Visual Cryptography.4003826.Powerpoint
Visual Cryptography.4003826.Powerpoint
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO VISUAL CRYPTOGRAPHY
OVERVIEW OF VISUAL CRYPTOGRAPHY
TYPES OF VISUAL CRYPTOGRAPHY
ADVANTAGES
DISADVANTAGES
APPLICATIONS
CONCLUSION
REFERENCES
INTRODUCTION
What is Cryptography ?
Share2
Encryption Decryption
GENERAL K OUT OF K SCHEME
Matrix size = k x 2k-1
S0 : handles the white pixels
All 2k-1 columns have an even number of 1’s
tX = min((V1(M)))
Here, the pixel expansion is m=2. For any matrix M C0, the row
vector V0= OR (r1,r2) satisfies (V0) =1. For any M C1, the row
vector V1= OR (r1,r2) satisfies (V1) =2.
The threshold is given by:
tX = min((V1(M))) = 2
FIG 1
A pixel P is split into two sub pixels in each of the two
shares.
• If P is white, then a coin toss is used to randomly
choose one of the first two rows in the figure above.
• If P is black, then a coin toss is used to randomly
choose one of the last two rows in the figure above.
Then the pixel P is encrypted as two sub pixels in each
of the two shares, as determined by the chosen row in the
figure. Every pixel is encrypted using a new coin toss.
Now let's consider what happens when we superimpose
the two shares.
• If P is black, then we get two black sub pixels when we
superimpose the two shares;
If P is white, then we get one black sub pixel and one white
sub pixel when we superimpose the two shares.
Thus, we can say that the reconstructed pixel (consisting of
two sub pixels) has a grey level of 1 if P is black, and a grey
level of 1/2 if P is white. There will be a 50% loss of contrast
in the reconstructed image, but it is still visible.
Interesting, right?
This is just a sneak preview of the full presentation. We hope you like it!
To see the rest of it, just click here to view it in full on PowerShow.com.
Then, if you’d like, you can also log in to PowerShow.com to download
the entire presentation for free.