SlideShare une entreprise Scribd logo
1  sur  21
-- Pallavi Khandekar
What is VC?
• Secret sharing scheme.

• Visual Cryptography (VC) was introduced by Moni
  Naor and Adi Shamir in Eurocrypt (1994).

• Used to encrypt written text/ pictures etc in a
  perfectly secure way.

• Decoding is done by human visual system,
  without any computation.
Secret Sharing Scheme
• Method of dividing a
  secret amongst a group
  of participants.           Share 1


• Each of the participants
  get a share of the         Share 2

  secret.
                             Share 1
• Sufficient number of          +
                             Share 2
  shares combined
  reveals the secret.
Example - k by n Scheme (k,n)

• Consider data D (text / image) divided into
   – n number of shares (D1, D2 …. Dn)
   – k or more shares when overlapped reveals
     information about the data
   – k-1 or fewer shares when overlapped reveal no
     information about the data


• If k = n then all participants are required to
  reconstruct the secret.
Preliminary Notations
• n = Group size

• k = Threshold

• m = number of pixels in a share. (loss in resolution
  from the original image to the recovered image)

• ɑ = the relative difference in the weight between the
  combined shares that come from a white pixel and a
  black pixel in the original image. Represents loss in
  contrast.
Preliminary Notations (contd..)
• C0 = Collection of n × m Boolean matrices for shares of
  white pixel.

• C1 = Collection of n × m Boolean matrices for shares of
  black pixel.

• V = ORed k rows.

• H(V) = Hamming weight.

• d = number in [1,m]
Example 2 by 2 scheme (2 subpixels)


Partition for black and white pixels in 2 by 2
scheme.
Example 2 by 2 scheme (2 subpixels)
This scheme can be explained by below values

• n=2                   • V1 = [1,1] or [1,1]


• m=2                   • H(V0 ) = 1


• k=2                   • H(V1) = 2


• V0 = [0,1] or [1,0]   • ɑ = H(V1) - H(V0 ) / m = 1/2
Implementation
• Platform: .Net Framework 3.5

• Language: C#

• Reason for selecting .Net:
   – Previous experience working on .Net.
   – It is optimal for developing and demonstrating application through UI.
   – .NET also has lot of support for image acquisition and manipulation.


• Other Platforms: Matlab, Python etc
DEMO
Technique Used
         White Pixel                Black Pixel



S0
                           S0


S1
                           S1




     0                 1        0                 1
Results for Text
Results for Image
Result for Image (contd..)
2 by 2 scheme with 4 sub pixels


Horizontal shares   Vertical shares   Diagonal shares
Results in 2 by 2 scheme (2 subpixels)
• The secret image I is encoded into Share1 & Share2 two
  shares.

• D is decoded by superimposing these two shares with 50%
  loss of contrast. (ɑ = ½)

• The decoded image is identified, although some contrast
  loss is observed.

• Due to pixel expansion the width of the decoded image is
  twice as that of the original image.
Advantages
• Simple to implement

• Decryption algorithm not required (Use a human Visual
  System). So a person unknown to cryptography can
  decrypt the message.

• We can send cipher text through FAX or E-MAIL.

• Lower computational cost since the secret message is
  recognized only by human eyes and not
  cryptographically computed.
Disadvantages
• The contrast of the reconstructed image is not
  maintained.

• Perfect alignment of the transparencies is troublesome.

• Due to pixel expansion the width of the decoded image
  is twice as that of the original image. Leads to loss of
  information due to change in aspect ratio.

• Additional processing is required for colored images.
Application
• Biometric security

• Watermarking

• Steganography

• Remote electronic voting

• Bank customer identification
   –   Bank sends customer a set of keys in advance
   –   Bank web site displays cipher
   –   Customer applies overlay, reads transaction key
   –   Customer enters transaction key
References
• http://en.wikipedia.org/wiki/File:Visual_crypto_animation_de
  mo.gif

• http://users.telenet.be/d.rijmenants/en/visualcrypto.htm

• http://www.cs.nccu.edu.tw/~raylin/UndergraduateCourse/Co
  mtenporaryCryptography/Spring2009/VisualCrypto.pdf
Thank you!

