§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2906201400462000
DOI 10.6846/TKU.2014.01188
論文名稱(中文) 隨機網格式之視覺機密分享通用取存機制
論文名稱(英文) Random Grids based Visual Secret Sharing for General Access Structures
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊管理學系碩士班
系所名稱(英文) Department of Information Management
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 102
學期 2
出版年 103
研究生(中文) 詹家威
研究生(英文) Jia-Wei Zhan
學號 601630519
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2014-06-21
論文頁數 41頁
口試委員 指導教授 - 侯永昌
委員 - 張昭憲
委員 - 蕭育如
關鍵字(中) 視覺機密分享
視覺密碼學
漸進式視覺機密分享
半隨機網格
關鍵字(英) Visual secret sharing
Visual cryptography
Progressive visual secret sharing
Semi-random grid
第三語言關鍵字
學科別分類
中文摘要
視覺密碼學的研究者一直以來的目標就是降低像素擴展與提升還原影像的品質。近年來提出的通用存取結構(General Access Structures),都是以像素擴展式機密分享的作法為主。Kafri與Keren 所提出的隨機網格,改善了像素擴展的問題。
本研究提出一個將機密影像依通用存取結構編碼為多張分享投影片,透過隨機編碼與控制分配的概念,產生相似於隨機網格的分享投影片,此模型具備漸進式還原效果的方法,我們稱之漸進式半隨機網格視覺機密分享模型(Progressive Semi-Random Grids Visual Secret Sharing Model;PSRD VSS Model),簡稱為PSRD模型。
英文摘要
The goal of visual cryptography's researchers are reduce the pixel-expansion and enhance the restored image quality. General access structures that proposed in recent years based on pixel-expansion. Kafri and Keren (1987)proposed a random grid, to improve the pixel-expansion problems.
This study proposes a general access structures of the secret image is encoded as multiple share transparencies, through the concept of random and control distribution, make the share transparencies that are similar to the random grid and restore with progressive, we call Progressive Semi-Random Grids Visual Secret Sharing Model referred to as PSRD VSS Model.
第三語言摘要
論文目次
目錄
摘要	I
Abstract	II
第一章 前言	1
第二章 視覺機密分享的製作與相關研究	3
2.1	視覺機密分享	3
2.2	隨機網格(Random Grids)	4
2.3	藏密學技術(Steganography)	8
2.4	通用存取結構(General Access Structures)	10
2.5	漸進式還原之機密分享(Progressive secret sharing)	12
第三章 本研究的分享模型	16
第四章 實作與結果分析	23
4.1	PSRD VSS 的實驗結果	23
4.1.1	實驗一	23
4.1.2	實驗二	27
4.1.3	實驗三	31
4.2	實驗結果分析	35
第五章 結論	38
參考文獻	39

 
表目錄
表 2-1:Shyu(2007)的分享模型	6
表 2-2:Ateniese et al.(2001)所提出的編碼模型	9
表 2-3:Hou 與 Quan(2011)的非擴展且漸進式之分享模型	14
表 3-1:5個參與者的視覺機密分享矩陣	22

圖目錄
圖 2-1:Chen and Tsao的編碼程序	7
圖 3-1:PSRD VSS 編碼概念圖	19
圖 3-2:PSRD VSS 編碼演算法	20
圖 4-1:實驗影像	23
圖 4-2:以 Heart 為例的PSRD VSS還原結果	26
圖 4-3:以 Recycle 為例的PSRD VSS還原結果	29
圖 4-4:以 TKU 為例的PSRD VSS還原結果	32
參考文獻
[1]	侯永昌,官振宇,〈有意義且不擴展分享影像之漸進式視覺密碼〉,資訊管理學報,第17卷,第3期,頁131-154,ISSN:1608-5752,2011年。
[2]	Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R., “Visual cryptography for general access structures,” Information and Computation, 129(2), 86-106, 1996.
[3]	Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., Extended Capabilities for Visual Cryptography, Theoretical Computer Science, Vol.250, Issue 1-2 (January 2001), 143-161, 2001.
