跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.87) 您好!臺灣時間:2025/02/12 08:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李昆倫
研究生(外文):Kun-Lun Lee
論文名稱:植基於多重驗證之有意義視覺祕密分享
論文名稱(外文):Random Grids-based Meaningful Visual Secret Sharing with Authentication
指導教授:蔡垂雄
指導教授(外文):Chwei-Shyong Tsai
口試委員:吳憲珠婁德權翁麒耀
口試委員(外文):Hsien-Chu WuDer-Chyuan LouChi-Yao Weng
口試日期:2017-06-01
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊管理學系所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:46
中文關鍵詞:視覺祕密分享預防欺騙之視覺化密碼學隨機網格XOR運算機制
外文關鍵詞:Visual secret shareCheating prevention visual cryptographyRandom grids and XOR operation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:171
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著科技與網路的快速發展,使人們的生活越來越方便。但也伴隨了許多危險接踵而來,因而在傳輸上的安全性漸漸的被重視。在本研究方法中,提出了一種新型態的(k,n)有意義之門檻值視覺祕密分享“Visual Secret Sharing (VSS) ” 機制並結合多重驗證與XOR運算方法。並且解決了傳統VSS的一些缺點,如像素擴張、嚴重失真與沒有意義的分享影像(Share)容易遭受攻擊的問題。本研究方法提出的方法,主要有五個優勢:(1)使用隨機網格的技術取代傳統密碼表來加密,由於設計一張密碼表需要花費較多的時間,反而使用隨機網格能有較快加密效率;(2)使用了多張不同的覆蓋影像來加密,加密後的影像與一般的影像並無差異,使駭客不容易察覺;(3)使用QR-code來當驗證影像,並提出了多重驗證的概念。多重驗證指的是有二次的驗證確認,第一次為疊合顯示QR-code,另一次為解析QR-code連結到後端網站。解碼原理為特定二張share疊合後會顯示出QR-code,接下來利用掃描機來掃描QR-code,就能連到後端的網站再次驗證;(4)使用XOR運算機制,在解碼時能使機密影像或驗證影像恢復成無失真的狀態;(5)為了因應不同的需求,也能同時使用OR運算機制來解碼。
With the development of technology and Internet, it’s more easily for everyone in the life, but it carries about some problems for us. How to prevent cheating in the point to point transferred image is very important. We proposed a new (k,n) threshold Visual Secret Sharing (VSS) combining more difference meaningful shares and authentication images which based on Random Grids (RG) and XOR-decryption’s scheme. We solve traditional VSS defects including pixel expansion, loss of reconstruction and meaningless shares. Our scheme has five advantages: (1) using random grids to replace traditional codebook’s defect in no expansion different meaningful image; (2) using more different cover images to encrypt into shares and can easily identify due to improve safety in different meaningful images; (3) using QR-code to be an authentication image that avoids secret image being falsified and proposed “Double Authentication” concept, using QR-code scanner to scan authentication image that link another place to do double check whether reach double authentication or not in different authentication image; (4) using XOR-operation to decrypt reconstruction secret image and many authentication images and their quality can reach lossless after our compute in image quality; (5) we also can use OR-operation to decryption.
一、 簡介 1
二、 文獻探討 10
(一) Kafri等學者的Random Grids (RG)方法 10
(二) Yan等學者的Meaningful Share 方法 12
(三) Lin 等學者的Prevention of Cheating 方法 14
(四) Yan等學者的XOR-operation 方法 15
三、 多重驗證之有意義視覺祕密分享 17
(一) 參數設定 17
(二) 視覺密碼應用 18
(三) 本研究方法 20
1. 加密階段 21
2. 解密階段 27
四、 實驗結果 30
(一) 實驗環境模擬 30
(二) 認證實驗 33
(三) 效能評估 34
1. 影像呈現 34
2. 對比度分析 36
3. 功能性比較 39
五、 結論 41
六、 參考文獻 43
[1]X.Yan, S. Wang, X. Niu, and C.N. Yang, “Generalized random grids-based threshold visual cryptography with meaningful shares,” Signal Processing, vol.109, pp.317-333, 2015.
[2]X. Yan, S. Wang, X. Niu, and C.N Yang, “Random grid-based visual secret sharing with multiple decryptions,” Journal of Visual Communication and Image Representation, vol.26, pp.94-104, 2015.
[3]M.E Hodeish, L. Bukauskas, and V.T. Humbe, “An Optimal (k,n)Visual Secret Sharing Scheme for Information Security,” Procedia Computer Science, vol.93, pp.760-767, 2016.
[4]P.Y. Lin, R.Z. Wang, Y.J. Chang, and W.P. Fang, “Prevention of cheating in visual cryptography by using coherent patterns,” Information Sciences, vol.301, pp.61-74, 2015.
[5]X. Yan, X. Liu, and C.N. Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of Real-Time Image Processing, vol.10, pp.1-13, 2015.
[6]T.H. Chen and K.H. Tsao, “Threshold visual secret sharing by random grids,” Journal of Systems and Software, vol.84, pp.1197-1208, 2011.
[7]O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol.12, pp.377-379, 1987.
[8]T. Guo, F. Liu, and C. Wu, “Threshold visual secret sharing by random grids with improved contrast,” Journal of Systems and Software, vol.86, pp.2094-2109, 2013.
[9]X. Wu and W. Sun, “Improving the visual quality of random grid-based visual secret sharing,” Signal Processing, vol.93, pp.977-995, 2013.
