Verifiable visual cryptography
-
Upload
kirby-fletcher -
Category
Documents
-
view
32 -
download
0
description
Transcript of Verifiable visual cryptography
![Page 1: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/1.jpg)
Shuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang
2012 sixth international conference on genetic and evolutionary computing
*Verifiable visual cryptography
![Page 2: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/2.jpg)
(a) Secret image. (b) Tag image 1. (c) Tag image 2.
Share 1. Share 2. Recovered secret image.
Recovered tag image 1. Recovered tag image 2.
Folding up share 1. Folding up share 2.
![Page 3: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/3.jpg)
(a) Secret image. (b) Verification image.
Share 1. Share 2. Recovered secret image.
Recovered verification image.
Stack them by share1 right-half to share2 left-half, and share1 left-half to share2 right-half.
![Page 4: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/4.jpg)
w[0] V
b[1]
If Verification image pixel = “b”, but corresponding pixels both are “w”.Random choose one pixel to set black.
w[0]Share1 Share2
b[1]
w[0]Share1 Share2
![Page 5: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/5.jpg)
If Verification image pixel = “w”, but one of corresponding pixel are “w”.Have ¼ probability to set “w” to “b”.
w[0] V
w[0] b
[1]Share1 Share2
b[1]
b[1]Share1 Share2
![Page 6: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/6.jpg)
T corresponding pixel on share
Whether the pixel need to change or
not
stack result
b w w b w b
w b b
w b w b b
b w b w b
b b b b b
w w w w w w
w b b
b w b
w b w b b
b b b
b w b w b
b b b
b b b b b
![Page 7: Verifiable visual cryptography](https://reader036.fdocuments.us/reader036/viewer/2022072111/56812cfa550346895d91c925/html5/thumbnails/7.jpg)