淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2906201400462000
中文論文名稱 隨機網格式之視覺機密分享通用取存機制
英文論文名稱 Random Grids based Visual Secret Sharing for General Access Structures
校院名稱 淡江大學
系所名稱(中) 資訊管理學系碩士班
系所名稱(英) Department of Information Management
學年度 102
學期 2
出版年 103
研究生中文姓名 詹家威
研究生英文姓名 Jia-Wei Zhan
學號 601630519
學位類別 碩士
語文別 中文
口試日期 2014-06-21
論文頁數 41頁
口試委員 指導教授-侯永昌
委員-張昭憲
委員-蕭育如
中文關鍵字 視覺機密分享  視覺密碼學  漸進式視覺機密分享  半隨機網格 
英文關鍵字 Visual secret sharing  Visual cryptography  Progressive visual secret sharing  Semi-random grid 
學科別分類
中文摘要 視覺密碼學的研究者一直以來的目標就是降低像素擴展與提升還原影像的品質。近年來提出的通用存取結構(General Access Structures),都是以像素擴展式機密分享的作法為主。Kafri與Keren 所提出的隨機網格,改善了像素擴展的問題。
本研究提出一個將機密影像依通用存取結構編碼為多張分享投影片,透過隨機編碼與控制分配的概念,產生相似於隨機網格的分享投影片,此模型具備漸進式還原效果的方法,我們稱之漸進式半隨機網格視覺機密分享模型(Progressive Semi-Random Grids Visual Secret Sharing Model;PSRD VSS Model),簡稱為PSRD模型。
英文摘要 The goal of visual cryptography's researchers are reduce the pixel-expansion and enhance the restored image quality. General access structures that proposed in recent years based on pixel-expansion. Kafri and Keren (1987)proposed a random grid, to improve the pixel-expansion problems.
This study proposes a general access structures of the secret image is encoded as multiple share transparencies, through the concept of random and control distribution, make the share transparencies that are similar to the random grid and restore with progressive, we call Progressive Semi-Random Grids Visual Secret Sharing Model referred to as PSRD VSS Model.
論文目次 目錄
摘要 I
Abstract II
第一章 前言 1
第二章 視覺機密分享的製作與相關研究 3
2.1 視覺機密分享 3
2.2 隨機網格(Random Grids) 4
2.3 藏密學技術(Steganography) 8
2.4 通用存取結構(General Access Structures) 10
2.5 漸進式還原之機密分享(Progressive secret sharing) 12
第三章 本研究的分享模型 16
第四章 實作與結果分析 23
4.1 PSRD VSS 的實驗結果 23
4.1.1 實驗一 23
4.1.2 實驗二 27
4.1.3 實驗三 31
4.2 實驗結果分析 35
第五章 結論 38
參考文獻 39


表目錄
表 2-1:Shyu(2007)的分享模型 6
表 2-2:Ateniese et al.(2001)所提出的編碼模型 9
表 2-3:Hou 與 Quan(2011)的非擴展且漸進式之分享模型 14
表 3-1:5個參與者的視覺機密分享矩陣 22

圖目錄
圖 2-1:Chen and Tsao的編碼程序 7
圖 3-1:PSRD VSS 編碼概念圖 19
圖 3-2:PSRD VSS 編碼演算法 20
圖 4-1:實驗影像 23
圖 4-2:以 Heart 為例的PSRD VSS還原結果 26
圖 4-3:以 Recycle 為例的PSRD VSS還原結果 29
圖 4-4:以 TKU 為例的PSRD VSS還原結果 32
參考文獻 [1] 侯永昌,官振宇,〈有意義且不擴展分享影像之漸進式視覺密碼〉,資訊管理學報,第17卷,第3期,頁131-154,ISSN:1608-5752,2011年。
[2] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., “Visual cryptography for general access structures,” Information and Computation, 129(2), 86-106, 1996.
[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., Extended Capabilities for Visual Cryptography, Theoretical Computer Science, Vol.250, Issue 1-2 (January 2001), 143-161, 2001.
