Welcome To The Seminar Titled: Visual Cryptography
Welcome To The Seminar Titled: Visual Cryptography
SEMINAR TITLED
VISUAL CRYPTOGRAPHY
Presented by:
SHAHID MANZOOR ZARGAR
SEMINAR OVERVIEW
INTRODUCTION
VISUAL CRYPTOGRAPHY
SECRET SHARING SCHEME
VISUAL CRYPTOGRAPHY FOR BINARY IMAGES
VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES
VISUAL CYPTOGRAPHY FOR COLOR IMAGES
IMPLEMENTATION
ADVANTAGES
DISADVANTAGES
APPLICATION
INTRODUCTION
Cryptography is the science and art of transforming
messages to make them secure and immune to attack.
Process of Cryptography
It is the practice and study of techniques for secure communication in the presence of
third parties (called adversaries).
Visual cryptography
Visual cryptography (VC) was introduced by Moni Naor and Adi Shamir at EUROCRYPT (1994).
Used to encrypt written text/ pictures etc in a perfectly secure way.
Decoding is done by human visual system, without any computation.
Encryption involves creating “shares” of the image which in a sense will be a piece of the image.
Give of the shares to the respective holders.
Decryption – involving bringing together an appropriate combination and the human visual
system.
Secret sharing scheme in Visual
Cryptography
Share1
Share2
Encryption Decryption
2 out of 2 scheme(2 subpixels)
Black and white image: each pixel divided in 2 sub-pixels
Randomly choose between black and white.
If white, then randomly choose one of the two rows for white.
2 out of 2 Scheme (2 subpixels)
If black, then randomly choose between one of the two rows for
black.
2 out of 2 Scheme (4 subpixels)
Combined Combined
Pattern1 Pattern2 Pattern1 Pattern2
Result Result
visual cryptography for color images
Advantages
Disadvantages
Language: C#
Watermarking
Steganography
Fig: A twenty euro bank note held against the light to show watermark.
Example of steganography
Example of internet voting system