透過您的圖書館登入
IP:18.226.166.214
  • 學位論文

基於布林函數並具高安全性之多重影像秘密分享技術研究

A Study of Secure Boolean-based Multiple Secret Image Sharing Scheme

指導教授 : 陳建彰

摘要


本論文提出一個以(n, n)為門檻值的多重影像秘密分享技術,在此門檻值下可以分享n張秘密影像,並透過本文所提出的演算法產生相同數量的n張分享影像,還原時必須蒐集所有分享影像後才能將秘密影像依序還原。本論文所提出的演算法以XOR布林函式運算為主,故而能有極佳的執行效能。此外,以布林運算為基礎的分享方法,需要使用亂數影像將秘密影像打亂,本論文在分享及還原時,提出亂數影像生成函式,因此在相同數量的分享影像下,可以分享更多數量的秘密影像,也不必耗費額外空間紀錄亂數影像。   相較其他學者所提出的分享方法,本論文針對效能及安全性兩方面做了更佳的改進。在效能方面,本文所產生的亂數影像僅採用像素內之位元位移運算,不需要複雜的演算法計算,後續產生分享影像的過程依舊只有使用XOR運算,以確保本方法的高執行效能。安全性方面,其他學者以布林運算產生分享影像的方法雖然也可以達到秘密分享的效果,但是產生的分享影像可以看出特定秘密影像的輪廓,本文產生的分享影像為具高度安全性的亂數影像,因此安全性也大幅提升。

關鍵字

多重影像秘密分享 布林 XOR

並列摘要


An (n, n) multi-secret image sharing scheme shares n secret images among n shared images. In this type of schemes, n shared images can be used to recover all n secret images, but the loss of any shared image prevents the recovery of any secret image. Among existing image sharing techniques, Boolean-based secret schemes have good performance because they only require XOR calculation. This study presents a secure Boolean-based secret image sharing scheme that uses a random image generating function to generate a random image from secret images or shared images. The proposed function efficiently increases the sharing capacity on free of sharing the random image. Experimental results show that the proposed scheme requires minimal CPU computation time to share or recover secret images.

並列關鍵字

Multiple secret images sharing Boolean XOR

參考文獻


[2] C.C. Chen and W.J. Wu, “A secure Boolean-based multi-secret image sharing scheme”, The Journal of Systems and Software, vol. 92, pp.107–114, 2014.
[5] J. Chen, Y.S. Chen, Hsu, H.C. and H.W. Chen, “New visual cryptography system based on circular shadow image and fixed angle segmentation”, Journal of Electronic Imaging, vol. 14, pp.033018-1–033018-5, 2005.
[6] T.H. Chen, C.S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, vol. 91, pp.90–97, 2011.
[7] B.C. Dhara and B. Chanda, “A fast progressive image transmission scheme using block truncation coding by pattern fitting”, Journal of Visual Communication and Image Representation, vol. 23, pp. 313–322, 2012.
[8] W.P. Fang and W.P., “Friendly progressive visual secret sharing”, Pattern Recognition, vol. 41, pp. 1410–1414, 2008.

延伸閱讀