系統識別號 | U0002-2906201400462000 |
---|---|
DOI | 10.6846/TKU.2014.01188 |
論文名稱(中文) | 隨機網格式之視覺機密分享通用取存機制 |
論文名稱(英文) | Random Grids based Visual Secret Sharing for General Access Structures |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊管理學系碩士班 |
系所名稱(英文) | Department of Information Management |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 102 |
學期 | 2 |
出版年 | 103 |
研究生(中文) | 詹家威 |
研究生(英文) | Jia-Wei Zhan |
學號 | 601630519 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | |
口試日期 | 2014-06-21 |
論文頁數 | 41頁 |
口試委員 |
指導教授
-
侯永昌
委員 - 張昭憲 委員 - 蕭育如 |
關鍵字(中) |
視覺機密分享 視覺密碼學 漸進式視覺機密分享 半隨機網格 |
關鍵字(英) |
Visual secret sharing Visual cryptography Progressive visual secret sharing Semi-random grid |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
視覺密碼學的研究者一直以來的目標就是降低像素擴展與提升還原影像的品質。近年來提出的通用存取結構(General Access Structures),都是以像素擴展式機密分享的作法為主。Kafri與Keren 所提出的隨機網格,改善了像素擴展的問題。 本研究提出一個將機密影像依通用存取結構編碼為多張分享投影片,透過隨機編碼與控制分配的概念,產生相似於隨機網格的分享投影片,此模型具備漸進式還原效果的方法,我們稱之漸進式半隨機網格視覺機密分享模型(Progressive Semi-Random Grids Visual Secret Sharing Model;PSRD VSS Model),簡稱為PSRD模型。 |
英文摘要 |
The goal of visual cryptography's researchers are reduce the pixel-expansion and enhance the restored image quality. General access structures that proposed in recent years based on pixel-expansion. Kafri and Keren (1987)proposed a random grid, to improve the pixel-expansion problems. This study proposes a general access structures of the secret image is encoded as multiple share transparencies, through the concept of random and control distribution, make the share transparencies that are similar to the random grid and restore with progressive, we call Progressive Semi-Random Grids Visual Secret Sharing Model referred to as PSRD VSS Model. |
第三語言摘要 | |
論文目次 |
目錄 摘要 I Abstract II 第一章 前言 1 第二章 視覺機密分享的製作與相關研究 3 2.1 視覺機密分享 3 2.2 隨機網格(Random Grids) 4 2.3 藏密學技術(Steganography) 8 2.4 通用存取結構(General Access Structures) 10 2.5 漸進式還原之機密分享(Progressive secret sharing) 12 第三章 本研究的分享模型 16 第四章 實作與結果分析 23 4.1 PSRD VSS 的實驗結果 23 4.1.1 實驗一 23 4.1.2 實驗二 27 4.1.3 實驗三 31 4.2 實驗結果分析 35 第五章 結論 38 參考文獻 39 表目錄 表 2-1:Shyu(2007)的分享模型 6 表 2-2:Ateniese et al.(2001)所提出的編碼模型 9 表 2-3:Hou 與 Quan(2011)的非擴展且漸進式之分享模型 14 表 3-1:5個參與者的視覺機密分享矩陣 22 圖目錄 圖 2-1:Chen and Tsao的編碼程序 7 圖 3-1:PSRD VSS 編碼概念圖 19 圖 3-2:PSRD VSS 編碼演算法 20 圖 4-1:實驗影像 23 圖 4-2:以 Heart 為例的PSRD VSS還原結果 26 圖 4-3:以 Recycle 為例的PSRD VSS還原結果 29 圖 4-4:以 TKU 為例的PSRD VSS還原結果 32 |
參考文獻 |
[1] 侯永昌,官振宇,〈有意義且不擴展分享影像之漸進式視覺密碼〉,資訊管理學報,第17卷,第3期,頁131-154,ISSN:1608-5752,2011年。 [2] Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., “Visual cryptography for general access structures,” Information and Computation, 129(2), 86-106, 1996. [3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., Extended Capabilities for Visual Cryptography, Theoretical Computer Science, Vol.250, Issue 1-2 (January 2001), 143-161, 2001. [4] Chen, T. and Tsao, K., “User-friendly random-grid-based visual secret sharing”, IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1693-1703, 2011. [5] Chen, S. K., “Friendly progressive visual secret sharing using generalized random grids,” Optical Engineering, 48(11), 117001-1-117001-7, 2009. [6] Chen, S. K. and