SlideShare a Scribd company logo
VISUAL
CRYPTOGRAPHY
Dr. Qaim Mehdi
Department of Computer Science
What is Cryptography?
 Cryptography is the science of information security.
 The main objective of cryptography is information hiding.
What is Cryptography?
 Cryptography is the science of information security.
 The main objective of cryptography is information hiding.
History of Cryptography-1: Hieroglyphics
Cryptography probably began in or around 2000 BC in Egypt, where
hieroglyphics were used to decorate the tombs of deceased rulers and
kings.
COMPUTER SCIENCE
COMPUTER SCIENCE
History of Cryptography-2: Wax Tablet
A wax tablet is a tablet made of wood and covered with a layer of wax. It
was used as a reusable and portable writing surface in the 1400 BC.
History of Cryptography-3: Caesar Cipher
The first known use of a modern cipher was introduced by Julius Caesar
(100 BC to 44 BC), who did not trust his messengers when
communicating with his governors.
Failure is success if we learn from it.
Idloxuh lv vxffhvv li zh ohcuq iurp lw.
Visual Cryptography
It is a new type of cryptographic scheme, which can decode concealed
images without any cryptographic computations. The scheme is perfectly
secure and very easy to implement.
Visual Cryptography
It is a new type of cryptographic scheme, which can decode concealed
images without any cryptographic computations. The scheme is perfectly
secure and very easy to implement.
Adi Shamir is a cryptographer and co-inventor of the famous RSA
algorithm.
Moni Naor is a computer scientist and also famous for his Turing Test
on verification of a human in the loop.
Pixel
Pixel is the smallest addressable element in a picture element.
Grayscale-level
Grayscale Level is the brightness value assigned to a pixel; values range
from black, through gray, to white.
Qualified Participants
A qualified set of participants is a subset of Ρ whose shares visually reveal
the 'secret' image when stacked together.
Qualified Participant Qualified Participant
Forbidden Participant
Qualified Participants
A forbidden set of participants is a subset of Ρ whose shares reveal
absolutely no information about the 'secret' image when stacked
together.
Forbidden Participant Qualified Participant
Qualified Participant
Visual Cryptography: The Objective
Encrypting written material (printed text, handwritten notes, pictures,
etc.) in a perfectly secure way which can be decoded directly by the
human visual system.
Visual Cryptography: The Approach
 The message consists of a collection of black and white pixels and each
pixel is handled separately.
 Each original pixel appears in n modified versions (called shares), one
for each transparency.
Visual Cryptography: The Approach
 The message consists of a collection of black and white pixels and each
pixel is handled separately.
 Each original pixel appears in n modified versions (called shares), one
for each transparency.
Horizontal Share Vertical Share Diagonal Share
Visual Cryptography: The Process
Continue…
Original Pixel
Share 1
Share 2
Overlaid
Visual Cryptography: The Process
Original Pixel
Share 1
Share 2
Overlaid
1 0
0
1
0
1
0
1
0
11
1
0
Continue…
Illustration of Visual Cryptography
Pixel (0)
Pixel (1)
Illustration of Visual Cryptography
m sub-pixels
m sub-pixels
n shares
pixel
or
or
Example. n = 2, m = 4
Continue…
Illustration of Visual Cryptography
horizontal
shares
vertical
shares
diagonal
shares
Secret
Message
Continue…
Illustration of Visual Cryptography
horizontal
shares
vertical
shares
diagonal
shares
Continue…
Concluding Remarks
Concluding Remarks
Future Scope
 We can improve result by removing digital noise(gray-shades).
 With some minor changes, we can implement visual cryptography on
color images.
References
 M. Naor and A. Shamir, Visual cryptography, in "Advances in Cryptology { EUROCRYPT '94", A. De Santis, ed., Lecture
Notes in Computer Science 950 (1995), 1-12.
 G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information
and Computation 129 (1996), 86-106.
 C. Blundo, A. Giorgia Gaggia and D. R. Stinson, On the dealer's randomness required in secret sharing schemes,
Designs, Codes and Cryptography 11 (1997), 107-122.
 W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, technical report
TR001001, Florida State University (2000).
 Nakajima, M. and Yamaguchi, Y., Extended Visual Cryptography for Natural Images, WSCG02 (2002), 303.
 D Chaum, Secret-ballot receipts: True voter-veriable elections, IEEE Security and Privacy (2004), 38-47.
 A.Klein, M. Wessler, Extended Visual Crypotography Schemes, Science Direct (2007), 716-732.
 A. Bonis and A.Santis, Randomness in secret sharing and visual cryptography schemes, Theoretical Comp. Sci. 314
(2004), 351-374.
Thanks
Queries

