淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2206201215033400
中文論文名稱 基於差值擴張之可逆機密影像分享技術
英文論文名稱 Reversible secret image sharing scheme based on difference expansion
校院名稱 淡江大學
系所名稱(中) 資訊工程學系資訊網路與通訊碩士班
系所名稱(英) Master's Program in Networking and Communications, Department of Computer Science and Information Engineering
學年度 100
學期 2
出版年 101
研究生中文姓名 劉崇安
研究生英文姓名 Chong-An Liu
學號 699420427
學位類別 碩士
語文別 中文
第二語文別 英文
口試日期 2012-06-14
論文頁數 49頁
口試委員 指導教授-陳建彰
委員-謝文恭
委員-洪文斌
委員-陳建彰
中文關鍵字 機密影像分享  差值擴張  偽裝學 
英文關鍵字 secret image sharing  difference expansion  Steganography 
學科別分類 學科別應用科學資訊工程
中文摘要 (t, n)門檻式機密影像分享技術是將機密影像分成n張無意義的分享影像並分配給n位參與者,其中任何超過t位參與者的群組,都能利用他們的分享影像還原機密影像。反之,則不能還原機密影像。同時,為降低分享影像的顯著性,可進一步藉由偽裝學(Steganography)技術,將分享影像藏入有意義的掩護影像中形成一張偽裝影像,來避免攻擊者的注意力與提供管理上的便利性。本文提出結合偽裝學技術的可逆機密影像分享技術,讓參與者在還原過程中,除了可以從偽裝影像中擷取機密影像外,還可以將偽裝影像回復成掩護影像。本文採用m進位下之差值擴張方法配合m進位的機密影像分享技術,可以得到高嵌入量及高影像品質之無失真影像秘密分享技術。實驗結果顯示,本論文所提出的方法,偽裝影像有良好的品質且掩護影像有很高的嵌入量。
英文摘要 Conventional (t, n) secret image sharing scheme shares a secret image to shared images and secret keys. Collecting t shared images corresponding with their secret keys recovers the secret image. However, noise-like shared images always attract attackers attention. Therefore, embedding shared images to meaningful cover images to form stego images can efficiently reduce attackers attention. This paper presents a different-expansion based reversible secret image sharing technique to let participants restore the secret image and cover image in recovering procedure. The proposed scheme can further raise the embedded capacity when the cover image does not need to be perfectly reconstructed. Experimental results show each stego image have good image quality and high embedded capacity.
論文目次 目錄
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的與方法 4
1.3 論文架構 5
第二章 相關文獻探討 7
2.1 機密分享技術 7
2.1.1 Shamir(t, n)門檻機制 7
2.1.2 Thien和Lin所提之方法 8
2.1.3 Lin和Chan所提之方法 9
2.1.3.1 分享與偽裝階段 10
2.1.3.2 還原階段 11
2.2 差值擴張法 12
2.2.1 Tian的方法 12
2.2.2 Yi的方法 15
第三章 基於差值擴張之可逆機密影像分享技術 19
3.1 分享階段 20
3.2 嵌入階段 22
3.3 擷取與還原階段 26
第四章 實驗結果與分析比較 29
4.1 實驗結果 31
4.2 分析比較 35
第五章 結論 39
參考文獻 40
附錄-英文論文 43

圖目錄
圖2.1 分享圖大小比較 9
圖2.2 可逆式資訊隱藏技術 12
圖3.1 分享階段流程圖 20
圖3.2 嵌入方法示意圖 22
圖3.3 嵌入階段流程圖 23
圖3.4 擷取與還原階段流程圖 26
圖4.1 機密影像(256x256) 29
圖4.2 掩護影像(512x512) 30
圖4.3 各種不同類型偽裝影像之品質 33
圖4.4 不同的t之嵌入量比較-1(m=7) 36
圖4.5 不同的t之嵌入量比較-2(m=7) 37
圖4.6 不同的t之嵌入量比較-3(m=7) 38

表目錄
表4.1 不同偽裝影像的品質(m=7) 31
表4.2 不同的m之分享影像大小及PSNR之關係(以Lena圖為例) 32
表4.3 不同m之最大嵌入量與PSNR(以Lena圖為例) 32
表4.4 本方法與其他方法比較 35
參考文獻 [1] C. Blundo, A.D. Santis, and M. Naor, “Visual cryptography for grey level images”, Information Processing Letters, vol. 75, pp. 255–259, 2000.

