cheating prevention in visual cryptography

21
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指指指指 指指指 指指指 指指指 Cheating Prevention in Visual Cryptography 1

Upload: corine

Post on 18-Jan-2016

76 views

Category:

Documents


0 download

DESCRIPTION

Cheating Prevention in Visual Cryptography. IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真. Outline. Introduction Cheating in VC Three cheating methods Generic transformation for cheating prevention. Conclusion. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cheating Prevention  in Visual Cryptography

IEEE TRANSACTIONS ON IMAGE PROCESSING,2007指導老師:李南逸報告者:黃資真

Cheating Prevention in Visual Cryptography

1

Page 2: Cheating Prevention  in Visual Cryptography

OutlineIntroductionCheating in VCThree cheating methodsGeneric transformation for cheating

prevention.Conclusion

2

Page 3: Cheating Prevention  in Visual Cryptography

IntroductionPropose three cheating methods against VC

or EVC schemes.Propose some necessary criteria for a VCS

to be secure against cheat-preventing.Propose a generic method that converts

any VCS to another VCS with the property cheating prevention.

3

Page 4: Cheating Prevention  in Visual Cryptography

Set of n participants

A qualified set

A forbidden set

m m subpixels of a pixel

0 White pixel

1 black pixel

4

Page 5: Cheating Prevention  in Visual Cryptography

Cheating in VC Two types of cheaters:• Malicious participant(MP)• Malicious outsider(MO)

A cheating process against a VCS:Fake share construction.Image reconstruction phase.

5

Page 6: Cheating Prevention  in Visual Cryptography

Cheating in VC

6

Page 7: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MPAssume that is the cheater.Uses his genuine share as a template to

construct a set of fake share.Fake share are indistinguishable from its

genuine share.

7

Page 8: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MP

Input: .(Assume that the cheater is ) Fake Share construction phase: Assume: (1) Each pixel of has x black and y white subpixels.

(2) chooses a fake image and prepares r= (m/x)-1 fake shares.

1) For each white pixel of the fake image, copy the corresponding subpixels of the pixel in to each fake share.

2) For each black pixel of the fake image, randomly assign x black and y white subpixels to each fake share.

Image reconstruction phase (the fake image): If ,the stacking of genuine shares and fake shares reveal the

fake image.

8

Page 9: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MP

9

Page 10: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MOMO can cheat even without any genuine

share at hand.Use the optimal (2,2)-VCS to construct the

fake shares for the fake image.

10

Page 11: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MO

Input : none.Fake share construction phase:The MO chooses a fake image.1)Encode the fake image into two fake shares

with the optimal (2,2)-VCS.2)Generate enough pairs of fake shares with

various sizes and subpixel distributions, 1≦i ≦r for some r.

Image reconstruction phase (the fake image):

Let . The stacking of and two fake shares shows the fake image for some c, 1≦c≦r.

11

Page 12: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a VCS by an MO

12

Page 13: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a EVCS by an MPUse the fake shares to reduce the contrast

between the share images and the background.

The fake image in the stacking of fake shares has enough contrast against the background since the fake image is recovered in perfect blackness.

13

Page 14: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a EVCS by an MP be the threshold for contrast that human eyes distinguish the

image from the background.

14

Page 15: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a EVCS by an MPInput: .(Assume that the cheater is ) Fake Share construction phase: Assume: chooses a fake image

1) Create . The share image of is removed by changing d black subpixels into white subpixels in each black pixel. d is the difference between the numbers of black subpixels of a black and a white pixel.

2) Create temporary fake shares ,1≦i ≦r, by using according to CA-1.

3) Randomly change d white subpixels into black subpixels of each pixel of the share image in , 1≦i ≦r.

4) Construct by randomly adding black subpixels to each pixel in ,1≦i ≦r.

Image reconstruction phase (the fake image): Same as in CA-1

'1S

1m

rx

'iFS '

1S

'iFS

iFS m'iFS

15

Page 16: Cheating Prevention  in Visual Cryptography

Three cheating methods- Cheating a EVCS by an MP

1 2 3 1 2 2 3 1 2 3

( , )

{ , , }, {{ , },{ , },{ , , }}

a m EVCS

P P P P Q P P P P P P P

16

Page 17: Cheating Prevention  in Visual Cryptography

Generic transformation for cheating preventionAn cheat-preventing method should have

the following properties:1) It does not rely on the help of an on-line TA.2) The increase to pixel expansion should be as small

as possible.3) Each participant verifies the shares of other

participants.4) The verification image of each participant is

different and confidential.5) The contrast of the secret image in the stacking of

shares is not reduced significantly.6) A cheat-preventing method should be applicable to

any VCS.17

Page 18: Cheating Prevention  in Visual Cryptography

Generic transformation for cheating preventionInput:Shares construction phase:

1. Let

2. Use as basis matrices for generation share ,1≦i ≦n, of

3. ,1≦i ≦n, choose a verification image and generate a verification share as follows:

a) For each white pixel in the verification image, put the pixel of (m+2)-dimensional[100…0] (subpixels) to .

b) For each black pixel in the verification image, put the pixel of (m+2)-dimensional[0100…0] (subpixels) to .

0 1 ( , ) .S and S of a m VCS

0 0 1 1

10 10

. .

. .

10 10

T S and T S

0 1 T and T

iS ( , 2) .of m VCS

iPiV

iV

iV18

Page 19: Cheating Prevention  in Visual Cryptography

Generic transformation for cheating prevention

Share verification phase:Before stacking their share, checks whether

shows his verification image, where is another participant.

iP, i jV S i j

jP

19

Page 20: Cheating Prevention  in Visual Cryptography

Generic transformation for cheating prevention

1 2 3 1 2 2 3 1 2 3

1 2 3

( , 2)

{ , , }, {{ , },{ , },{ , , }}

: , ,

a m VCS with cheating prevention

P P P P Q P P P P P P P

Verification image P A P B P C

20

Page 21: Cheating Prevention  in Visual Cryptography

ConclusionProposed three cheating methods against

VCS and EVCS.

Proposed an efficient transformation of VCS for cheating prevention.

21