visual cryptography for color images.ppt
DESCRIPTION
visual cryptographyTRANSCRIPT
![Page 1: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/1.jpg)
1
Visual cryptography for color images
Source: Pattern Recognition,Volume:36, Issue: 7, July, 2003, pp. 1619-1629 Author: Young-Chang Hou Speaker: Wei-Liang Tai Date: 2003/5/15
![Page 2: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/2.jpg)
2
Outline Review the basic theorems of visual
cryptography Visual cryptography for color image
Method 1 Method 2 Method 3
Conclusion
![Page 3: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/3.jpg)
3
Basic theorem of visual cryptography
halftone
![Page 4: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/4.jpg)
4
Basic theorem of visual cryptography ( 一 )
![Page 5: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/5.jpg)
5
Visual Cryptography for color image
![Page 6: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/6.jpg)
6
Method 1
![Page 7: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/7.jpg)
7
Method 1 (cont.)
![Page 8: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/8.jpg)
8
Method 2
![Page 9: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/9.jpg)
9
Method 2 (cont.)
![Page 10: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/10.jpg)
10
Method 3
![Page 11: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/11.jpg)
11
Method 3 (cont.)
![Page 12: Visual cryptography for color images.ppt](https://reader033.vdocument.in/reader033/viewer/2022061113/545fcc9bb1af9feb588b4eec/html5/thumbnails/12.jpg)
12
Conclusion
No computation required
Exploit the techniques of halftone technology and color decomposition to construct three method.