跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.80) 您好!臺灣時間:2025/01/25 20:50
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳俐伶
研究生(外文):Li-Ling Chen
論文名稱:利用有意義圖像之視覺密碼
論文名稱(外文):Visual Cryptography Using Meaningful Shares
指導教授:汪順祥
指導教授(外文):Shuenn-Shyang Wang
學位類別:碩士
校院名稱:大同大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:44
中文關鍵詞:秘密共享視覺密碼
外文關鍵詞:secret sharingvisual cryptography
相關次數:
  • 被引用被引用:1
  • 點閱點閱:493
  • 評分評分:
  • 下載下載:84
  • 收藏至我的研究室書目清單書目收藏:0
視覺密碼是一種有效的影像加密方法。本篇論文中,我們提出了新的視覺密碼演算法,以達成不需像素擴展為目標,必且運用的有意義的圖像以作為分享影像。為了能達到原始秘密影像的視覺效果,我們定義了四個對比參數PSHb、PSHw、PSIb以及PSIw以控制分享影像及解密後影像的黑白對比。此外,我們亦利用不同的區塊大小選擇來控制所得分享影像的亮度及細節品質。針對(2, 2)、(2, n)以及(n, n)的視覺密碼演算法我們都提出了推導,並提供實驗結果驗證其效果。
Visual cryptography (VC) has been developed as an efficient image encryption method. In the thesis, we proposed a new visual cryptography algorithm to achieve non-pixel expansion VC using meaningful shares. To maintain the visibility of object in shares and secret image, we use four parameters PSHb, PSHw, PSIb and PSIw to set the contrast in the share images and the decrypted image. Also, we use different block sizes to control the brightness and quality of shares and decrypted image. The schemes of (2, 2), (2, n) and (n, n) are developed and experimental results shows the effectiveness of our visual cryptography algorithm.
ACKNOWLEDGEMENTS i
ENGLISH ABSTRACT ii
CHINESE ABSTRACT iii
TABLE OF CONTENTS iv
LIST OF FIGURES vi
CHAPTER 1 INTRODUCTION 1
CHAPTER 2 VISUAL CRYPTOGRAPHY 3
2.1 THE MODEL OF (k, n) VISUAL CRYPTOGRAPHY 4
CHAPTER 3 RELATED WORKS 7
3.1 IMAGE SIZE INVARIANT VC 7
3.2 VISUAL CRYPTOGRAPHY USING PROBABILISTIC METHOD 8
3.3 APPLY TINY POPULATION GENETIC ALGORITHM TO VISUAL CRYPTOGRAPHY 10
CHAPTER 4 VISUAL CRYPTOGRAPHY USING MEANINGFUL SHARES 14
4.1 MEANINGFUL-SHARE VISUAL CRYPTOGRAPHY 14
4.2 MEANINGFUL-SHARE VC SCHEMES 17
4.3 SHARE GENERATING FOR (2, 2) VC USING MEANINGFUL SHARES 18
4.4 SHARE GENERATING FOR (2, n) VC USING MEANINGFUL SHARES 20
4.5 SHARE GENERATING FOR (n, n) VC USING MEANINGFUL SHARES 24
CHAPTER 5 RESULTS AND DISCUSSION 28
CHAPTER 6 CONCLUSIONS 33
REFERENCES 34
[1]M. Naor and A. Schamir, “Visual cryptography,” Advances in Cryptology-EUROCRYPT ’94, pp. 1 – 12, 1995.
[2]C. Blundo, A. D. Santis, and M. Naor, “Visual cryptography for gray level images,” Proceedings of 2000 Conference on Computer Vision, Graphics and Image Processing, pp. I-221 -226, August 2000.
[3]G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Electronic Colloquium on Computational Complexity (ECCC), vol 3, pp. 86 – 106, 1996.
[4]C. N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, pp. 481 – 494, 2004.
[5]W. Y. Chiu, G. Horng, C. L. Wang, and C. H. Shi, “Apply tiny populations genetic algorithm to visual cryptography,” 第十二屆全國資訊安全會議論文集, pp. 307-314, 2002.
[6]Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” Image Processing International Conference, vol. 1, pp. I-521 -524, September 2003.
[7]R. Ito, H. Kuwakado and H. Tanaka, “Image size invariant visual cryptography,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, vol. E82-A, no. 10, pp. 2172-2177, October, 1999
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top