透過您的圖書館登入
IP:3.145.64.241
  • 學位論文

使用數獨庫之可還原性 (2, 3) 機密分享技術研究

A (2, 3) Threshold Secret Sharing Scheme with Reversibility Using Sudoku

指導教授 : 周永振
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於資訊科技進一步的發展,機密資料傳送 (Secret data delivery) 已經成為近幾年重要的研究領域。門檻值為 (2, 3) 的機密分享法不僅達到機密資料傳送的目的,而且也能夠增加機密資料的安全性。本論文提出的方法使用一張原始偽裝影像 (cover imsage) 去產生出三張影子影像 (shadow images),以用來夾帶及傳送機密資料給電腦網路上的接收者。且機密資料 (secret data) 可以利用本論文所提出的機密抽取步驟,即是結合至少兩張影子影像 (shadow image),就能抽取出機密資料 (secret data)。此外,原始偽裝影像 (cover image) 也能在解開機密資料之後,完整地重建出來。最後從實驗結果可以得知,本論文提出的方法所產生的影子影像 (shadow image),影像品質平均高於 34 dB。

並列摘要


Secret data delivery is an important research field in recent years because of the development of advanced information technique. (2, 3) threshold secret sharing scheme not only achieves the goal of secret data delivery but also increases security. The proposed scheme uses one cover image to generate three shadow images for carrying secret data and deliver it to a receiver over the computer networks. The secret data can be extracted from shadow images by using the proposed secret extracting procedure cooperating with at least two shadow images. Moreover, the cover image can be fully reconstructed after secret data has been extracted. From the experimental results, the visual quality of shadow images generated by the proposed scheme is higher than 34 dB in average.

參考文獻


[3] C. C. Chang and C. Y. Lin. Reversible steganography for vq-compressed images
[4] C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan. A high payload frequency-
[1] C.K. Chan and L.M. Chen. Hiding data in images by simple lsb substitution. Pat-
[2] C. C. Chang and T. D. Kieu. A reversible data hiding scheme using complementary
based reversible image hiding method. Information Sciences, Vol. 180, No. 11,

延伸閱讀