![Page 1: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/1.jpg)
Visual Cryptography
Advanced Information SecurityMarch 11, 2010
Presenter: Semin Kim
![Page 2: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/2.jpg)
Overview
Introduction of Paper
Visual Cryptography How to make? Basic Idea
Color Visual Cryptography
Conclusions
-2/19-
![Page 3: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/3.jpg)
Overview
Introduction of Paper
Visual Cryptography How to make? Basic Idea
Color Visual Cryptography
Conclusions
-3/19-
![Page 4: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/4.jpg)
Introduction of paper
Title Visual Cryptography
Conference Eurocrypt ’94
Authors Modi Noar, Adi Shamir
-4/19-
![Page 5: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/5.jpg)
Overview
Introduction of Paper
Visual Cryptography How to make? Basic Idea
Color Visual Cryptography
Conclusions
-5/19-
![Page 6: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/6.jpg)
Visual Cryptography
What?
It is different from the concept of traditional cryptogra-phy
It depends on perception by the human eyes
-6/19-
![Page 7: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/7.jpg)
The simplest visual cryptography Message consists of a collection of black and white
pixels.
‘OR’ Operation
How to make?-7/19-
Pixel (0)
Pixel (1)
1111
0011
or 1100
![Page 8: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/8.jpg)
How to make?
The simplest visual cryptography Each pixel appears in n modified versions (called
share). Each share is a collection of m black and white sub-
pixels.
-8/19-
m sub-pixels
m sub-pixels
n shares
pixel
or
or
Example. n = 2, m = 4
![Page 9: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/9.jpg)
How to make?
The simplest visual cryptography
-9/19-
horizontalshares
verticalshares
diagonalshares
SecretMessage
![Page 10: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/10.jpg)
How to make?
The simplest visual cryptography
-10/19-
horizontalshares
verticalshares
diagonalshares
![Page 11: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/11.jpg)
How to make?
The simplest visual cryptography
-11/19-
![Page 12: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/12.jpg)
Basic Idea
(k, n) sharing problem Extended to k out of n sharing problem For encrypting written material (printed text or hand-
written notes), a perfectly secure way can be decoded directly by the human visual system.
Simplicity
-12/19-
![Page 13: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/13.jpg)
Overview
Introduction of Paper
Visual Cryptography How to make? Basic Idea
Color Visual Cryptography
Conclusions
-13/19-
![Page 14: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/14.jpg)
Color Visual Cryptography
RGB color space Three components: Red, Green, Blue All values are in the range [0, 1]
• In RGB video cards for PC, one component is displayed using 8 bits (256 values)
-14/19-
Sharing Image 1 Sharing Image 2 Recover Image
XOR =
RGB Addition
![Page 15: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/15.jpg)
Color Visual Cryptography
RGB Display
-15/19-
Red Green Blue
OriginalImage
1
pixel
150
100
50
0 0 1 0 1 1 0
0 1 1 0 0 1 0 0
0 0 1 1 0 0 1 0
Bitplanes(Most --------------------Least)
150 1 0 0 1 0 1 1 0
0 1 1 0 0 1 0 0
1 1 1 0 0 0 1 0226
100
Example. 2 share images
![Page 16: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/16.jpg)
Color Visual Cryptography-16/19-
OriginalImage
SharedImage 1
SharedImage 2
RecoverImage
![Page 17: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/17.jpg)
Overview
Introduction of Paper
Visual Cryptography How to make? Basic Idea
Color Visual Cryptography
Conclusions
-17/19-
![Page 18: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/18.jpg)
Conclusion
Advantages of Visual Cryptography No knowledge of cryptography is required to get the
secret message from shared images.• The system can be used by anyone.
Lower computational cost since the secret message is recognized only by human eyes and not cryptographi-cally computed.
-18/19-
![Page 19: Advanced Information Security March 11, 2010 Presenter: Semin Kim](https://reader036.vdocuments.net/reader036/viewer/2022062501/568164a6550346895dd6994c/html5/thumbnails/19.jpg)
Q&A
Thank you! Any questions?
-19/19-