§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2409202019195200
DOI 10.6846/TKU.2020.00714
論文名稱(中文) 以布林函數為基礎之漸進式影像秘密分享技術研究
論文名稱(英文) Research on Boolean-Based Progressive Secret Image Sharing Technology
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士在職專班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 108
學期 2
出版年 109
研究生(中文) 陳育誠
研究生(英文) Yu-Cheng Chen
學號 706410114
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2020-07-11
論文頁數 45頁
口試委員 指導教授 - 陳建彰
委員 - 林其誼
委員 - 楊權輝
關鍵字(中) 多重影像秘密分享
布林函數
漸進還原
關鍵字(英) Multi-image secret sharing
Boolean-Based
Progressive Recovery
第三語言關鍵字
學科別分類
中文摘要
影像秘密分享技術是一種共同保護秘密影像的策略,將要保護的秘密影像經過運算處理後成為無法窺伺出原圖的分享影像。其中在以布林函數為基礎的方法中,(n, n)是最為常見的分享方式,此方法為將要分享的秘密影像加密並分享給n個參與者,若要還原回秘密影像則需要n位參與者皆參與的秘密影像分享方法,但以此為門檻的方法發展至今卻仍然無法做到漸進式影像秘密分享的實踐。
本論文提出以(n, n)為基礎之漸進式分享與還原,不需要蒐集滿所有的分享影像即可進行還原動作。以兩個門檻為例,在(n, n)門檻值下分享n張秘密影像,透過本文所提出的演算法產生2n張分享影像,還原時若蒐集n張分享影像即可依序還原出秘密影像的高位元資訊,若要還原完整影像則必須蒐集所有分享影像後才能將秘密影像依序還原。
英文摘要
Image secret sharing technology is a strategy for jointly protecting secret images. The secret images are protected by sharing shared images among participants, and gathering enough shared images can recover secret images. Therefore, the (n, n) secret image sharing method shares n secret images among n participants, and gathering n shared images can perfectly recover the n secret images. 
The (n, n) secret image sharing problem can solve by conventional Boolean calculation easily. However, none of them deals with progressive recovery. This study proposes a Boolean-based (n, n) progressive secret image sharing method, with the property of gathering some shared images recovering part of secret images information. The proposed two-threshold structure can share n secret images to 2n shared images, and gathering first n shared images can recover rough information of these secret images. Moreover, gathering all 2n shared images can perfectly recover all secret images. Furthermore, the proposed structure can extend to different thresholds. Experimental results show that the proposed structure can share n secret images to tn shared images with t different progressive recovering steps under limited processing time.
第三語言摘要
論文目次
目錄	IV
圖目錄	VI
表目錄	VII
第一章 緒論	1
1.1 研究背景與動機	1
1.2 論文架構	4
第二章 相關研究	5
2.1 基於布林函數之多重影像秘密分享技術	5
2.2 Chen和Wu的方法[6]	7
2.3 Chen和Wu的方法[7]	9
2.4 Chen等學者的方法[19]	11
第三章 本論文提出方法	14
3.1 分享流程	14
3.2 還原流程	17
3.3 探討本文提出之方法	20
第四章 實驗結果及比較	24
4.1 實驗結果	24
4.2 比較與討論	28
第五章 結論	30
參考文獻	31
附錄	34
圖 2.1 Barbara和亂數影像進行XOR運算後結果	6
圖 2.2相同影像進行XOR運算後結果	6
圖 2.3 Barbara和全黑影像進行XOR運算後結果	7
圖 2.4 經過XOR運算結果	9
圖 3.1分享流程示意圖	16
圖 3.2還原流程示意圖	19
圖 3.3 高位元影像位元標記示意圖	21
圖 3.4 未重排之高位元分割影像示意圖	21
圖 3.5 低位元影像位元標記示意圖	21
圖 3.6 未重排之低位元分割影像示意圖	22
圖 4.1分享四張秘密影像結果	25
圖 4.2本方法的分享影像及分享影像進行XOR運算後結果	26
圖 4.3本方法的高位元影像及3位元的高位元影像	27
表 4.1多重秘密影像分享方法比較表	29
參考文獻
[1]A. Shamir, “How to share a secret,” Communication of the ACM, vol. 22, 612–613, 1979.
