跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.108) 您好!臺灣時間:2025/09/02 18:59
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:廖育偉
研究生(外文):Yu-Wei Liao
論文名稱:像素不擴展之視覺秘密分享技術
論文名稱(外文):Visual Secret Sharing Techniques without Pixel Expansion
指導教授:莊潤洲莊潤洲引用關係詹啟祥
指導教授(外文):Jun-Chou ChuangChi-Shiang Chan
學位類別:碩士
校院名稱:亞洲大學
系所名稱:資訊科學與應用學系碩士班
學門:電算機學門
學類:電算機應用學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
中文關鍵詞:視覺秘密分享半色調技術視覺密碼
外文關鍵詞:visual secret sharinghalftonevisual cryptography
相關次數:
  • 被引用被引用:0
  • 點閱點閱:216
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:0
不同於傳統密碼學,視覺秘密分享技術不需要透過複雜的演算法,而是直接利用人類視覺感官來進行解密。大多數的視覺秘密分享技術會先對機密影像的像素進行擴展,而後將擴展的機密影像分解成數張黑白偽裝影像,所分解出的偽裝影像皆為雜亂無章,且為不具任何意義的影像。
本碩士論文裡,我們提出兩種分享方法,針對像素擴展與無意義的偽裝影像來提出改善,第一是像素不擴展之灰階視覺秘密分享技術,我們先調整機密影像色階範圍值,再配合半色調影像技術將調整過之灰階影像轉換成黑白二元圖,而後對於某些區塊黑點個數進行調整,使所有區塊的黑點個數,介於固定範圍內。最後將調整過後之二元圖以不擴展方式分解成兩張不具任何意義偽裝影像。第二是像素不擴展以產生多張有意義偽裝影像,首先將機密影像與多張偽裝影像,透過影像色階的調整,調整至不同的色階範圍。而後,運用半色調技術,將機密影像與偽裝影像轉換成黑白二元圖。針對轉換過的半色調影像,調整每個區塊中黑點與白點個數。最後,根據半色調機密影像,來調整替換半色調偽裝影像之黑點與白點位置,讓所有半色調偽裝影像疊合之後,能顯示出半色調機密影像。
由我們的實驗結果顯示,在實驗中我們知道一般人並無法從任意一張偽裝影像中觀察出機密二元圖的相關資訊,同時我們的方法可達到一定的安全水準。另外最重要的是偽裝影像疊合之後的機密影像品質都相當良好。
Unlike traditional cryptography, visual secret sharing technology decodes a ciphertext by using human’s eyes. The traditional visual secret sharing technology must go through pixel expansion and decomposition to produce some meaningless images.
In this thesis, we propose two kinds of visual secret sharing method. The first method is proposed to overcome the drawback of pixel expansion. Applying the first method, the second method goes further to produce meaningful images. For the first method, Visual Secret Sharing Techniques for Gray-level Image without Pixel Expansion, we adjust the range of the pixel value, and then a halftoning technique is performed to obtain the secret halftone image. After that, the numbers of black pixels in some blocks shall be adjusted so that those numbers are in a fixed range. Finally, we decompose the secret halftone image into two meaningless images. For the second method, Visual Secret Sharing Techniques for Multiple Counterfeit Images, we adjust different ranges of pixel values for the secret image and counterfeit images. Then, the halftoning technique is performed to obtain the secret halftone image and counterfeit halftone images. For each halftone image, we modify the number of black pixels in a block to a pre-determined range. Finally, according to the secret halftone image, we arrange the positions of black pixels in counterfeit halftone images so that the secret halftone image can be revealed after stacking all counterfeit halftone images.
According to our experimental results, no information can be revealed through observing any camouflaged image. Besides, we can obtain the secret image with high quality after overlapping camouflaged images.
中文摘要 i
Abstract ii
致謝 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章、 緒論 1
1.1 研究動機 1
1.2 研究目的 4
1.3 論文架構 5
第二章、 相關文獻探討 6
2.1 視覺密碼技術 6
2.2 視覺密碼基本原理 7
2.3 像素擴展型視覺秘密分享技術相關研究 9
2.3.1 彩色型像素擴展分享技術 9
2.3.2 灰階型有意義圖像擴展分享技術 12
2.4 像素不擴展型視覺秘密分享相關研究 14
2.4.1 Ito等人提出的像素不擴展方法 14
2.4.2 Yang等人提出的像素不擴展方法 15
2.5 機密影像分享技術 17
2.6 半色調影像技術(Halftone) 20
第三章、 像素不擴展之灰階視覺秘密分享技術 21
3.1 研究方法與分析 21
3.2 灰階影像轉換半色調 22
3.3 機密二元圖分解動作 23
3.4 實驗結果 26
3.5 實驗結果分析 30
第四章、 像素不擴展以產生多張具有意義偽裝影像 31
4.1 研究方法與分析 31
4.2 灰階影像轉換半色調 32
4.2.1 機密影像調整 32
4.2.2 偽裝影像調整 33
4.3 偽裝影像疊合 33
4.4 偽裝圖像素的重新排列 35
4.5 實驗結果 39
4.6 實驗結果分析 42
第五章、 結論 43
5.1 研究貢獻與未來研究方向 43
參考文獻 44
個人履歷 47
[1]“DES Encryption Standard (DES),” National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, Apr. 1997.