[4]	Chen, T. and Tsao, K., “User-friendly random-grid-based visual secret sharing”, IEEE Transactions on Circuits and Systems for Video Technology, 21(11), 1693-1703, 2011.
[5]	Chen, S. K., “Friendly progressive visual secret sharing using generalized random grids,” Optical Engineering, 48(11), 117001-1-117001-7, 2009.
[6]	Chen, S. K. and Lin, J. C., “Fault-tolerant and progressive transmission of images,” Pattern Recognition, 38(12), 2466-2471, 2005.
[7]	Chen, T. and Tsao, K., “Threshold visual secret sharing by random grids”, Journal of Systems and Software 84, 1197–1208, 2011
[8]	Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656--715, Oct. 1949.
[9]	Fang, W. P., “Friendly progressive visual secret sharing,” Pattern Recognition, 41(4), 1410-1414, 2008.
[10]	Fang, W. P. and Lin, J. C., “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, 16(4), 632-636, 2006.
[11]	Hou, Y. C., “Visual cryptography for color images,” Pattern Recognition, 36(7), 1619-1629, 2003.
[12]	Hou, Y. C., Chang, C. Y. and Hsu, C. S., “Visual cryptography for color images without pixel expansion,” in Proceeding of CISST'2001, Vol. I, 239-245, 2001.
[13]	Hung, K. H., Chang, Y. J. and Lin, J. C., “Progressive sharing of an image” Optical Engineering, 47(4),047006-1-047006-14, 2008.
[14]	Ito, R., Kuwakado, H., and Tanaka, H., “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A(10), 2172-2177, 1999.
[15]	Kafri, O. and Keren, E., “Encryption of pictures and shapes by random grids,” Optics Letters, 12(6), 377-379, 1987.
[16]	Lin, T. L., Horng, S. J., Lee, K. H., Chiu, P. L., Kao, T. W., Chen, Y. H., Run, R. S., Lai, J. L., Chen, R. J. “A novel visual secret sharing scheme for multiple secrets without pixel expansion,” Expert Systems with Applications, 37(12), 7858-7869, 2010.
[17]	M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology — Eurocrypt '94, Lecture Notes in Computer Science, vol.950, Springer, Berlin, pp. 1–12, 1995.
[18]	Moulin, P. and O’sullivan, J. A., “Information-theoretic analysis of information hiding,” IEEE Transactions on Information Theory, 49(3), 563-593, 2003.
[19]	Naor, M. and Shamir, A., “Visual cryptography,” Advances in Cryptology- EUROCRYPT ’94, LNCS 950, Springer-Verlag, 1-12, 1995.
[20]	Shamir, A., “How to share a secret,” Communications of the ACM, 22(11), 612-613, 1979.
[21]	Shyu, S. J., “Image encryption by random grids,” Pattern Recognition, 40(3), 1014-1031, 2007.
[22]	Shyu, S. J., “Image encryption by multiple random grids,” Pattern Recognition, 42(7), 1582-1596, 2009.
[23]	Thien, C. C. and Lin, J. C., “Secret image sharing,” Computers & Graphics, 26(5), 765-770, 2002.
[24]	Tu, S. F. and Hou, Y. C., “Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images,” Imaging Science Journal, 55(2), 90-101, 2007.
[25]	W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, IT-22, pp. 644–654, 1976.
[26]	Wang, R. Z., “Region incrementing visual cryptography,” IEEE Signal Processing Letters, 16(8), 659-662, 2009.
[27]	Wang, R. Z. and Shyu, S. J., “Scalable secret image sharing,” Signal Processing: Image Communication, 22(4), 363-373, 2007. 
[28]	Wang, R. Z., Lee, Y. K., Huang, S. Y., and Chia, T. L. , “Multilevel visual secret sharing,” in Proceeding of ICICIC’07, 283-286, 2007.
[29]	Wu, D. C. and Tsai, W. H., “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, 24(9-10), 1613-1626, 2003.
[30]	Yang, C. N. “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, 25(4), 481-494, 2004.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信