跳到主要內容

臺灣博碩士論文加值系統

(3.231.230.177) 您好!臺灣時間:2021/08/04 10:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張峻銘
研究生(外文):Jun-Ming Chang
論文名稱:快速機密影像分享之研究
論文名稱(外文):A Study of Fast Secret Image Sharing
指導教授:吳匡時
指導教授(外文):Kuang-Shyr Wu
學位類別:碩士
校院名稱:清雲科技大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:53
中文關鍵詞:資訊安全(rn)-門檻影像分享視覺密碼隨機網格
外文關鍵詞:Random gridvisual cryptographyimage sharing(r,n)-thresholdinformation security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:206
  • 評分評分:
  • 下載下載:11
  • 收藏至我的研究室書目清單書目收藏:0
隨著數位科技進步改變了人們的生活,人們廣泛地使用數位產品將資訊記錄下來,對於具有版權及機密性的資訊經由網路傳送時,有心人士會以特定工具來取得不法內容,這些受保護的資訊面臨了相當程度的威脅。為了有效保護重要資料不受干擾,大量的影像加密技術已發展成專屬之加密技術,如何快速加解密並保有分享影像的安全性是我們研究的目標。
本論文提出兩個基於隨機網格(Random grid)之具有快速編碼特性的影像分享方法,分別為基於隨機網格之快速視覺密碼方法(Fast Image Sharing by Random grids)與快速機密影像分享法(A Fast Secret Image Sharing Approach)。前者是一個基於隨機網格應用於灰階影像的快速加解密法,設計一個編碼方法並修改隨機亂數(Random)的範圍,目的是減少系統編碼時所需要的時間;後者為利用隨機網格搭配(r,n)-門檻的資料分享理論進行影像分享,並以簡化後的方程式來增加解碼時的效率。實驗結果顯示兩個影像分享方法不僅能無失真的取回原始影像,處理速度也較先前演算法佳,亦能節省系統資源,發揮裝置運算時最大工作效益。
Digital technology is growing rapidly, people are getting used to digital products. With the issue of copyright and confidentiality of the Internet information transmission, illegal information access becomes a serious problem. In order to protect the secret information from interference, the research field of image encryption has become an exclusive technology.
In this thesis, we construct two RG-based image sharing approaches aiming at providing a fast-encoding solution. The first one is “Fast Image Sharing by Random Grids," which is an RG-based encryption method for gray level images. And the second is named “A Fast Secret Image Sharing Approach," which is an (r,n)-threshold based secret sharing scheme. In the proposed methods, there is no pixel expansion and low contrast problems which happened frequently in this research field. Our main purpose is to save the computation time. Experimental results show that the proposed approaches performed well.
中文摘要 ·········································································································· i
英文摘要 ·········································································································· ii
誌謝 ·················································································································· iii
目錄 ·················································································································· iv
表目錄 ·············································································································· vi
圖目錄 ·············································································································· vii
第一章 緒論 ··································································································· 1
1.1 研究動機 ···················································································· 1
1.2 相關研究 ···················································································· 2
1.2.1 影像加密 ········································································· 2
1.2.2 影像隱藏 ········································································· 3
1.2.3 數位浮水印 ····································································· 5
1.2.4 影像分享 ········································································· 6
1.2.5 視覺密碼 ········································································· 6
1.3 論文架構 ···················································································· 7
第二章 文獻探討 ··························································································· 8
2.1 Shamir 所提之(r,n)理論 ····························································· 8
2.2 基於VC-based 的視覺密碼技術 ··············································· 9
2.2.1 傳統視覺密碼 ································································· 9
2.2.2 像素擴展 ········································································· 11
2.3 基於RG-based 的視覺密碼技術 ··············································· 12
2.3.1 Kafri 與Keren 的隨機網格加密法 ································· 12
2.3.2 灰階視覺密碼 ································································· 14
第三章 提出的方法 ······················································································· 16
3.1 方法1:基於隨機網格之快速視覺密碼方法 ·························· 16
