跳到主要內容

臺灣博碩士論文加值系統

(54.92.164.9) 您好!臺灣時間:2022/01/23 04:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:邱文怡
研究生(外文):Wenyi Chiu
論文名稱:應用影像處理與基因演算法於視覺密碼學之研究
論文名稱(外文):On Applying Image Processing and Genetic Algorithms to Visual Cryptography
指導教授:洪國寶洪國寶引用關係
指導教授(外文):Gwoboa Horng
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:65
中文關鍵詞:視覺密碼學基因演算法半色調處理誤差擴散法
外文關鍵詞:Visual CryptographyGenetic AlgorithmsHalftone ProcessError Diffusion
相關次數:
  • 被引用被引用:5
  • 點閱點閱:8020
  • 評分評分:
  • 下載下載:2037
  • 收藏至我的研究室書目清單書目收藏:7
視覺密碼學是一種對稱式的金匙密碼系統,也是一個典型的(t,n)門檻方法。自從1994年Naor和Shamir提出視覺密碼學後,就有很多學者提出相關的研究。他們的方法是將主密鑰視為一張黑白的秘密影像,透過某種編碼程序,加密產生n張雜亂無意義的黑白分享影像,然後將分享影像個別送給合法的參與者。解密時,只需將任何的t張分享影像列印在投影片上,再將投影片對準重疊就可以直接用眼睛來讀出秘密影像。這個方法最大的優點在於解密時不需任何複雜的輔助計算,且在安全性上只有利用窮舉法才能破解。
本篇論文為了改善以往視覺密碼學所造成的影像擴張問題並且增加分享影像在資訊上的潛伏特性和延伸在實務上的應用,我們提出二種新的技術來達成視覺密碼學︰一為基因演算法,此方法是以人工智慧的角度來探討﹔二為半色調處理之誤差擴散法,此方法是以影像處理的角度來探討。經由這二種不同方向的切入所達成的視覺密碼學,能提供給使用者不一樣的選擇。
另外,一個有效的視覺密碼學必須滿足下面二個條件,一為對比性,也就是秘密影像可從重疊的分享影像用肉眼看出來;二為安全性,也就是無法從單一分享影像中得到秘密影像。本篇論文也對這二個條件做了不一樣的詮釋。

In 1994, Naor and Shamir proposed the Visual Cryptography. It is a typical (t,n) threshold scheme. Since 1994 many researchers have also performed the related research on this topic. The basic visual cryptography theory is to treat a master key as a black-and-while secret image, and via certain encoding procedure to produce “n” sheets of chaotic and meaningless share images, and then sharing them with qualified participants. After that, one only need to print any “t” sheets of secret share mages in slices, overlap sheets, and then he will be able to directly see the secret image by his eyes. The most benefit of visual cryptography is that it doesn’t need any complicated assistant calculations when performing decryption. In addition, it is secure in protecting the security of information because no other methods can break it except using “Exhaustive Search”.
In this thesis, we propose a new approach to visual cryptography. It is significantly different from the traditional codebook approach. We adopt the genetic algorithms and error diffusion to achieve visual cryptography. It has the following two advantages:
There is no image expansion is share images, and the share images are meaningful (i.e. share image will no longer be a chaotic and meaningless image but it will reveal certain different images that can be overlapped to reveal the real and secret image.)
Hence, our methods greatly increase the practical value of visual cryptography.

致謝 i
中文摘要 ii
Abstract iii
圖索引 iv
第一章、緒論 1
1.1 研究動機 4
1.2 研究目的 5
1.3 研究方法 6
1.4 研究貢獻 8
1.5 論文架構 9
第二章、相關文獻探討 10
2.1 半色調影像 11
2.2 基因演算法 14
2.3 使用邊碼書的視覺密碼學 19
2.4 使用人工智慧的視覺密碼學 24
第三章、應用基因演算法於視覺密碼學之研究 26
3.1應用無性生殖之恆穩狀態基因演算法於視覺密碼學 28
3.2應用半色調處理之誤差擴散法於視覺密碼學 37
第四章、對比性和安全性之分析 39
4.1 對比性之分析 40
4.2 安全性之分析 43
第五章、實驗結果 47
5.1 基因演算法的設定 48
5.2 基因演算法之執行效率分析 50
5.3 實驗成果 51
第六章、結論與未來發展 60
6.1 結論 60
6.2 未來研究發展 62
參考文獻 63

