淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-0708201312420900
中文論文名稱 具音訊秘密分享功能之Android系統設計
英文論文名稱 Android System Development on Secret Audio Sharing Scheme
校院名稱 淡江大學
系所名稱(中) 資訊工程學系資訊網路與通訊碩士班
系所名稱(英) Master's Program in Networking and Communications, Department of Computer Science and Information Engineering
學年度 101
學期 2
出版年 102
研究生中文姓名 黃建螢
研究生英文姓名 Jian-Ying Huang
學號 600420086
學位類別 碩士
語文別 中文
第二語文別 英文
口試日期 2013-07-22
論文頁數 28頁
口試委員 指導教授-陳建彰
委員-楊耀輝
委員-洪文斌
委員-陳建彰
中文關鍵字 Android系統設計  中國餘式定理  音訊秘密分享 
英文關鍵字 Android system development  Chinese Remainder Theorem  secret audio sharing 
學科別分類 學科別應用科學資訊工程
中文摘要 音訊秘密分享以數學計算的方式進行機密音訊的分享與還原,故而能提供良好的還原品質,甚至以無失真還原的方式出現。音訊秘密分享技術具有(t,n)門檻值(t<=n 且 2<=n)的特性。分享時將機密音訊分享成n把金鑰及與金鑰相對應的分享音訊,n為分享者的數目,且每位分享者僅握有一把金鑰及一份分享音訊,還原時只要取得t把金鑰及與金鑰相對應的分享音訊,經過還原計算後,即可獲得原機密音訊。如此,我們便無須擔心部份金鑰及分享音訊遺失會造成機密音訊無法復原,或是因複製多份機密音訊而降低安全性的問題。本論文採用極具效益的中國餘式定理為分享技術,在Android平台實際開發以達到高效率的音訊秘密分享系統。
英文摘要 This study presents an (s, t, n) progressive method for sharing an audio. In an (s, t, n) progressive audio sharing scheme, n shared audios are generated from the secret audio, gathering s shared audios acquires coarse resolution of secret audio, and using t shared audios can reconstruct the original secret audio losslessly. The Chinese Remainder Theorem is adopted in the proposed scheme to share coefficients acquired from 1-D integer wavelet transform with different thresholds. First, the maximum wavelet level number needed in 1-D integer wavelet transform is determined from thresholds s and t. Then, the proposed scheme applies the secret audio to 1-D integer wavelet transform for acquiring coefficients under different levels. At last, all wavelet coefficients are partitioned to (t-s+1) groups and share each group with different thresholds under inverse wavelet transform. Experimental results demonstrate that the proposed scheme can share secret audios efficiently and progressively.
論文目次 目錄
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的與方法 2
1.3 論文架構 3
第二章 相關文獻探討 4
2.1 整數小波轉換技術 4
2.1.1 整數小波轉換公式 5
2.1.2 整數小波轉換音訊分解 5
2.2 中國餘式定理(t,n)分享技術 6
2.2.1 分享階段 6
2.2.2 還原階段 7
2.3 PCM音訊介紹 8
第三章 具音訊秘密分享功能之Android分享技術 9
3.1 (s,t,n)漸進式音訊秘密分享演算法 10
3.2 (s,t,n)漸進式音訊秘密還原演算法 11
3.3 子音訊分區策略 12
第四章 實驗結果與分析比較 14
4.1 實驗結果 15
4.2 分析比較 17
第五章 結論 21
參考文獻 22
附錄-英文論文 24

圖目錄
圖1、一維整數小波轉換圖 4
圖2、單聲道和雙聲道PCM音訊格式 8
圖3、二階小波轉換示意圖 12
圖4、機密音訊作門檻值(2,3,4)秘密分享和還原波形圖 15
圖5、機密音訊作門檻值(3,6,8)秘密分享和還原波形圖 17
圖6、門檻值(2,3,4)還原音訊與機密音訊差值比較 18
圖7、門檻值(3,6,8)還原音訊與機密音訊差值比較 19

表目錄
表1、頻帶訊號分區策略範例 13
表2、Android平台系統規格 14
表3、門檻值(2,3,4)之RMSE 18
表4、門檻值(3,6,8)之RMSE 19
表5、中國餘式定理與Shamir-Lagrange時間複雜度比較 20
參考文獻 [1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol.18, No.4, 2009, 043011.

[2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol.38, No.12, 2005, pp.2466-2471.

[3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol.91, No.1, 2011, pp.90-97.

[4] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol.33, No.1, 2012, pp.83-91.

[5] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol.83, No.3, 2010, pp.517-527.

[6] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol.48, No.4, 2008, 047006.

[7] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol.21, No.8, 2010, pp.900-916.

[8] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp.1332-1337.

[9] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol.86, No.2, 2013, pp.485-500.

[10] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol.21, No.7, 2010, pp.751-761.

[11] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol.85, No.8, 2012, pp.1852-1863.

[12] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735.

[13] Patrick J. Van Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011.

[14] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199-210.

[15] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735.

[16] Diqun Yan, Rangding Wang, “Data Hiding for Audio Based on Piecewise Linear Haar Transform”, CKC Software Laboratory, Ningbo University, Ningbo 315211, China.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2013-10-18公開。
  • 同意授權瀏覽/列印電子全文服務,於2013-10-18起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信