[4] Chen, T. and Tsao, K., “User-friendly random-grid-based visual secret sharing”, IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1693-1703, 2011.
[5] Chen, S. K., “Friendly progressive visual secret sharing using generalized random grids,” Optical Engineering, 48(11), 117001-1-117001-7, 2009.
[6] Chen, S. K. and Lin, J. C., “Fault-tolerant and progressive transmission of images,” Pattern Recognition, 38(12), 2466-2471, 2005.
[7] Chen, T. and Tsao, K., “Threshold visual secret sharing by random grids”, Journal of Systems and Software 84, 1197–1208, 2011
[8] Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656--715, Oct. 1949.
[9] Fang, W. P., “Friendly progressive visual secret sharing,” Pattern Recognition, 41(4), 1410-1414, 2008.
[10] Fang, W. P. and Lin, J. C., “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, 16(4), 632-636, 2006.
[11] Hou, Y. C., “Visual cryptography for color images,” Pattern Recognition, 36(7), 1619-1629, 2003.
[12] Hou, Y. C., Chang, C. Y. and Hsu, C. S., “Visual cryptography for color images without pixel expansion,” in Proceeding of CISST'2001, Vol. I, 239-245, 2001.
[13] Hung, K. H., Chang, Y. J. and Lin, J. C., “Progressive sharing of an image” Optical Engineering, 47(4),047006-1-047006-14, 2008.
[14] Ito, R., Kuwakado, H., and Tanaka, H., “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172-2177, 1999.
[15] Kafri, O. and Keren, E., “Encryption of pictures and shapes by random grids,” Optics Letters, 12(6), 377-379, 1987.
[16] Lin, T. L., Horng, S. J., Lee, K. H., Chiu, P. L., Kao, T. W., Chen, Y. H., Run, R. S., Lai, J. L., Chen, R. J. “A novel visual secret sharing scheme for multiple secrets without pixel expansion,” Expert Systems with Applications, 37(12), 7858-7869, 2010.
[17] M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology — Eurocrypt '94, Lecture Notes in Computer Science, vol.950, Springer, Berlin, pp. 1–12, 1995.
[18] Moulin, P. and O’sullivan, J. A., “Information-theoretic analysis of information hiding,” IEEE Transactions on Information Theory, 49(3), 563-593, 2003.
[19] Naor, M. and Shamir, A., “Visual cryptography,” Advances in Cryptology- EUROCRYPT ’94, LNCS 950, Springer-Verlag, 1-12, 1995.
[20] Shamir, A., “How to share a secret,” Communications of the ACM, 22(11), 612-613, 1979.
[21] Shyu, S. J., “Image encryption by random grids,” Pattern Recognition, 40(3), 1014-1031, 2007.
[22] Shyu, S. J., “Image encryption by multiple random grids,” Pattern Recognition, 42(7), 1582-1596, 2009.
[23] Thien, C. C. and Lin, J. C., “Secret image sharing,” Computers & Graphics, 26(5), 765-770, 2002.
[24] Tu, S. F. and Hou, Y. C., “Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images,” Imaging Science Journal, 55(2), 90-101, 2007.
[25] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, IT-22, pp. 644–654, 1976.
[26] Wang, R. Z., “Region incrementing visual cryptography,” IEEE Signal Processing Letters, 16(8), 659-662, 2009.
[27] Wang, R. Z. and Shyu, S. J., “Scalable secret image sharing,” Signal Processing: Image Communication, 22(4), 363-373, 2007.
[28] Wang, R. Z., Lee, Y. K., Huang, S. Y., and Chia, T. L. , “Multilevel visual secret sharing,” in Proceeding of ICICIC’07, 283-286, 2007.
[29] Wu, D. C. and Tsai, W. H., “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, 24(9-10), 1613-1626, 2003.
[30] Yang, C. N. “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, 25(4), 481-494, 2004.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2014-06-30公開。
  • 同意授權瀏覽/列印電子全文服務,於2014-06-30起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信