Bit locker Drive Encryption: How it Works and How it Compares
Bit-level based secret sharing for image encryption
-
Upload
dieter-reese -
Category
Documents
-
view
20 -
download
0
description
Transcript of Bit-level based secret sharing for image encryption
![Page 1: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/1.jpg)
Bit-level based secret sharing for image encryption
Rastislav Lukac, Konstantinos N. Plataniotis
Presented by Du-Shiau Tsai
Pattern Recognition 38 (2005) 767 – 772
![Page 2: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/2.jpg)
2
ContentsContents
1. Introduction 2. Visual Cryptography3. The proposed scheme4. Experiment results5. Conclusions
![Page 3: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/3.jpg)
3
IntroductionIntroduction
Secret image sharing (Tsai)
![Page 4: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/4.jpg)
4
IntroductionIntroduction
Classification of SIS (Tsai)
SIS
visual Cryptography(1994)
variant visual secret sharing(2000)
interpolation method (2002)
![Page 5: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/5.jpg)
5
IntroductionIntroduction
Visual cryptography is a secret sharing procedure for image data
Recover the secret by the human visual systemWithout additional computations and any knowledge of cryptography .
![Page 6: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/6.jpg)
6
IntroductionIntroductionUnfortunately, visual sharing schemes cannot restore to its original quality when the original input is a natural image.
The proposed scheme operates directly on the bit planes of the digital image
![Page 7: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/7.jpg)
7
2-out-of-3 Visual Cryptography
SA
SB
SC
![Page 8: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/8.jpg)
8
2-out-of-2 Visual CryptographyB
![Page 9: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/9.jpg)
9
2-out-of-2 Visual Cryptography
More reasons for the proposed schemecannot provide perfect reconstruction
intensity or spatial resolution
is not appropriate for real-time applications.
![Page 10: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/10.jpg)
10
The proposed schemeThe proposed scheme
![Page 11: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/11.jpg)
11
Example: The (2,2) proposed scheme for 4-bit imageExample: The (2,2) proposed scheme for 4-bit image
12=1011=1*23 + 0*22 + 1*21 + 15=0101=0*23 + 1*22 + 0*21 + 1
![Page 12: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/12.jpg)
12
Experiment resultsExperiment results
![Page 13: Bit-level based secret sharing for image encryption](https://reader035.fdocuments.in/reader035/viewer/2022062517/5681323e550346895d98ab61/html5/thumbnails/13.jpg)
13
ConclusionsConclusions
Preserve all the features of traditional k-out-n sharing schemesAllow for perfect reconstruction of the input B-bit imageEncrypts binary, gray-scale and color imagesCan be effectively implemented either in software or hardware