[2]M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology, Eurpocrypt’94, vol. 950, 1–12, 1995.
[3]C.C. Thien and J.C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, 765–770, 2002.
[4]C.C. Chen and Y.W. Chien, “Sharing numerous images secretly with reduced possessing load,” Fundamenta Informatiace, vol. 86, pp.447–458, 2008.
[5]T.H. Chen and C.S. Wu, “Efficient multi-secret image sharing based on Boolean operations,” Signal Processing, vol. 91, pp.90–97, 2011.
[6]C.C. Chen and W.J. Wu, “A secure Boolean-based multi-secret image sharing scheme,” The Journal of Systems and Software, vol. 92, pp.107-114, 2014.
[7]J. Chen, Y.S. Chen, Hsu, H.C. and H.W. Chen, “New visual cryptography system based on circular shadow image and fixed angle segmentation,” Journal of Electronic Imaging, vol. 14, pp.033018-1–033018-5, 2005.
[8]S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang and K. Chen, “Sharing multiple secrets in visual cryptography,” Pattern Recognition, vol. 40, pp.3633–3651, 2007.
[9]S.J. Lin, S.K. Chen and J.C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion,” Journal of Visual Communication and Image Representation, vol. 21, pp.900–916, 2010.
[10]D. Wang, L. Zhang, N. Ma and X. Li, “Two secret sharing schemes based on Boolean operations,” Pattern Recognition, vol. 40, pp.2776–2785, 2007.
[11]C.C. Chen and W.F. Fu, “A Geometry-Based Secret Image Sharing Approach,” Journal of Information Science and Engineering, vol. 24, 1567–1577, 2008.
[12]B.C. Dhara and B. Chanda, “A fast progressive image transmission scheme using block truncation coding by pattern fitting,” J. Vis. Commun. Image R. , vol. 23, 313–322, 2012.
[13]W.P. Fang and W.P., “Friendly progressive visual secret sharing,” Pattern Recognition , vol. 41, 1410-1414, 2008.
[14]C.P. Huang, C.H. Hsieh and P.S. Huang, “Progressive sharing for a secret image,” Journal of Systems and Software , vol. 83, 517–527, 2010.
[15]S.J. Lin and J.C. Lin, “VCPSS: A two-in-one two-decoding-options image sharingmethod combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,” Pattern Recognition, vol. 40, 3652–3666, 2007.
[16]M. Ulutas, G. Ulutas and V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images,” The Journal of Systems and Software, vol. 86, 485–500, 2013.
[17]R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, 551–555, 2006.
[18]X. Wu, D. Ou, Q. Liang and W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata,” The Journal of Systems and Software, vol. 85, 1852–1863, 2012.
[19]C. C. Chen, W. J. Wu, J. L. Chen, “Highly Efficient and Secure Multi-Secret Image Sharing Scheme,” Multimedia Tools and Applications, vol. 75, pp.7113–7128, 2016
[20]O. B. Chanu and A. Neelima, “A survey paper on secret image sharing schemes,” International Journal of Multimedia Information Retrieval,vol. 8, 195–215 (2019). 
[21]T. Bhattacharjee, S. P. Maity, and S. R. Islam, “Hierarchical secret image sharing scheme in compressed sensing,” Signal Processing: Image Communication, vol. 61, 21–32 (2018).
[22]O. B. Chanu and A. Neelima, “A new multi-secret image sharing scheme based on dct,” The Visual Computer , 1–12 (2019).
[23]S. Kabirirad and Z. Eslami, “Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations,” Journal of Information Security and Applications, vol. 47, 16–27 (2019).
[24]G. R. Blakley et al., “Safeguarding cryptographic keys,” Proceedings of the national computer conference, vol. 48, 313–317 (1979).
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信