跳到主要內容

臺灣博碩士論文加值系統

(44.222.104.206) 您好!臺灣時間:2024/05/23 18:32
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃淵暉
研究生(外文):Huang,Yuan-Hui
論文名稱:基於離散Haar小波轉換與Shamir方法之秘密影像分享
論文名稱(外文):A Study of Secret Image Sharing Based on Discrete Haar Wavelet Wavelet Transform and Shamir’s Scheme
指導教授:楊權輝楊權輝引用關係
指導教授(外文):Chyang-Huei Thomas Yang
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:51
中文關鍵詞:秘密影像分享秘密影像離散Haar小波轉換
外文關鍵詞:image sharinglossless Shamir’s schemeHaar wavelet transform
相關次數:
  • 被引用被引用:0
  • 點閱點閱:412
  • 評分評分:
  • 下載下載:36
  • 收藏至我的研究室書目清單書目收藏:0
我們提出基於離散Haar小波轉換和Shamir方法,一種快速分享及無失真的秘密影像分享的方法。秘密分享在於將主要機密資訊分成兩個以上的次要機密資訊,在次要機密資訊未達到一定數量,並且是無法單獨得主要機密資訊。將機密影像轉換成一階離散Haar小波轉換分成LL、LH、HL、HH區塊,我們利用LL區塊和利用Shamir機密影像的方法進行分享,設定門檻值(t,n)使用Shamir多項式分成n張次要機密影像分享,當還原時收集t張次要機密影像,使用Lagrange多項式內插法還原LL區塊,當還原LL區塊時和三個區塊(LH、HL、HH)使用反離散Haar小波轉換得到機密影像。由於使用Shamir和Lagrange演算法處理影像需要耗大量時間,經過實驗證明能快速機密影像分享時處理的時間,並且也能達到無失真機密影像分享的效果。
We proposed a fast secret image sharing based on Haar wavelet transform and Shamir’s method. Many researchers develop secret image sharing method with Shamir’s algorithm in one whole image. We employ discrete Haar wavelet transform to reduce the secret image to its quarter size firstly, i.e. the 1-level LL subband. Then only apply the modified Shamir’s algorithm to this LL subband to generate the shadow images. Lagrange method exploits the enough numbers of the shadow images in the retrieval step. Due to the Shamir’s and Lagrange algorithms consume a lot of time during the processing of the secret image sharing. Our method only processes a quarter size of image that can decrease computation time, and still achieve to recover the secret image reversible. The experiment results demonstrate our method is fast and retrieve secret image lossless.
摘要 i
目錄 ii
Abstract iii
致謝 iv
圖目錄 v
表目錄 vi
第一章 序論 1
1.1 研究背景與動機 1
1.2 研究目的 2
1.3 論文架構 3
第二章 論文回顧 4
2.1 Shamir秘密影像分享 10
2.2 離散Haar小波轉換 14
第三章 本文提出的方法 21
3.1 影像分享演算法 22
3.2 影像還原演算法 26
第四章 實驗結果 31
4.1實驗設計 31
4.2 結果展示 32
第五章 結論與未來工作 41
文獻參考 42
中文
[1]簡祐緯、陳建彰,“Shamir 秘密分享於數位影像之研究”,碩士論文,玄奘大學資訊管理學系。
[2]楊翊庭、陳建彰,“植基於小波轉換之同數可逆式浮水印技術”,碩士論文,玄奘大學資訊管理學系。
西文
[3]A. Shamir, “How to Share a Secret”, Communication of the ACM, Vol. 22, pp.612-613, 1979.
[4]G. R. Blakley, “Safeguarding cryptographic keys”, Proceedings AFIPS National Computer Conference, Vol. 48, pp. 313-317, 1979.
[5]A. Todorka, S. Yoshiaki, O. Kan and T. Norio, “Secret images sharing scheme using two-variable one-way functions”, Wireless Communications, Networking and Information Security (WCNIS), IEEE International Conference, 2010.
[6]C. C. Chang, P. Y. Lin, C. S. Chan, “Secret Image Sharing with Reversible Steganography”, Computational Intelligence and Natural Computing, 2009.