More Related Content

PPTX
Visual Cryptography
PPTX
Visual Cryptography
PPTX
Visual CryptoGraphy
PPT
Visual cryptography1
PPT
Visual Cryptography
PPTX
Public Key Cryptosystem
PPTX
One Time Pad Encryption Technique
PDF
Deep Learning for Computer Vision: Object Detection (UPC 2016)
Visual Cryptography
Visual Cryptography
Visual CryptoGraphy
Visual cryptography1
Visual Cryptography
Public Key Cryptosystem
One Time Pad Encryption Technique
Deep Learning for Computer Vision: Object Detection (UPC 2016)

What's hot (20)

PPTX
Homomorphic Encryption
PDF
U-Net: Convolutional Networks for Biomedical Image Segmentation
PDF
PDF
PPTX
Visible surface identification
PPTX
Object Detection using Deep Neural Networks
PPTX
Elliptic Curve Cryptography
PDF
Elliptic Curve Cryptography
PPT
image compresson
PPTX
Cryptography
PPT
Image Steganography
PDF
Computer vision lane line detection
PDF
Computer vision and Open CV
PPT
Cipher techniques
PPT
3 d geometric transformations
PPT
Circle drawing algo.
PPTX
Probabilistic Relational Models for Link Prediction Problem
PDF
Deep Learning - Convolutional Neural Networks
PDF
MobileNet V3
PPTX
raycasting. ppt
Homomorphic Encryption
U-Net: Convolutional Networks for Biomedical Image Segmentation
Visible surface identification
Object Detection using Deep Neural Networks
Elliptic Curve Cryptography
Elliptic Curve Cryptography
image compresson
Cryptography
Image Steganography
Computer vision lane line detection
Computer vision and Open CV
Cipher techniques
3 d geometric transformations
Circle drawing algo.
Probabilistic Relational Models for Link Prediction Problem
Deep Learning - Convolutional Neural Networks
MobileNet V3
raycasting. ppt
Ad

Similar to Visual Cryptography (20)

PDF
"Randomized Visual Cryptography scheme for color images”
PDF
J017335863
PDF
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
PDF
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
PPTX
CSE steganography for data writing and reading
PPTX
STEGANOGRAPHY Seminar (1).pptx
PDF
digital stega slides
PDF
Jz3118501853
PDF
V01 i010411
PDF
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
PDF
Image Cryptography using Nearest Prime Pixels
PDF
A comparatively study on visual cryptography
PDF
Hi3612991303
PPTX
steganography-252-uzLRCSm.pptx
PPTX
Visual cryptography
PPT
Stegnography
PPTX
Computer network
PDF
A comparatively study on visual cryptography
PDF
Ijetr011937
"Randomized Visual Cryptography scheme for color images”
J017335863
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
CSE steganography for data writing and reading
STEGANOGRAPHY Seminar (1).pptx
digital stega slides
Jz3118501853
V01 i010411
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Image Cryptography using Nearest Prime Pixels
A comparatively study on visual cryptography
Hi3612991303
steganography-252-uzLRCSm.pptx
Visual cryptography
Stegnography
Computer network
A comparatively study on visual cryptography
Ijetr011937
Ad

Recently uploaded (20)

PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
Leprosy and NLEP programme community medicine
PPTX
Managing Community Partner Relationships
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PPTX
importance of Data-Visualization-in-Data-Science. for mba studnts
PDF
Introduction to Data Science and Data Analysis
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
annual-report-2024-2025 original latest.
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
Microsoft Core Cloud Services powerpoint
DOCX
Factor Analysis Word Document Presentation
PPTX
A Complete Guide to Streamlining Business Processes
PDF
How to run a consulting project- client discovery
PPT
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
PDF
Introduction to the R Programming Language
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
CYBER SECURITY the Next Warefare Tactics
Leprosy and NLEP programme community medicine
Managing Community Partner Relationships
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
importance of Data-Visualization-in-Data-Science. for mba studnts
Introduction to Data Science and Data Analysis
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
annual-report-2024-2025 original latest.
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
ISS -ESG Data flows What is ESG and HowHow
STERILIZATION AND DISINFECTION-1.ppthhhbx
Microsoft Core Cloud Services powerpoint
Factor Analysis Word Document Presentation
A Complete Guide to Streamlining Business Processes
How to run a consulting project- client discovery
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
Introduction to the R Programming Language
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
retention in jsjsksksksnbsndjddjdnFPD.pptx
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...