3.2 方法2:快速機密影像分享法 ·················································· 19
第四章 實驗結果 ··························································································· 30
4.1 實驗環境 ···················································································· 30
4.2 方法1:基於隨機網格之快速視覺密碼方法實驗 ·················· 31
4.3 方法2:快速機密影像分享法實驗 ·········································· 37
4.4 討論與分析 ················································································ 46
第五章 結論 ··································································································· 49
參考文獻 ·········································································································· 50
簡歷 ·················································································································· 52
(1) 左豪官、婁德權,「灰階視覺密碼技術」,2011 網路與資訊安全研討會,C2,41 ~ 47 頁,民國一○○年十二月。
(2) 吳匡時、吳貝庭、張峻銘、羅聰明,「基於隨機網格之快速視覺密碼方法」,第六屆電資科技應用與發展學術研討會論文集,B3,125 ~ 128 頁,民國一○○年六月。
(3) 吳匡時、羅聰明、張峻銘,「快速機密影像分享法」,2012 資訊科技應用國際學術研討會論文集,Session II,51~55 頁,民國一○一年六月。
(4) 吳延生,「運用三角形域之譜方法」,國立成功大學,碩士論文,民國九十五年。
(5) 巫昌憲,「批次影像加密技術之研究」,國立嘉義大學,碩士論文,民國九十六年。
(6) 侯永昌、官振宇,「有意義且不擴展分享影像之漸進式視覺密碼」,資訊管理學報,第十七卷第三期, 131 ~ 154 頁,民國九十九年七月。
(7) 侯永昌、官振宇,「像素不擴展之漸進式視覺密碼」,電子商務學報,第十三卷第一期,99 ~ 115 頁,民國一○○年三月。
(8) 曹凱翔,「適用於通用型存取結構之基於隨機網格技術的視覺機密分享」,國立嘉義大學,碩士論文,民國九十八年。
(9) 陳俊亦,「設計具有壓縮且可逆資料隱藏技術」,南台科技大學,碩士論文,民國九十七年。
(10)陳盈瑜,「具自然分存圖像的機密圖像分享方法」,銘傳大學,碩士論文,民國九十八年。
(11)陳瀅羽,「視覺密碼中不擴展的(k,n)門檻值秘密影像分享方法之研究」,國立暨南大學,碩士論文,民國九十八年。
(12)葉明勳,「基於雜亂格點圖之視覺密碼演算法以提昇視覺辨識」,靜宜大學,碩士論文,民國九十八年。
(13)維基百科,http://zh.wikipedia.org/wiki/數位浮水印,2012 年2 月1 日。
(14)維基百科,http://zh.wikipedia.org/wiki/隱寫術,2012 年2 月1 日。
(15)A. Shamir, “How to share a secret,” Communication of the ACM, Vol. 22, No.11, pp. 612-613, 1979.
(16)C. C. Thien and J. C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition,Vol. 36, pp. 2875-2881, 2003.
(17)C. C. Thien and J. C. Lin, “An image-sharing scheme with user-friendly shadow images,” IEEE Transactions on circuits and systems for video technology, Vol. 13, No. 12, pp. 1161-1169, 2003.
(18)G. Horng, T. H. Chen and D. Tsai, “Cheating in Visual Cryptography,” Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 219-236, 2006.
(19)G. R. Blakley, “Safeguarding cryptographic keys,” Proceedings of the AFIPS 1979 National Camputer Conference, Vol. 48, pp. 313-317, 1979.
(20)J. K. Jan and Y. M. Tseng, “On the security of image encryption method,” Information Processing Letters, Vol. 60, pp. 261-265, 1996.
(21)J. Weir and W. Q. Yan, “Sharing multiple secrets using Visual Cryptography,” 978-1-4244-3828-0/09, IEEE, pp. 509-512, Taipei, May 2009.
(22)M. Naor and A. Shamir, “Visual cryptography,” Proceedings of Advances in Cryptology-Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950, pp. 1-12, 1995.
(23)M. Ramkumar and A. N. Akansu, “Capacity estimates for data hiding in compressed images,” IEEE Transactions on Processing, Vol. 10, pp. 1252-1263, 2001.
(24)M. Zeghid, M. Machhout, L. Khriji, A. Baganne and R. Tourki, “A modified AES based algorithm for image encryption,” World Academy of Science, Engineering and Technology, Issue 3, pp. 206-211, 2007.
(25)N. Memon and P. W. Wong, “Protectin digital media content,” Communications of the ACM, pp. 35-43, 1998.
(26)O. Kafri and E. Keren, “Encryption of pictures and shapes by Random grids,” Optics Letters, Vol. 12, No. 6, pp. 377-379, 1987.
(27)P. P. Dang and P. M. Chau, “Image encryption for secure Internet multimedia applications,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, 2000.
(28)R. Lukac and K. N. Plataniotis, “Bit-level based secret sharing for image encryption,” Pattern Recognition, Vol. 38, pp. 767-772, 2005.
(29)S. J. Shyu, “Efficient visual secret sharing scheme for color images,” Pattern Recognition, Vol. 39, Issue 5, pp. 866-880, 2006.
(30)S. J. Shyu, “Image encryption by Random grids,” Pattern Recognition, Vol. 40, No. 3, pp. 1014-1031, 2007.
(31)W. Stallings, “Cryptography and networks security: Principles and Practice,” 3rd edition, Prentice Hall, 2003.
(32)Y. C. Hou, “Visual cryptography for color images,” Pattern Recognition, Vol. 36, Issue 7, pp. 1619-1629, Jul. 2003.
(33)Y. C. Hou and Z. Y. Quan, “Progressive visual cryptography with unexpanded shares,” IEEE Transactions on circuits and systems for video technology, Vol. 21, Issue 11, pp. 1760-1764, 2011.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top