研究生: |
許元泰 Yuan-Tai Hsu |
---|---|
論文名稱: |
一個新的視覺密碼的建構演算法 A New Construction Algorithm for Visual Cryptography |
指導教授: |
張隆紋
Long-Wen Chang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2004 |
畢業學年度: | 92 |
語文別: | 英文 |
論文頁數: | 34 |
中文關鍵詞: | 祕密分享 、(k,n)門檻方法 、視覺密碼 |
外文關鍵詞: | secret sharing, (k,n) threshold scheme, visual cryptography |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
Adi Shamir 提出了一個著名的祕密分享的方法。這個方法可以將一個資料 D 分成 n 份,使得當有 k 份以上時可以輕易的重建 D,但是你無法獲得 D 的任何資訊即使你有了 k-1份。這樣的方法稱為(k,n) threshold scheme。
針對影像的分享,Naor 和 Shamir 更進一步提出了視覺密碼的想法。它可以被視為是(k,n) threshold scheme在視覺上的變形,對於一張祕密影像,n個參與者每個人都會得到一張投影片;當有任意k個以上的參與者可以藉由疊合他們的投影片來看到祕密影像,但是當不足k個參與者時則無法得到任何訊息。
我們在這篇論文裡提出了一個新的視覺密碼的建構演算法。首先,我們將SFCOD做推廣來將一張灰階影像轉換成灰階值較少的影像。除此之外,我們推廣基本的視覺密碼模型使它能處理兩種以上的灰階值。然後,這個推廣後的視覺密碼模型便能被用來編碼這張影像。這個方法滿足了安全和對比的條件。它在解碼過的影像裡可以比一般的視覺密碼的方法顯示更多原圖的細節。最後,還包括了推廣我們的方法去處理彩色影像。
Adi Shamir proposed a well-known technique for secret sharing. This technique can divide data D into n pieces in such a way that any k pieces can easily reconstruct D, but no information about D will be revealed even with complete knowledge of k-1 pieces. Such scheme is called a (k,n) threshold scheme.
Naor and Shamir proposed further the idea of visual cryptography for sharing images. It can be seen as a visual variant of the k out of n secret sharing problem, in which each one of the n users gets a transparency; any k of them can see the image by stacking their transparencies, but any k-1 of them gain no information about it.
In this paper a new construction algorithm of visual cryptography is presented. First, we extend SFCOD (Space Filling Curve Ordered Dither – one of the techniques of halftoning) to transform a gray-level image into an image with fewer grayscale values. In addition, we extend the basic visual cryptography model to handle more than two grayscale values. Then the extended visual cryptography model can be applied to encode this image. This scheme satisfies the security and contrast conditions. It can reveal more details of original images in the decoded images than ordinary visual cryptography scheme. At last, an extension of this scheme for color images is included.
[1] A. Shamir, How to share a secret, Communications of the ACM, 22(11): 612- 613, November 1979.
[2] M. Naor, A. Shamir, Visual Cryptography, Advances in Cryptography – Eurocrypt ’94, pp. 1-12, 1995.
[3] G. Ateniese, C. Blundo, A. D. Santis, D. R. Stinson. Visual Cryptography for General Access Structure, Information and Computation, 129 (2), pp. 86--106, 1996.
[4] M. Naor, B. Pinkas, Visual Authentication and Identification, Lecture Notes in Computer Science.
[5] Chang, C. C. and Chuang, J. C., An Image Intellectual Property Protection Scheme for Gray-level Images Using Visual Secret Sharing Stragegy, Pattern Recognition Letters, Vol. 23, No. 8, 2003, pp. 931-941.
[6] E.R.Verheul, Henk C.A. Van Tilborg, Constructions and Properties of k out of n Visual Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 11, Issue 2 (May 1997), Pages: 179 – 196.
[7] C. C. Lin and W. H. Tsai, Visual Cryptography for Gray-level Images by Dithering Technique, Pattern Recognition Letters 24 (2003) 349-358.
[8] Yuefeng Zhang, Space-filling Curve Ordered Dither, Computers & Graphics 22(4): 559-563 (1998).
[9] Young-Chang Hou, Visual Cryptography for color images, Pattern Recognition 36 (2003) 1619-1629.