Cryptography Reference
In-Depth Information
hide a secret image. Let T =T 1 ,T 2 ,,T 2 k be the set of 2 k sub-regions,
where T i is the i-th sub-region. The total number of sub-regions in the gray-
scale image is 2 k
which means we have 2 k
secret images in the gray-scale
image.
In the second step, the gray-scale image is represented by eight bit planes.
Let P =P 1 ,P 2 ,,P 8 be a set of eight bit planes of the image. Here
P j
=T 1 ,T 2 ,,T 2 k
is the j-th plane, which consists of several sub-regions.
(a) encryption process
(b) decryption process
Fig. 4.5. Diagram of the proposed scheme.
The third step is to generate shadows for each binary plane P j .Theshadow
generation process for P j is shown in Fig. 4.6. The scheme splits each bit of
the sub-region into several blocks by using Naor and Shamirs encryption
function.
The encryption function maps each bit of T i into a block of size 22from
C 0 or C 1 to different shadows. If the color of the input bit is white, then the
blocks are randomly chosen from C 0 . Otherwise, the color of the input bit is
Search WWH ::




Custom Search