[7]C. C. Chen, C. C. Chen, Y. C. Lin, “Weighted modulated secret image sharing method”, Journal of Electronic Imaging 18(4), 2009.
[8]J. H. Chen , C. H. Chen , “A Watermarking Scheme Using Code Division Multiple Access and DWT”, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
[9]T. H. Chen, C. S. Wu, “ f?cient multi-secret image sharing based on Boolean operations”, Signal Processing, Volume 91, Issue 1,pp. 90-97, 2011.
[10]Z. Eslami, J. Z. Ahmadabadi,“Secret image sharing with authentication-chaining and dynamic embedding”, Journal of Systems and Software, Volume 84, Issue 5,pp. 803-809, 2011.
[11]H. Y. Huang, S. H. Chang,“A lossless data hiding based on discrete Haar wavelet transform” Computer and Information Technology (CIT), pp. 1554 – 1559, 2010.
[12]S. Kumar, S. K. Muttoo,“Data Hiding Techniques Based on Wavelet-like Transform and Complex Wavelet Transforms”, Intelligence Information Processing and Trusted Computing, 2010.
[13]V. Kumar, D. Kumar, “Performance evaluation of DWT based image steganography”, Advance Computing Conference (IACC), IEEE 2nd International , pp. 223 – 228, 2010.
[14]C. C. Lin, and W. H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, 2004
[15]M. Noar and A. Shamir, “Visual Cryptogrphy”, Advances in Cryptology: Eurpocrypt’94, Springer-Vera, Berlin, pp.1-12, 1995.
[16]C. C. Thien, J. C. Lin, “Secret image sharing”, Computers & Graphics 26 , pp.765–770, 2002.
[17]M. Ulutas, V. V. Nabiyev, G. Ulutas, “A new secret image sharing technique based on Asmuth Bloom's scheme”, Application of Information and Communication Technologies, pp.1-5, 2009.
[18]C. C. Wu, S. J. Kao, W. C. Kuo, and M. S. Hwang “Reversible Secret Image Sharing Based on Shamir’s Scheme”,Intelligent Information Hiding and Multimedia Signal Processing, pp. 1014 - 1017, 2009.
[19]R. Z. Wang, S. J. Shyu, “Scalable secret image sharing”, Signal Processing: Image Communication, Volume 22, Issue 4, pp. 363-373, 2007.
[20]Y. S. Wu, C. C. Thien, J. C. Lin, “Sharing and hiding secret images with size constraint”, Pattern Recognition, Volume 37, Issue 7, pp. 1377-1385, 2004.
[21]D. S. Tsai, G. Horng, T. H. Chen and Y. T. Huang, “A novel secret image sharing scheme for true-color images with size constraint”, Information Sciences 179, pp. 3247–3254, 2009.
[22]G. Ulutas, M. Ulutas, V. Nabiyev, “Distortion free geometry based secret image sharing ”, Procedia Computer Science 3, pp.721–726, 2011.
[23]X. P. Xie and X. H. Ding, “Gene Expression Pattern Extraction Based on Wavelet Analysis”, Proceedings of the 2009 IEEE International Conference on Information and Automation, 2009.
[24]C. N. Yang, C. B. Ciou, “Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability”, Image and Vision Computing, Volume 28, Issue 12, pp1600-1610, 2010.
[25]W. P. Fang, “Secret Image Sharing Safety”, Communications, APCC 2008 14th Asia-Pacific , 2008.
[26]R. Z. Wang, C. H. Su, “Secret image sharing with smaller shadow images”, Pattern Recognition Letters, Volume 27, Issue 6, pp. 551-555, 2006.
[27]C. C. Chang, C. C. Lin, T. Hoang Ngan Le, Hoai Bac Le,“Sharing a verifiable secret image using two shadows”, Pattern Recognition, Volume 42, Issue 11, pp.3097-3114, 2009.
[28]C. C. Chen, Y. W. Chien, “Sharing Numerous Images Secretly with Reduced Possessing Load”, Fundamenta Informaticae 86,pp. 447–458, 2008.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top