Visual Cryptography

  • 2. What is Cryptography?  Cryptography is the science of information security.  The main objective of cryptography is information hiding.
  • 3. What is Cryptography?  Cryptography is the science of information security.  The main objective of cryptography is information hiding.
  • 4. History of Cryptography-1: Hieroglyphics Cryptography probably began in or around 2000 BC in Egypt, where hieroglyphics were used to decorate the tombs of deceased rulers and kings. COMPUTER SCIENCE COMPUTER SCIENCE
  • 5. History of Cryptography-2: Wax Tablet A wax tablet is a tablet made of wood and covered with a layer of wax. It was used as a reusable and portable writing surface in the 1400 BC.
  • 6. History of Cryptography-3: Caesar Cipher The first known use of a modern cipher was introduced by Julius Caesar (100 BC to 44 BC), who did not trust his messengers when communicating with his governors. Failure is success if we learn from it. Idloxuh lv vxffhvv li zh ohcuq iurp lw.
  • 7. Visual Cryptography It is a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement.
  • 8. Visual Cryptography It is a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. Adi Shamir is a cryptographer and co-inventor of the famous RSA algorithm. Moni Naor is a computer scientist and also famous for his Turing Test on verification of a human in the loop.
  • 9. Pixel Pixel is the smallest addressable element in a picture element.
  • 10. Grayscale-level Grayscale Level is the brightness value assigned to a pixel; values range from black, through gray, to white.
  • 11. Qualified Participants A qualified set of participants is a subset of Ρ whose shares visually reveal the 'secret' image when stacked together. Qualified Participant Qualified Participant Forbidden Participant
  • 12. Qualified Participants A forbidden set of participants is a subset of Ρ whose shares reveal absolutely no information about the 'secret' image when stacked together. Forbidden Participant Qualified Participant Qualified Participant
  • 13. Visual Cryptography: The Objective Encrypting written material (printed text, handwritten notes, pictures, etc.) in a perfectly secure way which can be decoded directly by the human visual system.
  • 14. Visual Cryptography: The Approach  The message consists of a collection of black and white pixels and each pixel is handled separately.  Each original pixel appears in n modified versions (called shares), one for each transparency.
  • 15. Visual Cryptography: The Approach  The message consists of a collection of black and white pixels and each pixel is handled separately.  Each original pixel appears in n modified versions (called shares), one for each transparency. Horizontal Share Vertical Share Diagonal Share
  • 16. Visual Cryptography: The Process Continue… Original Pixel Share 1 Share 2 Overlaid
  • 17. Visual Cryptography: The Process Original Pixel Share 1 Share 2 Overlaid 1 0 0 1 0 1 0 1 0 11 1 0 Continue…
  • 18. Illustration of Visual Cryptography Pixel (0) Pixel (1)
  • 19. Illustration of Visual Cryptography m sub-pixels m sub-pixels n shares pixel or or Example. n = 2, m = 4 Continue…
  • 20. Illustration of Visual Cryptography horizontal shares vertical shares diagonal shares Secret Message Continue…
  • 21. Illustration of Visual Cryptography horizontal shares vertical shares diagonal shares Continue…
  • 24. Future Scope  We can improve result by removing digital noise(gray-shades).  With some minor changes, we can implement visual cryptography on color images.
  • 25. References  M. Naor and A. Shamir, Visual cryptography, in "Advances in Cryptology { EUROCRYPT '94", A. De Santis, ed., Lecture Notes in Computer Science 950 (1995), 1-12.  G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information and Computation 129 (1996), 86-106.  C. Blundo, A. Giorgia Gaggia and D. R. Stinson, On the dealer's randomness required in secret sharing schemes, Designs, Codes and Cryptography 11 (1997), 107-122.  W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, technical report TR001001, Florida State University (2000).  Nakajima, M. and Yamaguchi, Y., Extended Visual Cryptography for Natural Images, WSCG02 (2002), 303.  D Chaum, Secret-ballot receipts: True voter-veriable elections, IEEE Security and Privacy (2004), 38-47.  A.Klein, M. Wessler, Extended Visual Crypotography Schemes, Science Direct (2007), 716-732.  A. Bonis and A.Santis, Randomness in secret sharing and visual cryptography schemes, Theoretical Comp. Sci. 314 (2004), 351-374.