系統識別號 | U0002-0708201312420900 |
---|---|
DOI | 10.6846/TKU.2013.00211 |
論文名稱(中文) | 具音訊秘密分享功能之Android系統設計 |
論文名稱(英文) | Android System Development on Secret Audio Sharing Scheme |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系資訊網路與通訊碩士班 |
系所名稱(英文) | Master's Program in Networking and Communications, Department of Computer Science and Information En |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 101 |
學期 | 2 |
出版年 | 102 |
研究生(中文) | 黃建螢 |
研究生(英文) | Jian-Ying Huang |
學號 | 600420086 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | 英文 |
口試日期 | 2013-07-22 |
論文頁數 | 28頁 |
口試委員 |
指導教授
-
陳建彰
委員 - 楊耀輝 委員 - 洪文斌 委員 - 陳建彰 |
關鍵字(中) |
Android系統設計 中國餘式定理 音訊秘密分享 |
關鍵字(英) |
Android system development Chinese Remainder Theorem secret audio sharing |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
音訊秘密分享以數學計算的方式進行機密音訊的分享與還原,故而能提供良好的還原品質,甚至以無失真還原的方式出現。音訊秘密分享技術具有(t,n)門檻值(t<=n 且 2<=n)的特性。分享時將機密音訊分享成n把金鑰及與金鑰相對應的分享音訊,n為分享者的數目,且每位分享者僅握有一把金鑰及一份分享音訊,還原時只要取得t把金鑰及與金鑰相對應的分享音訊,經過還原計算後,即可獲得原機密音訊。如此,我們便無須擔心部份金鑰及分享音訊遺失會造成機密音訊無法復原,或是因複製多份機密音訊而降低安全性的問題。本論文採用極具效益的中國餘式定理為分享技術,在Android平台實際開發以達到高效率的音訊秘密分享系統。 |
英文摘要 |
This study presents an (s, t, n) progressive method for sharing an audio. In an (s, t, n) progressive audio sharing scheme, n shared audios are generated from the secret audio, gathering s shared audios acquires coarse resolution of secret audio, and using t shared audios can reconstruct the original secret audio losslessly. The Chinese Remainder Theorem is adopted in the proposed scheme to share coefficients acquired from 1-D integer wavelet transform with different thresholds. First, the maximum wavelet level number needed in 1-D integer wavelet transform is determined from thresholds s and t. Then, the proposed scheme applies the secret audio to 1-D integer wavelet transform for acquiring coefficients under different levels. At last, all wavelet coefficients are partitioned to (t-s+1) groups and share each group with different thresholds under inverse wavelet transform. Experimental results demonstrate that the proposed scheme can share secret audios efficiently and progressively. |
第三語言摘要 | |
論文目次 |
目錄 第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的與方法 2 1.3 論文架構 3 第二章 相關文獻探討 4 2.1 整數小波轉換技術 4 2.1.1 整數小波轉換公式 5 2.1.2 整數小波轉換音訊分解 5 2.2 中國餘式定理(t,n)分享技術 6 2.2.1 分享階段 6 2.2.2 還原階段 7 2.3 PCM音訊介紹 8 第三章 具音訊秘密分享功能之Android分享技術 9 3.1 (s,t,n)漸進式音訊秘密分享演算法 10 3.2 (s,t,n)漸進式音訊秘密還原演算法 11 3.3 子音訊分區策略 12 第四章 實驗結果與分析比較 14 4.1 實驗結果 15 4.2 分析比較 17 第五章 結論 21 參考文獻 22 附錄-英文論文 24 圖目錄 圖1、一維整數小波轉換圖 4 圖2、單聲道和雙聲道PCM音訊格式 8 圖3、二階小波轉換示意圖 12 圖4、機密音訊作門檻值(2,3,4)秘密分享和還原波形圖 15 圖5、機密音訊作門檻值(3,6,8)秘密分享和還原波形圖 17 圖6、門檻值(2,3,4)還原音訊與機密音訊差值比較 18 圖7、門檻值(3,6,8)還原音訊與機密音訊差值比較 19 表目錄 表1、頻帶訊號分區策略範例 13 表2、Android平台系統規格 14 表3、門檻值(2,3,4)之RMSE 18 表4、門檻值(3,6,8)之RMSE 19 表5、中國餘式定理與Shamir-Lagrange時間複雜度比較 20 |
參考文獻 |
[1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol.18, No.4, 2009, 043011. [2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol.38, No.12, 2005, pp.2466-2471. [3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol.91, No.1, 2011, pp.90-97. [4] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol.33, No.1, 2012, pp.83-91. [5] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol.83, No.3, 2010, pp.517-527. [6] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol.48, No.4, 2008, 047006. [7] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol.21, No.8, 2010, pp.900-916. [8] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp.1332-1337. [9] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol.86, No.2, 2013, pp.485-500. [10] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol.21, No.7, 2010, pp.751-761. [11] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol.85, No.8, 2012, pp.1852-1863. [12] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735. [13] Patrick J. Van Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011. [14] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199-210. [15] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits”, Optics Communications, Vol.285, No.7, 2012, pp.1725-1735. [16] Diqun Yan, Rangding Wang, “Data Hiding for Audio Based on Piecewise Linear Haar Transform”, CKC Software Laboratory, Ningbo University, Ningbo 315211, China. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信