透過您的圖書館登入
IP:3.146.34.217
  • 學位論文

支援相異存取權限並確保隱私之影像保護的研究

A Research on Privacy-preserved Image Protection Supporting Different Access Rights

指導教授 : 張雅芬 黃慧鳳
本文將於2027/07/31開放下載。若您希望在開放下載時收到通知,可將文章加入收藏

摘要


迅速發展的雲端計算和社群網路引領著大量的用戶使用網路,為了保護具隱私的數位內容,透過適當的隱私保護機制可確保個人隱私資訊不會外洩。一般而言,以往的圖片保護技術都是針對整張圖片進行保護,但單一影像中往往包含了許多人的相關資訊,而不同人的隱私資訊也可能需要有不同存取權限的保護需求。透過雲端伺服器可在不增加額外負擔下完成影像保護機制與影像權限管理相關工作,然而雲端上的未知安全漏洞與機密資料外洩風險導致我們不能完全信任雲端服務供應商。故如何利用雲端伺服器所提供之資源來完成單一影像不同存取權限的隱私保護,且同時又不讓雲端伺服器得知影像內的隱私資料,便成為一大挑戰。在本研究中,我們基於解因數分解與離散對數的難度,設計出可在單一影像內設定不同存取權限的隱私保護機制,並在該影像隱私保護機制的基礎下,設計雲端伺服器的影像管理方法,確保雲端伺服器無法取得受保護影像內的隱私資料。

並列摘要


The boom in cloud computing and social networking has led to a large number of online users into the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, the image may contain multiple users’ information, and different people’s data may require different privacy protection. Besides, cloud servers are semi-trusted instead of trusted service providers due to unknown security vulnerabilities and the possibility of grabbing sensitive data from the cloud server. In order to provide image protection with different privacy-preserved access rights and prevent the cloud server from retrieving sensitive information from the image, we propose a privacy-preserved scheme that supports different privacy-preserved access rights in a single image based on the difficulty of solving the factorization problem and the discrete logarithm problem. The cloud server will perform the image management method without knowing the privacy information contained in the protected images.

參考文獻


[1] M. Naor and A. Shamir, “Visual cryptography,” Proceedings of the Advances in Cryptology (Eurocrypt’94), Lecture Notes in Computer Science, vol. 950, Springer-Verlag, Perugia, Italy, 1994, pp. 1-12.
[2] P. Li, J. Ma, L. Yin, and Q. Ma, “A construction method of (2, 3) visual cryptography scheme,” IEEE Access, vol. 8, pp. 32840-32849, 2020.
[3] P. L. Chiu and K. H. Lee, “Threshold visual cryptography schemes with tagged shares,” IEEE Access, vol. 8, pp. 111330-111346, 2020.
[4] C. N. Yang and Y. Y. Yang, “On the analysis and design of visual cryptography with error correcting capability,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 6, pp. 2465-2479, 2021.
[5] J. S. Pan, T. Liu, H. M. Yang, B. Yan, S. C. Chu, and T. Zhu, “Visual cryptography scheme for secret color images with color QR codes” Journal of Visual Communication and Image Representation, vol. 82, pp. 103405, 2022.

延伸閱讀