[2]R. L Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communication of ACM, Feb. 1978, pp. 120-126.
[3]張真誠、黃國峰、陳同孝,電子影像技術。台北: 旗標,民國92年。
[4]張真誠、黃國峰、陳同孝,數位影像處理技術。台北: 旗標,民國93年。
[5]王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室,資訊與網路安全-秘密通訊與數位鑑識新技法。台北: 博碩文化,民國95年。
[6]F. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding: A Survey,” Proceedings of the IEEE: special issue on Protection of Multimedia Content, Vol. 87, 1999, pp. 1062-1078.
[7]M. Naor and A. Shamir, “Visual Cryptography,” Eurocrypt94, Lecture Notes in Computer Science, Springer-Verlag, Perugia, Italy, 1994, pp. 1-12.
[8]C. N. Yang and C. S. Laih, “New Colored Visual Secret Sharing Schemes, ” Designs, Codes and Cryptography, Vol. 20, 2000, pp. 325-335.
[9]C. Blundo, A. De Santis, and M. Naor, “Visual Cryptography for Grey Level Images,” Information Processing Letters, Vol. 75, 2000, pp. 255-259.
[10]C. Blundo, A. De Bonis, and A. De Santis, “Improved Schemes for Visual Cryptography,” Designs, Codes and Cryptography, Vol. 24, No. 3, 2001, pp. 255-278.
[11]C. C. Lin and W. H. Tsai, “Visual Cryptography for Gray-level Images by Dithering Techniques,” Pattern Recognition Letters, Vol. 24, No. 1-3, 2003, pp. 349-358.
[12]G. Ateniese, C. Blundo, A. Santis, and D. R. Stinson, “Visual Cryptography for General Access Structures,” Information and Computation, Vol. 129, 1996, pp. 86-106.
[13]G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Extended Capabilities for Visual Cryptography,” Theoretical Computer Science, Vol. 250, No. 1-2, 2001, pp. 143-161.
[14]P. A. Eisen and D. R. Stinson, “Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels,” Designs, Codes and Cryptography, Vol. 25, No. 1, 2002, pp. 15-61.
[15]S. Droste, “New Results on Visual Cryptography”, Advances in Cryptology-CRYPTO ’96, LNCS 1109, Springer-Verlag, 1996, pp. 401-415.
[16]W. P. Fang, “Friendly Progressive Visual Secret Sharing,” Pattern Recognition, Vol. 41, No. 4, 2008, pp. 1410-1414.
[17]W. G. Tzeng and C. M. Hu, “A New Approach for Visual Cryptography,” Designs, Codes and Cryptography, Vol. 27, 2002, pp. 207-227.
[18]C. C. Chang and R. J. Hwang, “A Simple Picture Hiding Scheme,” Computer Processing of Oriental Languages, Vol. 12, No. 2, 1998, pp. 237-247.
[19]C. N. Yang, Y. H. Liang, and W. H. Chou, “New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel”, National Computer Symposium on Information security, 2001, pp. F074-F085.
[20]C. N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, No. 4, 2004, pp. 481-494.
[21]D. Wang, L. Zhang, N. Ma, and X. Li, “Two Secret Sharing Schemes Based on Boolean Operations,” Pattern Recognition, Vol. 40, No. 10, 2007, pp. 2776-2785.
[22]R. Ito, H. Kuwakado, and H. Tanaka, “Image Size Invariant Visual Cryptography,” IEICE Trans. Fundamentals, Vol. E82-A, No.10, 1999.
[23]V. Rijmen and B. Preneel, “Efficient Colour Visual Encryption for Shared Colors of Benetton”, Eurocrypto’96, Rump Session, Berlin, 1996. Available at http://www.iacr.org/conferences/ec96/rump/preneel.ps.
[24]C. Y. Hou, “Visual Cryptography for Color Images,” Pattern Recognition, Vol. 36, 2003, pp. 1619-1629.
[25]R. J. Hwang and C. C. Chang, “Hiding a Picture in Two Pictures,” Optical Engineering. Vol. 40, No. 3, 2001, pp. 342-351.
[26]C. C. Thien and J. C. Lin, “Secret Image Sharing,” Computers & Graphics , Vol. 26, 2002, pp. 765-770.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