淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-3007201321084700
中文論文名稱 具漸進功能之Android影像秘密分享系統設計
英文論文名稱 Android System Development on Progressive Secret Image Sharing Scheme
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 101
學期 2
出版年 102
研究生中文姓名 劉昱辰
研究生英文姓名 Yu-Chen Liu
電子信箱 vic701025@gmail.com
學號 600410202
學位類別 碩士
語文別 中文
第二語文別 英文
口試日期 2013-07-22
論文頁數 38頁
口試委員 指導教授-陳建彰
委員-楊權輝
委員-洪文斌
委員-陳建彰
中文關鍵字 (s, t, n)秘密影像分享技術  漸進式  中國餘式定理 
英文關鍵字 (s, t, n) secret image sharing method  progressive  Chinese Remainder Theorem 
學科別分類 學科別應用科學資訊工程
中文摘要 本文提出了一個(s, t, n)漸進式影像秘密分享系統,傳統的(t, n)影像秘密分享技術(t=>n且2<=n)在分享時將秘密影像分享成n把金鑰及與金鑰相對應的分享影像。每位分享者僅握有一把金鑰及一張分享影像,還原時只要取得t把金鑰及與金鑰相對應的分享影像經由計算後,即可回復無失真的原秘密影像。本方法採用中國餘式定理分享並由整數小波轉換來滿足漸進式特性的影像。首先,本文先將影像做整數小波轉換後,再對轉換後的各子影像進行分組,然後在各組子影像賦予分享門檻s到t,藉由這些門檻值的不同來建立具有漸進式功能的秘密影像分享系統。實驗結果顯示,基於中國餘式定理和整數小波轉換在Android平台上實際開發的影像秘密分享系統,有著極高效率的影像秘密分享與漸進特性。
英文摘要 This study presents an (s, t, n) progressive method for sharing a secret image. In which n shared images are generated from the secret image, collecting s shared images acquires coarse resolution of secret image, and collecting t or more shared images losslessly recovers the secret image. The proposed method employs the Chinese Remainder Theorem to share subimages acquired from integer wavelet transform with different thresholds for satisfying the progressive property. First, the proposed scheme applies the secret image to integer wavelet subimages. The maximum subimage number needed in wavelet transform is obtained from threshold s and t. Then, all subimages are partitioned to (t-s+1) groups and share each group with different thresholds to reconstruct the secret image progressively. Experimental results demonstrate that the proposed scheme based on Chinese Remainder Theorem preserves efficiency and progressive properties.
論文目次 目錄
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的與方法 2
1.3 論文架構 3
第二章 相關文獻探討 4
2.1 中國餘式定理(t, n)分享技術 4
2.1.1 影像秘密分享演算法 4
2.1.2 影像還原演算法 5
2.2 Haar整數小波轉換技術 7
2.2.1 Haar整數小波轉換公式 8
2.2.2 Haar整數小波轉換影像分解 9
第三章 (s, t, n)漸進式秘密影像分享技術 11
3.1 分享階段 12
3.2 還原階段 14
3.3 子影像分區階段 15
第四章 實驗結果與分析比較 17
4.1 實驗結果 18
4.2 分析比較 25
第五章 結論 28
參考文獻 29
附錄-英文論文 32

圖目錄
圖2.1 Shyu及Chen門檻值(3,4)之影像秘密分享實驗結果 6
圖2.2二維小波轉換細節圖 8
圖2.3灰階Lena(512x512)二維Haar小波轉 9
圖2.4灰階Airplan(512x512)二維Haar小波轉 10
圖3.1 Lmax = 3的3階小波轉換示意圖 15
圖4.1影像灰階Lena(512x512)及4個金鑰圖和收集2-3張還原影像 18
圖4.2影像灰階Airplan(512x512)及4個金鑰圖和收集2-3張還原影像 19
圖4.3影像彩色鋼鐵人(512x512)及4個金鑰圖和收集2-3張還原影像 20
圖4.4影像彩色Candy(512x512)及4個金鑰圖和收集2-3張還原影像 21
圖4.5 Android介面彩色Candy(512x512) (s, t, n)=(2,4,6)還原影像 23
圖4.6 Android介面彩色Lena(512x512) (s, t, n)=(3,7,10)還原影像 24

表目錄
表3.1 Example:子影像圖分區策略 16
表4.1 Android平台系統規格 17
表4.2不同的分享技術及漸進式方法比較 26
表4.3中國餘式定理與Shamir-Lagrange時間複雜度比較 27
參考文獻 [1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol. 18, No.4, 2009, 043011.

[2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol. 38, No. 12, 2005, pp. 2466–2471.

[3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol. 91, No. 1, 2011, pp. 90–97.

[4] W. P. Fang, “Friendly progressive visual secret sharing”, Pattern Recognition, Vol. 41, No. 4, 2008, pp. 1410–1414.

[5] P. J. V. Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011.

[6] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol. 33, No. 1, 2012, pp. 83–91.

[7] Y. C. Hou, Z. Y. Quan, C. F. Tsai, A. Y. Tseng, “Block-based progressive visual secret sharing”, Information Sciences, Vol. 233, No. 1, 2013, pp.290–304.

[8] Y. C. Hou and Z. Y. Quan “Progressive Visual Cryptography with Unexpanded Shares”, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 21, No. 11, 2011, pp.1760–1764.

[9] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 517–527.

[10] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol. 48, No. 4, 2008, 047006.

[11] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol. 21, No. 8, 2010, pp. 900–916.

[12] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199–210

[13] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp. 1332–1337.

[14] C. C. Thien and J. C. Lin, “Secret image sharing”, Computers & Graphics, Vol. 26, No. 5, 2002, pp. 765–770.

[15] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol. 86, No. 2, 2013, pp. 485–500.

[16] D. Wang, L. Zhang, N. Ma, X. Li, “Two secret sharing schemes based on Boolean operations”, Pattern Recognition, Vol. 40, No. 10, 2007, pp. 2776–2785.

[17] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol. 21, No. 7, 2010, pp. 751–761.

[18] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol. 85, No. 8, 2012, pp. 1852–1863.

[19] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, Vol. 285, No. 7, 2012, pp. 1725–1735.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2013-08-26公開。
  • 同意授權瀏覽/列印電子全文服務,於2013-08-26起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信