Lin, J. C., “Fault-tolerant and progressive transmission of images,” Pattern Recognition, 38(12), 2466-2471, 2005. [7] Chen, T. and Tsao, K., “Threshold visual secret sharing by random grids”, Journal of Systems and Software 84, 1197–1208, 2011 [8] Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656--715, Oct. 1949. [9] Fang, W. P., “Friendly progressive visual secret sharing,” Pattern Recognition, 41(4), 1410-1414, 2008. [10] Fang, W. P. and Lin, J. C., “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, 16(4), 632-636, 2006. [11] Hou, Y. C., “Visual cryptography for color images,” Pattern Recognition, 36(7), 1619-1629, 2003. [12] Hou, Y. C., Chang, C. Y. and Hsu, C. S., “Visual cryptography for color images without pixel expansion,” in Proceeding of CISST'2001, Vol. I, 239-245, 2001. [13] Hung, K. H., Chang, Y. J. and Lin, J. C., “Progressive sharing of an image” Optical Engineering, 47(4),047006-1-047006-14, 2008. [14] Ito, R., Kuwakado, H., and Tanaka, H., “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172-2177, 1999. [15] Kafri, O. and Keren, E., “Encryption of pictures and shapes by random grids,” Optics Letters, 12(6), 377-379, 1987. [16] Lin, T. L., Horng, S. J., Lee, K. H., Chiu, P. L., Kao, T. W., Chen, Y. H., Run, R. S., Lai, J. L., Chen, R. J. “A novel visual secret sharing scheme for multiple secrets without pixel expansion,” Expert Systems with Applications, 37(12), 7858-7869, 2010. [17] M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology — Eurocrypt '94, Lecture Notes in Computer Science, vol.950, Springer, Berlin, pp. 1–12, 1995. [18] Moulin, P. and O’sullivan, J. A., “Information-theoretic analysis of information hiding,” IEEE Transactions on Information Theory, 49(3), 563-593, 2003. [19] Naor, M. and Shamir, A., “Visual cryptography,” Advances in Cryptology- EUROCRYPT ’94, LNCS 950, Springer-Verlag, 1-12, 1995. [20] Shamir, A., “How to share a secret,” Communications of the ACM, 22(11), 612-613, 1979. [21] Shyu, S. J., “Image encryption by random grids,” Pattern Recognition, 40(3), 1014-1031, 2007. [22] Shyu, S. J., “Image encryption by multiple random grids,” Pattern Recognition, 42(7), 1582-1596, 2009. [23] Thien, C. C. and Lin, J. C., “Secret image sharing,” Computers & Graphics, 26(5), 765-770, 2002. [24] Tu, S. F. and Hou, Y. C., “Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images,” Imaging Science Journal, 55(2), 90-101, 2007. [25] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, IT-22, pp. 644–654, 1976. [26] Wang, R. Z., “Region incrementing visual cryptography,” IEEE Signal Processing Letters, 16(8), 659-662, 2009. [27] Wang, R. Z. and Shyu, S. J., “Scalable secret image sharing,” Signal Processing: Image Communication, 22(4), 363-373, 2007. [28] Wang, R. Z., Lee, Y. K., Huang, S. Y., and Chia, T. L. , “Multilevel visual secret sharing,” in Proceeding of ICICIC’07, 283-286, 2007. [29] Wu, D. C. and Tsai, W. H., “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, 24(9-10), 1613-1626, 2003. [30] Yang, C. N. “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, 25(4), 481-494, 2004. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信