/19-

Page 5: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Overview

Introduction of Paper

Visual Cryptography How to make? Basic Idea

Color Visual Cryptography

Conclusions

-5/19-

Page 6: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Visual Cryptography

What?

It is different from the concept of traditional cryptogra-phy

It depends on perception by the human eyes

-6/19-

Page 7: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

The simplest visual cryptography Message consists of a collection of black and white

pixels.

‘OR’ Operation

How to make?-7/19-

Pixel (0)

Pixel (1)

1111

0011

or 1100

Page 8: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

How to make?

The simplest visual cryptography Each pixel appears in n modified versions (called

share). Each share is a collection of m black and white sub-

pixels.

-8/19-

m sub-pixels

m sub-pixels

n shares

pixel

or

or

Example. n = 2, m = 4

Page 9: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

How to make?

The simplest visual cryptography

-9/19-

horizontalshares

verticalshares

diagonalshares

SecretMessage

Page 10: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

How to make?

The simplest visual cryptography

-10/19-

horizontalshares

verticalshares

diagonalshares

Page 11: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

How to make?

The simplest visual cryptography

-11/19-

Page 12: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Basic Idea

(k, n) sharing problem Extended to k out of n sharing problem For encrypting written material (printed text or hand-

written notes), a perfectly secure way can be decoded directly by the human visual system.

Simplicity

-12/19-

Page 13: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Overview

Introduction of Paper

Visual Cryptography How to make? Basic Idea

Color Visual Cryptography

Conclusions

-13/19-

Page 14: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Color Visual Cryptography

RGB color space Three components: Red, Green, Blue All values are in the range [0, 1]

• In RGB video cards for PC, one component is displayed using 8 bits (256 values)

-14/19-

Sharing Image 1 Sharing Image 2 Recover Image

XOR =

RGB Addition

Page 15: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Color Visual Cryptography

RGB Display

-15/19-

Red Green Blue

OriginalImage

1

pixel

150

100

50

0 0 1 0 1 1 0

0 1 1 0 0 1 0 0

0 0 1 1 0 0 1 0

Bitplanes(Most --------------------Least)

150 1 0 0 1 0 1 1 0

0 1 1 0 0 1 0 0

1 1 1 0 0 0 1 0226

100

Example. 2 share images

Page 16: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Color Visual Cryptography-16/19-

OriginalImage

SharedImage 1

SharedImage 2

RecoverImage

Page 17: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Overview

Introduction of Paper

Visual Cryptography How to make? Basic Idea

Color Visual Cryptography

Conclusions

-17/19-

Page 18: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Conclusion

Advantages of Visual Cryptography No knowledge of cryptography is required to get the

secret message from shared images.• The system can be used by anyone.

Lower computational cost since the secret message is recognized only by human eyes and not cryptographi-cally computed.

-18/19-

Page 19: Advanced Information Security March 11, 2010 Presenter:  Semin  Kim

Q&A

Thank you! Any questions?

-19/19-