[1] A. De Santis (1998): ²On Visual Cryptography Schemes², Information Theory Workshop.
[2] A. Shamir (1979): ²How to Share a Secret², Comm. ACM, Vol.22, pp. 612-613.
[3] B. Blakley (1979): ²Safeguarding Cryptographic Keys², In Proceedings of the Natiional Computer Conference, Vol. 48, pp. 313-317.
[4] C. Blundo, and . De Santis (1998): ²Visual Cryptography Schemes With Perfect Reconstruction of Black Pixels², In Joural for Computers & Graphics, Special Issue: ²Data Security in Image Communication and Network², To appear in 22-3.
[5] C. Blundo, A. De Santis, and D. R. Stinson (1996): ²On the Contrast in Visual Cryptography Schemes², to appear in the Journal of Cryptology, Available also at Theory of Cryptography Library as ftp://theory.lcs.mit.edu/pub/tcryptol /93-13.ps.
[6] C. Blundo, A. De Santis, and M. Naor (2000):²Visual Cryptography for grey level imges², Information processing Letters 75, pp. 255-259.
[7] C. Blundo, and A. Santis (1998): ²Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels², Computer and Graphics, Vol. 22, No. 4, pp. 449-455.
[8] C. Blundo, P. D’ Arco, A. De Santis, and D. R. Stinson (1998):²Contrast Optimal Threshold Visual Cryptography Schemes², submitted for publication.
[9] C.N.Yang, Yun-Hsiang Liang, and Wan-Hsiang Chou (2001): ²New Visual Secret Sharing Scheme with Non-Expansible Shadow Size Using Non-binary Sub Pixel², National Computer Symposium on Information Security, pp. F074
[10] Galib (1995-1996): A C++ Library of Genetic Algorithm Components, http://lancet.mit.edu/ga/, Massachusetts Institute of Technology
[11] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson (1996): ²Extended Schemes for Visual Cryptography², submitted to Theoretical Computer Science.
[12] Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson (1996) ²Visual Cryptography for General Access Structures², Information and Computation, Vol. 129, No. 2, pp. 86-106.
[13] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson (2001):²Extended Capabilities for Visual Cryptography², in Theoretical Computer Science, Vol. 250, pp. 134-161
[14] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson (1996): ²Constructions and Bounds for Visual Cryptography², Proceedings of the 23rd International Colloquium on Automata, Languages and Programming, pp. 416-428
[15] Hernan E. AGUIRRE, Kiyoshi TAKAKA, and Tatsuo SUGIMURA (1999): ²Accelerated Halftoning Technique Using Improved Genetic Algorithm with Tiny Populations², Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Vol. 4, pp. 905-910
[16] Hiroki KOGA, Hirosuke YAMAMOTO, and Members (1998): ²Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images², IEICE Trans.Fundamentals, Vol.E81-a No.6
[17] J.H. Holland(1992): ²Adaptation in Natural and Artificial Systems², Ann Arbor, Michigan: Cambridge, Massachusetts:MIT Press
[18] M.Naor, and A. Shamir (1995): ²Visual Cryptography², Advances in Cryptology-Eurocrypt’94, Spring-Verlag, Berlin, pp.1-12.
[19] M. Ito, A. Saio, and T. Nishizeki (1993): ²Multiple Assignment Scheme for Sharing Secret², In Journal of Cryptology, Vol. 6, No. 1, pp. 15-20.
[20] Philip A. Eisen, and Douglas R. Stinson (2002): ²Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels², Designs, Codes and Cryptography 25(1): 15-61.
[21] Tai-Wen Yue, and Suchen Chiasng (July 2000): ²A Neural Network Approach for Visual Cryptography², IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN’00), Italy, pp. 494-499.
[22] T. Hofmeister, M. Krause, and H. U. Simon (1997): ²Contrast-optimal k out of n secret sharing schemes in visual cryptography², COCOON '97, T. Jiang and D. T. Lee, Eds., Vol. 1276 of ``Lecture Notes in Computer Science'', Springer-Verlag, Berlin.
[23] 余慶杉 (1998): ²植基於視覺密碼學之識別系統², 國立中興大學資訊科學研究所碩士論文
[24] 邱善福 (2001): ²新視覺化密碼編碼法的分析², 國立交通大學資訊科學研究所碩士論文
[25] 游士杰(1998): ²植基於視覺密碼學之加解密系統²,國立中興大學資訊科學研究所碩士論文
[26] 劉健勤 (1997): ²人工生命理論及其應用², 冶金工業出版社
[27] 賴溪松 和 葉育斌 (2001): ²資訊安全入門², 全華
[28] 賴溪松, 韓亮 和 張真誠 (1998): ²近代密碼學及其應用², 松崗
[29] 蕭進松 (1999): ²數位影像處理², 全華
[30] 連國珍 (1999): ²數位影像處理², 儒林

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top