Questions?

Contenu connexe

Tendances

x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication ServiceSwathy T
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipherUdit Mishra
 
Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Saravanan T.M
 
Output primitives in Computer Graphics
Output primitives in Computer GraphicsOutput primitives in Computer Graphics
Output primitives in Computer GraphicsKamal Acharya
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Polygon filling
Polygon fillingPolygon filling
Polygon fillingAnkit Garg
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 
sutherland- Hodgeman Polygon clipping
sutherland- Hodgeman Polygon clippingsutherland- Hodgeman Polygon clipping
sutherland- Hodgeman Polygon clippingArvind Kumar
 
The sutherland hodgeman polygon clipping algorithm
The sutherland hodgeman polygon clipping algorithmThe sutherland hodgeman polygon clipping algorithm
The sutherland hodgeman polygon clipping algorithmMani Kanth
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clippingMohd Arif
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygonsLiang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygonsLahiru Danushka
 

Tendances (20)

Key management
Key managementKey management
Key management
 
Clipping
ClippingClipping
Clipping
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
 
Unit 3 Arithmetic Coding
Unit 3 Arithmetic CodingUnit 3 Arithmetic Coding
Unit 3 Arithmetic Coding
 
Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)
 
Output primitives in Computer Graphics
Output primitives in Computer GraphicsOutput primitives in Computer Graphics
Output primitives in Computer Graphics
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
BRESENHAM’S LINE DRAWING ALGORITHM
BRESENHAM’S  LINE DRAWING ALGORITHMBRESENHAM’S  LINE DRAWING ALGORITHM
BRESENHAM’S LINE DRAWING ALGORITHM
 
Polygon filling
Polygon fillingPolygon filling
Polygon filling
 
Hog
HogHog
Hog
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
sutherland- Hodgeman Polygon clipping
sutherland- Hodgeman Polygon clippingsutherland- Hodgeman Polygon clipping
sutherland- Hodgeman Polygon clipping
 
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
 
The sutherland hodgeman polygon clipping algorithm
The sutherland hodgeman polygon clipping algorithmThe sutherland hodgeman polygon clipping algorithm
The sutherland hodgeman polygon clipping algorithm
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygonsLiang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
 

En vedette

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssVinay Sirivara
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 

En vedette (20)

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Vc pred
Vc predVc pred
Vc pred
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Steganography
SteganographySteganography
Steganography
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 

Similaire à What is VC? Visual Cryptography Explained

Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
Introduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksIntroduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksMarcinJedyk
 
Introduction to computer vision
Introduction to computer visionIntroduction to computer vision
Introduction to computer visionMarcin Jedyk
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1patisa
 
Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Joel P
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoKavya P K
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.pptHarisMasood20
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.pptHarisMasood20
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve aya_hatem
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Reviewiosrjce
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSSIRJET Journal
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonAditya Bhattacharya
 
Deep Learning AtoC with Image Perspective
Deep Learning AtoC with Image PerspectiveDeep Learning AtoC with Image Perspective
Deep Learning AtoC with Image PerspectiveDong Heon Cho
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern PresentationDaniel Cahall
 

Similaire à What is VC? Visual Cryptography Explained (20)

Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Introduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksIntroduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural Networks
 
Introduction to computer vision
Introduction to computer visionIntroduction to computer vision
Introduction to computer vision
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
N017327985
N017327985N017327985
N017327985
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathon
 
Image Security
Image SecurityImage Security
Image Security
 
Deep Learning AtoC with Image Perspective
Deep Learning AtoC with Image PerspectiveDeep Learning AtoC with Image Perspective
Deep Learning AtoC with Image Perspective
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern Presentation
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

