§ 瀏覽學位論文書目資料
  
系統識別號 U0002-0708201312420900
DOI 10.6846/TKU.2013.00211
論文名稱(中文) 具音訊秘密分享功能之Android系統設計
論文名稱(英文) Android System Development on Secret Audio Sharing Scheme
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系資訊網路與通訊碩士班
系所名稱(英文) Master's Program in Networking and Communications, Department of Computer Science and Information En
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 101
學期 2
出版年 102
研究生(中文) 黃建螢
研究生(英文) Jian-Ying Huang
學號 600420086
學位類別 碩士
語言別 繁體中文
第二語言別 英文
口試日期 2013-07-22
論文頁數 28頁
口試委員 指導教授 - 陳建彰
委員 - 楊耀輝
委員 - 洪文斌
委員 - 陳建彰
關鍵字(中) Android系統設計
中國餘式定理
音訊秘密分享
關鍵字(英) Android system development
Chinese Remainder Theorem
secret audio sharing
第三語言關鍵字
學科別分類
中文摘要
音訊秘密分享以數學計算的方式進行機密音訊的分享與還原,故而能提供良好的還原品質,甚至以無失真還原的方式出現。音訊秘密分享技術具有(t,n)門檻值(t<=n 且 2<=n)的特性。分享時將機密音訊分享成n把金鑰及與金鑰相對應的分享音訊,n為分享者的數目,且每位分享者僅握有一把金鑰及一份分享音訊,還原時只要取得t把金鑰及與金鑰相對應的分享音訊,經過還原計算後,即可獲得原機密音訊。如此,我們便無須擔心部份金鑰及分享音訊遺失會造成機密音訊無法復原,或是因複製多份機密音訊而降低安全性的問題。本論文採用極具效益的中國餘式定理為分享技術,在Android平台實際開發以達到高效率的音訊秘密分享系統。
英文摘要
This study presents an (s, t, n) progressive method for sharing an audio. In an (s, t, n) progressive audio sharing scheme, n shared audios are generated from the secret audio, gathering s shared audios acquires coarse resolution of secret audio, and using t shared audios can reconstruct the original secret audio losslessly. The Chinese Remainder Theorem is adopted in the proposed scheme to share coefficients acquired from 1-D integer wavelet transform with different thresholds. First, the maximum wavelet level number needed in 1-D integer wavelet transform is determined from thresholds s and t. Then, the proposed scheme applies the secret audio to 1-D integer wavelet transform for acquiring coefficients under different levels. At last, all wavelet coefficients are partitioned to (t-s+1) groups and share each group with different thresholds under inverse wavelet transform. Experimental results demonstrate that the proposed scheme can share secret audios efficiently and progressively.
第三語言摘要
論文目次
目錄
第一章	緒論	1
1.1	研究背景與動機	1
1.2	研究目的與方法	2
1.3	論文架構	3
第二章	相關文獻探討	4
2.1	整數小波轉換技術	4
2.1.1	整數小波轉換公式	5
2.1.2	整數小波轉換音訊分解	5
2.2	中國餘式定理(t,n)分享技術	6
2.2.1	分享階段	6
2.2.2	還原階段	7
2.3	PCM音訊介紹	8
第三章	具音訊秘密分享功能之Android分享技術	9
3.1	(s,t,n)漸進式音訊秘密分享演算法	10
3.2	(s,t,n)漸進式音訊秘密還原演算法	11
3.3	子音訊分區策略	12
第四章	實驗結果與分析比較	14
4.1	實驗結果	15
4.2	分析比較	17
第五章	結論	21
參考文獻	22
附錄-英文論文	24

圖目錄
圖1、一維整數小波轉換圖	4
圖2、單聲道和雙聲道PCM音訊格式	8
圖3、二階小波轉換示意圖	12
圖4、機密音訊作門檻值(2,3,4)秘密分享和還原波形圖	15
圖5、機密音訊作門檻值(3,6,8)秘密分享和還原波形圖	17
圖6、門檻值(2,3,4)還原音訊與機密音訊差值比較	18
圖7、門檻值(3,6,8)還原音訊與機密音訊差值比較	19

表目錄
表1、頻帶訊號分區策略範例	13
表2、Android平台系統規格	14
表3、門檻值(2,3,4)之RMSE	18
表4、門檻值(3,6,8)之RMSE	19
表5、中國餘式定理與Shamir-Lagrange時間複雜度比較	20
參考文獻
[1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol.18, No.4, 2009, 043011.
  
[2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol.38, No.12, 2005, pp.2466-2471.

[3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol.91, No.1, 2011, pp.90-97.

[4] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol.33, No.1, 2012, pp.83-91.

[5] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol.83, No.3, 2010, pp.517-527.

[6] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol.48, No.4, 2008, 047006.

[7] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol.21, No.8, 2010, pp.900-916.

[8] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp.1332-1337.

[9] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol.86, No.2, 2013, pp.485-500.

[10] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol.21, No.7, 2010, pp.751-761.

[11] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol.85, No.8, 2012, pp.1852-1863.

[12] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735.

[13] Patrick J. Van Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011.

[14] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199-210.

[15] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735.

[16] Diqun Yan, Rangding Wang, “Data Hiding for Audio Based on Piecewise Linear Haar Transform”, CKC Software Laboratory, Ningbo University, Ningbo 315211, China.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信