透過您的圖書館登入
IP:18.188.148.202
  • 學位論文

節省傳輸分享影像的視覺密碼之研究

A New Resources Saving Scheme on Visual Cryptography

指導教授 : 涂世雄

摘要


在本論文中,我們提出ㄧ個可有效改善投影片資源利用的視覺密碼方法。由視覺密碼我們可以得知,取得其機密影像的方式是藉由疊合數張分享影像而得,若要隱藏越多的機密影像勢必需要產生更多的分享影像,相對而言,當發送者要傳送分享影像給接收者時,勢必會送出較多的封包,也佔用了較大的頻寬。因此,我們將提出ㄧ個方法來改善之。 在提出的方法中,我們以像素擴展的方法及利用角度旋轉的概念為基礎來嘗試隱藏兩張機密影像。給定任意兩張等邊四邊形的機密影像,經過本論文所提出的方法處理過後,產生兩張分享影像S1與S2,S1與S2經由疊合可還原第一張機密影像,再將S2旋轉90度後與S1疊合一次,即得到第二張機密影像。 在提出的方法中,我們也針對分享影像的混亂度做補強,使任何一張分享影像每個區塊的雜亂程度極為平均。透過以上的方法,我們可以有效的降低資源的浪費,減少環境的汙染。 我們所提出的方法有下列幾點貢獻: 1.我們只需兩張分享影像,即可隱藏兩張機密影像。 2.可以有效減少透明投影片與碳粉的使用量,響應節能減碳。 我們相信本論文對擴展視覺密碼做更進ㄧ步改良的研究成果,在全球提倡節能減碳的環保概念下,對未來視覺密碼學的相關研究與應用上會有相當的助益。

關鍵字

半色調 視覺密碼

並列摘要


In this thesis, we propose an effective resource saving scheme on visual cryptography. Unlike traditional cryptography, visual secret sharing technology decodes a cipher text by using human’s eyes. It’s an excellent solution under the situation of not being able to decrypt by computer. Our proposed scheme is a brand new type of visual cryptography based on using pixel expansion method and changing turn angle method. For any two given square secret images, we use pixel expansion method to produce two corresponding transparencies S1 and S2. Both transparencies look noisy. When we stack the front views of both transparencies, the first secret image is obtained. Then we turn right ninety-degree on S2 and stack both transparencies again, the second secret image is obtained. In our proposed scheme, we also improve the noisy extent of share images. The contributions of our research are as follows: 1. In traditional visual cryptography, two share images can only be hidden one secret image. But in our proposed scheme, we can hide two secret images with two share images. 2. In traditional visual cryptography, hiding two secret images needs at least three share images, but we need only two share images on our proposed scheme. We can reduce amount of transparencies and black toner to reach to Energy Saving and Carbon Reduction purpose. We believe this study results will be probably practical and efficient to establish a useful visual cryptography scheme with above advantages in applications.

並列關鍵字

Halftone Visual Cryptography

參考文獻


[4] 倪明輝,“以影像統計資訊為基礎之強健性空間浮水印技術”,中原大學電機工程學系碩士論文,2004。
[5] 蔡曜州,“建構於空間-頻率域多重浮水印技術之數位影像著作權保護與認證”,中原大學電機工程學系碩士論文,2004。
[7] 呂晏君,“應用互斥或運算於全彩機密影像之分享”,淡江大學資訊管理學系碩士論文,2007。
[10] Jui-Cheng Yen and Jiun-In Guo; “Efficient hierarchial chaotic image encryption algorithm and its VLSI realization,” IEEE Proc. –Vis. Image Signal Process, 2000, 147(2):167-175.
[12] Lin, C. C., Tsai, W. H., “Visual Cryptography for Gray-level Images by Dithering Techniques,” Pattern Recognition Letters. (24), pp.349-358, 2003.

延伸閱讀