[2] G.R. Blakley, “Safeguarding cryptographic keys”, American Federation of Information Processing Societies Conf. Proc., vol. 48, pp.313–317, 1979.

[3] C.C. Chang, Y.P. Hsieh and C.H. Lin, “Sharing secrets in stego images with authentication”, Pattern Recognition, vol. 41, pp. 3130–3137, 2008.

[4] C.C. Chen and C.C. Chang, "Secret image sharing using Quadratic Residues", Intelligent Information Hiding and Multimedia Signal Processing, vol. 1, pp. 515–518, 2007.

[5] T.H. Chen and K.H. Tsao, “Visual secret sharing by random grids revisited”. Pattern Recognition, vol. 42, no. 9, pp.2203–2217, 2009.

[6] T.H. Chen, K.H. Tsao and C.S. Wu, “Multi-secret visual secret sharing”, Association of Professional Compliance Consultants, pp.1–5, 2008.

[7] C.C. Lin and W.H. Tsai, “Secret image sharing with steganography and authentication”, The Journal of Systems and Software, vol. 73, pp. 405–414, 2004.

[8] C.L. Liu, D.C. Lou and C.C. Lee, “Reversible Data Embedding Using Reduced Difference Expansion”, IEEE Intelligent Information Hiding and Multimedia Signal Processing, pp.430–436, 2007.

[9] C.C. Lin, and W.H. Tsai, “Visual cryptography for gray-level images by dithering techniques”, Pattern Recognition Letters, vol. 24, pp. 349–358, 2003.

[10] P.Y. Lin, J.S. Lee and C.C. Chang, “Distortion-free secret image sharing mechanism using modulus operator”, Pattern Recognition, vol. 42, pp. 886–895, 2009.

[11] P.Y. Lin and C.S. Chan, “Invertible secret image sharing with steganography”, Pattern Recognition Letters, vol. 31, pp. 1887–1893, 2010.

[12] P. Li, P. Ma and X. Su, “Image secret sharing and hiding with authentication”, Pervasive Computing Signal Processing and Applications, pp. 367–370, 2010.

[13] M. Naor and A. Shamir, “Visual cryptography”, Advance in Cryptology Eurocrypt'94, Lecture Notes in Computer Science, Springer, Berlin, vol. 950, pp. 1–12, 1995.

[14] A. Shamir, ”How to share a secret”, Communications of the ACM, vol. 22, pp. 612–613, 1979.

[15] A. Shamir and M. Naor, “Visual cryptography II: Improving the contrast via the cover base. Security” Comm. Networks, pp. 16–17, 1996.

[16] S.J. Shyu and Y.R. Chen, "Threshhold secret image sharing by Chinese Remainder Theorem", IEEE Asia-pacific Services Computing Conference, pp. 1332–1336, 2008.

[17] C.C. Thien and J.C. Lin, “Secret Image Sharing”, Computers and Graphics, vol. 26, pp. 765–770, 2002.

[18] J. Tian, “Reversible Data Embedding Using a Difference Expansion”, IEEE Transactions Circuits Systems for Video Technology, vol. 13, pp. 890–896, 2003.

[19] D. Wang, L. Zhang, N. Ma and X. Li, “Two secret sharing schemes based on Boolean operations”, Pattern Recognition, vol. 40, no. 10, pp. 2776–2785, 2007.

[20] R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images”, Pattern Recognition Letters, vol. 27, no. 6, pp. 551–555, 2006.

[21] C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, “Improvements of image sharing with Steganography and authentication”, The Journal of Systems and Software, vol. 80, pp. 1070–1076, 2007.

[22] Y. Hu, W. Song and J. Hou, “Improved Reduced Difference Expansion Based Reversible Data Hiding Scheme for Digital Images”, Electronic Measurement & Instruments, pp. 315–318, 2009
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2017-06-28公開。
  • 同意授權瀏覽/列印電子全文服務,於2017-06-28起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信