跳到主要內容

臺灣博碩士論文加值系統

(44.200.194.255) 您好!臺灣時間:2024/07/23 12:50
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳曉貞
研究生(外文):Chen, Hsiao-Chen
論文名稱:基於Haar轉換的視覺影像秘密分享
論文名稱(外文):A Secret Image Sharing Scheme Base on Haar Transform with Visual Cryptography
指導教授:楊權輝楊權輝引用關係
指導教授(外文):Yang, Chyuan-Huei Thomas
口試委員:楊權輝蔡耀弘鄭瑞恒
口試委員(外文):Yang, Chyuan-Huei ThomasTsai, Yao-HongCheng, Rei-Heng
口試日期:2016-07-27
學位類別:碩士
校院名稱:玄奘大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:46
中文關鍵詞:視覺密碼秘密影像Haar轉換擴張法
外文關鍵詞:Visual cryptographysecret imageHaar transformexpanded pixel
相關次數:
  • 被引用被引用:0
  • 點閱點閱:170
  • 評分評分:
  • 下載下載:19
  • 收藏至我的研究室書目清單書目收藏:0
隨著資訊科技產業越來越發達,因此如何安全地傳遞資訊變得非常的重要。近年來,視覺機密分享的方法越來越多人探討。視覺機密分享的特色就是不需要經過複雜的運算,就可以直接以人眼看到機密影像。本研究提出兩種以Haar轉換為基礎,並用(2,2)視覺密碼的影像分享方法。其中一種是簡易不擴張的方式但不可回復的方法,另一種是複雜擴張但可完全回復的方法。實驗顯示,簡易的結果可以有一般視覺密碼的效果,而複雜的結果可得回原始的秘密影像。
With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be seen confidential images directly to the human eye without complex operations. In this study, two based on Haar transform, and (2,2) image sharing method of Visual Cryptography are discussed. One is simple and non-expanded but irreversible, the other is complicated expanded methods but recover fully. Experiments have shown that the simple result can have the general effect of visual cryptography, the complex results can be retrieved to the original image.
摘要 i
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3 論文架構 3
第二章 相關研究之文獻探討 4
第三章 本文提出的方法 9
3.1 視覺密碼的簡介 9
3.2 Haar轉換介紹 10
3.3 本文提出的(2,2)影像分享方法 11
3.3.1 變相的非擴張分享法 12
3.3.2 可回復的擴張分享法 12
3.4 影像分享步驟 13
3.5 影像還原步驟 16
3.6 影像分享範例 19
第四章 實驗結果 24
第五章 結論與未來工作 34
文獻參考 35


[1] K. V. Arya, V. Rishiwal and A. K. Yadav, “An Efficient Halftone Visual Secret Sharing Scheme” ,2014 9th International Conference on Industrial and Information Systems (ICIIS), IEEE, pp. 1-5, 2014.
[2] N. Askari, H. M. Heys and C. R. Moloney, “Novel Visual Cryptography Schemes Without Pixel Expansion for Halftone Images”, Canadian Journal of Electrical and Computer Engineering (Volume:37 , Issue: 3 ), IEEE, pp. 168 – 177, 2014.
[3] J. Bhattacharjee, “A Comparative study of Discrete Cosine Transformation, Haar Transformation, Simultaneous Encryption and Compression Techniques” , Digital Image Processing, 2009 International Conference on Bangkok, IEEE, pp. 279-283, 2009.
[4] H. Cai, H. Liu, Q. Yuan, M. Steinebach and X. Wang, “A novel image secret sharing scheme with meaningful shares”, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, pp. 1767-1771, 2015.
[5] C. C. Chang and C. Y. Sun, “Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique”, Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on Kitakyushu, IEEE, pp. 485-488, 2014.
[6] Y. F. Chen, Y. K. Chan, C. C. Huang, M. H. Tsai and Y. P. Chu, “A multiple-level visual secret-sharing scheme without image size expansion”, Information Sciences, Volume 177, Issue 21, pp. 4696-4710, 2007
[7] C. L. F. Corniaux and H. Ghodosi, “An Entropy-based Demonstration of the Security of Shamir’s Secret Sharing Scheme”, Information Science, Electronics and Electrical Engineering (ISEEE), 2014 International Conference on Sapporo, IEEE, pp. 46-48, 2014.
[8] S. K. Das and B. C. Dhara, “An Image Secret Sharing Technique with Block Based Image Coding”, Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on Gwalior, IEEE, pp. 648-652, 2015.
[9] M. Desiha and V. K. Kaliappan, “Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing”, Computer Communication and Informatics (ICCCI), 2015 International Conference on Coimbatore, IEEE, pp. 1-5, 2015.
[10] R. Gayathri and V. Nagarajan,“Secure data hiding using steganographic technique with Visual cryptography and watermarking scheme”, Communications and Signal Processing (ICCSP), 2015 International Conference on Melmaruvathur, IEEE, pp. 0118-0123, 2015.
[11] M. E. Hodeish and V. T. Humbe, “A (2,2) secret sharing scheme for visual cryptography without Pixel Expansion”, Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on Visakhapatnam, IEEE, pp. 1-7, 2015.
[12] A. Kamboj and D. K. Gupta, “An Improved Halftone Visual Secret Sharing Scheme for Gray-Level Images Based on Error Diffusion in Forward and Backward Direction”, 2015 Fifth International Conference on Advanced Computing & Communication Technologies, IEEE, pp. 125-130, 2015.
[13] A. Mishra and A. Gupta, “Secret Sharing Scheme with Reversing”, 2015 1st International Conference on Next Generation Computing Technologies (NGCT), IEEE, pp. 370 – 373, 2015.
[14] H. M. Rafiq and M. U. Siddiqi, “Haar Transformation of Linear Boolean Function”, 2009 International Conference on Signal Processing Systems, IEEE, pp. 802 – 805, 2009..
[15] R. Roy, S. Bandyopadhyay, S. Kandar and B. C. Dhara, “A novel 3–4 image secret sharing scheme”, Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on Kochi, IEEE, pp. 2072 – 2075, 2015.
[16] J. Singh, R. Kumar, V. Kumar and A. Mishra, “Intruder detection by visual cryptography in wireless sensor networks”, Communications and Signal Processing (ICCSP), 2015 International Conference on Melmaruvathur, IEEE, pp. 1422 – 1425, 2015.
[17] S. D. Thepade and R. S. Patil, “Novel reversible image secret sharing based on Thien and Lin's scheme using discrete Haar wavelet Transform”, Pervasive Computing (ICPC), 2015 International Conference on Pune, IEEE, pp. 1 – 4, 2015.
[18] X. Yan, S. Wang and X. Niu, “Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing”, Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on Kitakyushu, IEEE, pp. 223 – 226, 2014.
[19] C. H. T. Yang, Y. H. Huang and J. H. Syue, “Reversible Secret Image Sharing Based on Shamir’s Scheme with Discrete Haar Wavelet Transform”, Electrical and Control Engineering (ICECE), 2011 International Conference on Yichang, IEEE, pp. 1250 – 1253, 2011.
[20] K. Yoshida and Y. Watanabe, “Security analysis of audio secret sharing scheme encrypting audio secrets”, Internet Technology And Secured Transactions, 2012 International Conference for London, IEEE, pp. 294 – 295, 2012.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top