跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.108) 您好!臺灣時間:2025/09/02 19:02
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳永昌
研究生(外文):Yung-Chang Chen
論文名稱:像素不擴展下可容錯視覺機密影像配置系統之研究
論文名稱(外文):Shift-Tolerant Visual Secret Sharing Scheme without Pixel Expansion
指導教授:阮夙姿
指導教授(外文):Justie Su-Tzu Juan
口試委員:杜迪榕黃光璿
口試委員(外文):Dyi-Rong DuhHuang, Guan-Shieng
口試日期:2016-01-22
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:英文
論文頁數:69
中文關鍵詞:視覺密碼
外文關鍵詞:Visual Secret
相關次數:
  • 被引用被引用:0
  • 點閱點閱:216
  • 評分評分:
  • 下載下載:15
  • 收藏至我的研究室書目清單書目收藏:0
視覺機密分享(Visual Secret Sharing, VSS)是對影像進行加密的技術,其主要的精神是,解密時不需要透過任何的計算,只須使用人類的視覺系統(Human Visual System)就可以還原出原始的資訊。此外,視覺機密分享繼承了機密分享(Secret Sharing)的優點。概念是將一張機密影像加密成多張無意義的分享影像(Share),參與分享的人都各持有一張分享影像,唯有疊合適當的分享影像才能還原出原始秘密訊息。

隨機網格(Random Grid)是視覺機密分享機制的一種技術,它的優點是不需建置密碼簿,產生出來的分享影像與原來的機密影像大小一樣,是一個簡單且低成本的技術。然而當實際把兩張分享影像疊合時,會有精準對齊的困難。

因此本研究提出了利用隨機網格方法,在不擴張像素的條件下,對機密影像做加密後得到兩張隨機影像,且在疊合兩張隨機影像時,即使沒有完全正疊,在其中一張平移(Shifting)或斜移(Diagonal Shifting)時,仍可還原機密影像達到可容錯的機制。如此可使視覺機密配置系統更具實用性。
Visual secret sharing(VSS) is a technology of image encryption, which does not requir any calculation at the time of decryption, just alone with the human visual system then the secret can be recovered. The concept of VSS is encrypting a secret image into two meaningless shares. We can only decrypt the secret image by stacking these shares together. Random grid, which is a skill for making a visual secret sharing scheme, the advantage is that it does not need the codebooks, and the size of each share will be the same size as the secret image. It is a simple and useful technique to share secret image. However, there would be problems in alignment when these two shares are staked by hand in practical. Therefore, this thesis presents the fault-tolerant schemes when stacking two shares that are acquired from secret image encryption without pixel expansion. When two shares are stacked, even without been perfectly stacked, we can restore the image to achieve fault-tolerant. Both theoretical analysis and simulation results demonstrate the effectiveness and practicality of the proposed schemes.
致謝I
論文摘要III
Abstract IV
Table of Contents V
List of Figures VII
List of Tables VIII
1 Introduction 1
2 Related Work 3
2.1 Visual Cryptography Concepts . . . . . . . . . . . . . . . . . . . . 3
2.2 Random Grid Encryption Algorithm . . . . . . . . . . . . . . . . 5
2.3 The Main Idea of Nakajima and Yamaguchi Scheme . . . . . . . . 8
2.4 The MTVSS Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 The Proposed Schemes 11
3.1 The Main Idea and Algorithm . . . . . . . . . . . . . . . . . . . . 11
3.2 The Experimental Results . . . . . . . . . . . . . . . . . . . . . . 17
4 Analysis and Comparison 22
4.1 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2 Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
5 Conclusion 45
References 46
Appendix 48
[1] C. Blundo and A. Santis, Visual cryptography schemes with perfect recon-
struction of black pixels, Computer, No. 22, pp. 449445, 1998.
[2] C. Blundo, A. Santis, and A. Bonis, Improved schemes for visual cryptog-
raphy, Designs, Codes and Cryptograph, No. 24, pp. 225278, 2001.
[3] J. J.-Y. Chang and J. S.-T. Juan, Multi-vss scheme by shifting random
grids, In Proc. World Academy of Science, Engineering and Technology,
No. 65, pp. 12771283, 2012.
[4] T.-H. Chen, K.-H. Tsao, and K.-C.Wei, Multiple-image encryption by rotat-
ing random grids, In Proc. of Eighth International Conference on Intelligent
Systems Design and Applications, ISDA'08, pp. 252256, 2008.
[5] Y.-C. Chen, Multi-VSS scheme by shifting random grids. Master Thesis,
National Chi Nan University, Taiwan, 2014.
[6] O. Kafri and E. Keren, Encryption of pictures and shapes by random grids,
Optics Letters, Vol. 12, No. 6, pp. 377379, 1987.
[7] K. Kobara and H. Imai, Limiting the visible space visual secret sharing
schemes and their application to human identication, Advances in Cryp-
tology, pp. 185195, 1996.
[8] F. Liu, C. K. Wu, and X. J. Lin, The alignment problem of visual cryp-
tography schemes, Designs, Codes and Cryptographys, No. 50, pp. 215227,
2009.
[9] M. Nakajima and Y. Yamaguchi, Enhancing registration tolerance of ex-
tended visual cryptography for natural images, Journal of Electronic Imag-
ing, No. 13, pp. 654662, 2002.
[10] M. Nakajima and Y. Yamaguchi, Extended visual cryptography for natural
images, Journal of WSCG, No. 10, pp. 303310, 2002.
[11] M. Naor and A. Shamir, Visual cryptography, Advances in Cryptol-
ogyEUROCRYPT'94, pp. 112, 1995.
[12] S. J. Shyu, Image encryption by random grids, Pattern Recognition, No. 40,
pp. 10141031, 2007.
[13] E. R. Verheul and H. C. V. Tilborg, Constructions and properties of k out of
n visual secret sharing schemes, Designs, Codes and Cryptography, No. 11,
pp. 179196, 1997.
[14] D. S. Wang, L. Dong, and X. Li, Towards shift tolerant visual secret sharing
schemes, IEEE Transactions on Information Forensics and Security, No. 6,
pp. 323337, 2011.
[15] X. Yan, S. Wang, X. Niu, and C. N. Yang, Halftone visual cryptography
with minimum auxiliary black pixels and uniform image quality, Digital
Signal Processing, No. 38, pp. 5365, 2015.
[16] C. N. Yang, A. G. Peng, and T. S. Chen, Mtvss: Misalignment tolerant vi-
sual secret sharing on resolving alignment diculty, Signal Process, No. 89,
pp. 16021624, 2009.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top