What is VC? Visual Cryptography Explained

  • 2. What is VC? • Secret sharing scheme. • Visual Cryptography (VC) was introduced by Moni Naor and Adi Shamir in Eurocrypt (1994). • Used to encrypt written text/ pictures etc in a perfectly secure way. • Decoding is done by human visual system, without any computation.
  • 3. Secret Sharing Scheme • Method of dividing a secret amongst a group of participants. Share 1 • Each of the participants get a share of the Share 2 secret. Share 1 • Sufficient number of + Share 2 shares combined reveals the secret.
  • 4. Example - k by n Scheme (k,n) • Consider data D (text / image) divided into – n number of shares (D1, D2 …. Dn) – k or more shares when overlapped reveals information about the data – k-1 or fewer shares when overlapped reveal no information about the data • If k = n then all participants are required to reconstruct the secret.
  • 5. Preliminary Notations • n = Group size • k = Threshold • m = number of pixels in a share. (loss in resolution from the original image to the recovered image) • ɑ = the relative difference in the weight between the combined shares that come from a white pixel and a black pixel in the original image. Represents loss in contrast.
  • 6. Preliminary Notations (contd..) • C0 = Collection of n × m Boolean matrices for shares of white pixel. • C1 = Collection of n × m Boolean matrices for shares of black pixel. • V = ORed k rows. • H(V) = Hamming weight. • d = number in [1,m]
  • 7. Example 2 by 2 scheme (2 subpixels) Partition for black and white pixels in 2 by 2 scheme.
  • 8. Example 2 by 2 scheme (2 subpixels) This scheme can be explained by below values • n=2 • V1 = [1,1] or [1,1] • m=2 • H(V0 ) = 1 • k=2 • H(V1) = 2 • V0 = [0,1] or [1,0] • ɑ = H(V1) - H(V0 ) / m = 1/2
  • 9. Implementation • Platform: .Net Framework 3.5 • Language: C# • Reason for selecting .Net: – Previous experience working on .Net. – It is optimal for developing and demonstrating application through UI. – .NET also has lot of support for image acquisition and manipulation. • Other Platforms: Matlab, Python etc
  • 10. DEMO
  • 11. Technique Used White Pixel Black Pixel S0 S0 S1 S1 0 1 0 1
  • 14. Result for Image (contd..)
  • 15. 2 by 2 scheme with 4 sub pixels Horizontal shares Vertical shares Diagonal shares
  • 16. Results in 2 by 2 scheme (2 subpixels) • The secret image I is encoded into Share1 & Share2 two shares. • D is decoded by superimposing these two shares with 50% loss of contrast. (ɑ = ½) • The decoded image is identified, although some contrast loss is observed. • Due to pixel expansion the width of the decoded image is twice as that of the original image.
  • 17. Advantages • Simple to implement • Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message. • We can send cipher text through FAX or E-MAIL. • Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
  • 18. Disadvantages • The contrast of the reconstructed image is not maintained. • Perfect alignment of the transparencies is troublesome. • Due to pixel expansion the width of the decoded image is twice as that of the original image. Leads to loss of information due to change in aspect ratio. • Additional processing is required for colored images.
  • 19. Application • Biometric security • Watermarking • Steganography • Remote electronic voting • Bank customer identification – Bank sends customer a set of keys in advance – Bank web site displays cipher – Customer applies overlay, reads transaction key – Customer enters transaction key
  • 20. References • http://en.wikipedia.org/wiki/File:Visual_crypto_animation_de mo.gif • http://users.telenet.be/d.rijmenants/en/visualcrypto.htm • http://www.cs.nccu.edu.tw/~raylin/UndergraduateCourse/Co mtenporaryCryptography/Spring2009/VisualCrypto.pdf

Notes de l'éditeur

  1. The way we choose patter in each share is random.Co : all matrices obtained by permuting the columns of mentioned C0C1 : all matrices obtained by permuting the columns of mentioned C1
  2. As a part of project I have implemented 2 by 2 scheme with (2 sub pixels).And as I explained notations to you here are notation graphed for it
  3. Random class is used to generate 0 or 1This prevents for eves dropper from guessing the original pixel