[10]C.H Lin, Y.S. Lee, and T.H. Chen, “Friendly progressive random-grid-based visual secret sharing with adaptive contrast,” Journal of Visual Communication and Image Representation, vol.33, pp.31-41, 2015.
[11]X. Yan, S. Wang, X. Niu, and C.N. Yang, “Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality,” Digital Signal Processing, vol.38, pp.53-65, 2015.
[12]K.H. Tsao, S.J. Shyu, C.H. Lin, Y.H. Lee, and T.H. Chen, “Visual multiple-secret sharing for flexible general access structure by random grids,” Displays, vol.39, pp. 80-92, 2015.
[13]X. Wu and W. Sun, “Improved tagged visual cryptography by random grids,” Signal Processing, vol.97, pp.64-82, 2014.
[14]S. Shyu, “Image encryption by random grids,” Pattern Recognition, vol.40, pp.1014-1031, 2007.
[15]K.S. Lin, C.H. Lin, and T.H. Chen, “Distortionless visual multi-secret sharing based on random grid,” Information Sciences, vol.288, pp.330-346, 2014.
[16]D. Ou, W. Sun, and X. Wu, “Non-expansible XOR-based visual cryptography scheme with meaningful shares,” Signal Processing, vol.108, pp.604-621, 2015.
[17]J.S. Lee, C.C. Chang, N.T. Huynh, and H.Y. Tsai, “Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique,” Digital Signal Processing, vol.40, pp.131-139, 2015.
[18]X. Liu, S. Wang, J. Sang, and W.Zhang, “A novel mapping-based lossless Recovery algorithm for VSS,” Journal of Real-Time Image Processing, vol.10, pp.554-564, 2016.
[19]T.H. Chen, Y.S Lee, and C.H. Lin, “On the difficulty of aligning VSS random grids,” Signal Processing: Image Communication, vol.44, pp.101-107, 2016.
[20]M. Naor and A. Shamir , “Visual cryptography,” Lecture Notes in Computer Science , vol.950 , pp.1-12, 1995.
[21]C.N. Yang, A.G. Peng, and T.S. Chen, “MTVSS: misalignment tolerant visual secret sharing on resolving alignment difficulty,” Signal Processing, vol.89, pp.1602–1624, 2009.
[22]Y.C. Chen, D.S. Tsai, and G. Horng, “a new authentication based cheating preventing scheme in Naor-Shamir’s visual cryptography,” Journal of Visual Communication and Image Representation, vol.23, pp.1225-1233, 2012.
[23]Y.C. Chen, D.S. Tsai, and G. Horng, “visual secret sharing with cheating prevention revisited,” Digital Signal Processing, vol.23, pp.1496-1504, 2013.
[24]Y.C. Chen, G.B. Horng, and D.S. Tsai, “Cheating Prevention in Visual Cryptography,” IEEE transaction on image processing, vol.21, pp.3319-3323, 2012.
[25]C.H. Yang, C.H. Chen, and S.R. Cai, “Enhanced Boolean-based multi secret image sharing scheme,” Journal of System and Software, vol.116, pp.22-34, 2016.
[26]C.H. Lin, T.H. Chen, Y.T. Wu, K.H. Tsao, and K.S. Lin, “Multi-factor cheating prevention in visual secret sharing by hybrid codebooks,” Journal of Visual Communication Image Representation, vol.25, pp.1543-1557, 2014.
[27]C.N. Yang, L.Z. Sun, and S.R. Cai, “Extended color visual cryptography for black and white secret image,” Theoretical Computer Science, vol.609, pp.143-161, 2016.
[28]T.H. Chen, Y.S. Lee, W.L. Huang, J.S.T. Juan, Y.Y. Chen, and M.J. Li, “Quality-adaptive visual secret sharing by random grids,” The Journal of Systems and Software, vol.86, pp.1267-1274, 2013.
[29]C.N. Yang, T.C. Tung, F.H. Wu, and Z. Zhou, “Color transfer visual cryptography with perfect security,” Measurement, vol.95, pp.480-493, 2017.
[30]T.H. Chen and K.C. Li, “Multi-image encryption by circular random grids,” Information Sciences, vol.189, pp.255-265, 2012.
[31]C.C. Wu and L.H. Chen, “A study on visual cryptography,” Institute of Computer and Information Science, Taiwan, 1998.
[32]Y.C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol.36, pp.1619-1629, 2003.
[33]Y.C. Hou, Z.Y. Quan, and C.F. Tsai, “a privilege-based visual secret sharing model,” Journal of Visual Communication and Image Representation, vol.33, pp.358-367, 2015.
[34]H.C. Wu, H.C. Wang, and R.W. Yu, “color visual cryptography scheme using meaningful shares,” Eighth International Conference on Intelligent Systems Design and Applications, Taiwan, 2008.
[35]C.N Yang, J.K. Liao, and D.S. Wang, “New privilege-based visual cryptographu with arbitrary privilege levels,” Journal of Visual Communication and Image Representation, vol.42, pp.121-131, 2017.
[36]P. Chouksey and R. Rai, “Secret sharing based visual cryptography scheme for color preservation using RGB color space,” International Journal of Computer Science and Information Technology & Security, vol.5, pp.346-353, 2015.
[37]X.Wu and W. Sun, “Extended Capabilities for xor-Based Visual Cryptography,” IEEE Transactions on Information Forensics and Security, vol.9, pp.1595-1605, 2014.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top