Visual Cryptography
Visual Cryptography
SHASHIKIRAN B. S
OVERVIEW
INTRODUCTION
ARCHITECTURE
IMPLEMENTATION
ADVANTAGES
ISSUES
APPLICATIONS
EXTENSIONS
CONCLUSION
REFERENCES
INTRODUCTION
What is Cryptography ?
Encryption
Key Encrypted
Decryption
Secret Image ( plain text )
Share1
Stacking the
share
reveals the
secret
Share2
IMPLEMENTATION
2 out of 2 Scheme (2 subpixels)
Original Pixel
share1
s1= s0=
share2
overlaid Image
2 out of 2 Scheme (2 subpixels)
Example:
2 out of 2 Scheme (2 subpixels)
+
2 OUT OF 2 SCHEME (4
SUBPIXELS)
Two-level plaintext image (black/white)
Each pixel encoded as
a 2x2 cell
in two shares (key and cipher)
Each share has 2 black, 2 transparent subpixels
When stacked, shares combine to
Solid black
Half black (seen as gray)
2 OUT OF 2 SCHEME (4
SUBPIXELS)
Choose random cell in key (6 choices)
pixel
0 1 2 3 4 5 0 1 2 3 4 5
share1
share2
stack
4 0
1 5
random
EXAMPLE :
ADVANTAGES
Simple to implement
Encryption don’t required any NP-Hard problem
dependency
Decryption algorithm not required (Use a human
Visual System). So a person unknown to
cryptography can decrypt the message.
We can send cipher text through FAX or E-MAIL
Infinite Computation Power can’t predict the
message.
ISSUES
http://www-sec.uni-regensburg.de/vc/
file:///D:/seminar/visual.html