Halftone Visual Cryptography
description
Transcript of Halftone Visual Cryptography
![Page 1: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/1.jpg)
1
Halftone Visual Cryptography
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 8, AUGUST 2006, pp. 2441-2
453Zhi Zhou, Gonzalo R. Arce, and Giovanni Di
CrescenzoReporter: Jen-Bang Feng
![Page 2: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/2.jpg)
2
Visual Cryptography
+
+
=
=
![Page 3: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/3.jpg)
3
Visual Cryptography
![Page 4: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/4.jpg)
4
The Proposed Scheme
![Page 5: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/5.jpg)
5
Comparisons
MSEPSNR
2
10
maxlog10
m
QQm
PSNR
2110
21
2
2
10
log10
%50maxmin
maxlog10
EX.Block size: 4*4m = 2PSNR = 9.03
![Page 6: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/6.jpg)
6
Results
(a)(b) (e) extended VC(c) (d) (f) proposed
(2, 3)-threshold
![Page 7: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/7.jpg)
7
Results
![Page 8: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/8.jpg)
8
StackingEDF1 EDF2
watermarkEDF1Lena (gray level)
Error diffusion
Data Hiding in Halftone Images With Noise-Balanced Error DiffusionSoo-Chang Pei, and Jing-Ming GuoIEEE Signal Processing Letters, Vol.10, No.12, December 2003Steganography in halftone images:conjugate error diffusionMing Sun Fu, Oscar C. AuSignal Processing 83 (2003) 2171 – 2178
![Page 9: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/9.jpg)
9Original Lena
NBEDF
Watermark
+Stacking
EDF 1
EDF 2
*
Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone ImagesSoo-Chang Pei ( 貝蘇章 ) and Jing-Ming GuoIEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003, Pages: 867-884.
![Page 10: Halftone Visual Cryptography](https://reader033.fdocuments.in/reader033/viewer/2022061614/5681513e550346895dbf5848/html5/thumbnails/10.jpg)
10
Conclusions and Comments
Applying VC to halftone images
Classify: During process Outside process