Translated Titles

Android System Development on Progressive Secret Image Sharing Scheme





Key Words

(s, t, n)秘密影像分享技術 ; 漸進式 ; 中國餘式定理 ; (s, t, n) secret image sharing method ; progressive ; Chinese Remainder Theorem



Volume or Term/Year and Month of Publication


Academic Degree Category




Content Language


Chinese Abstract

本文提出了一個(s, t, n)漸進式影像秘密分享系統,傳統的(t, n)影像秘密分享技術(t=>n且2<=n)在分享時將秘密影像分享成n把金鑰及與金鑰相對應的分享影像。每位分享者僅握有一把金鑰及一張分享影像,還原時只要取得t把金鑰及與金鑰相對應的分享影像經由計算後,即可回復無失真的原秘密影像。本方法採用中國餘式定理分享並由整數小波轉換來滿足漸進式特性的影像。首先,本文先將影像做整數小波轉換後,再對轉換後的各子影像進行分組,然後在各組子影像賦予分享門檻s到t,藉由這些門檻值的不同來建立具有漸進式功能的秘密影像分享系統。實驗結果顯示,基於中國餘式定理和整數小波轉換在Android平台上實際開發的影像秘密分享系統,有著極高效率的影像秘密分享與漸進特性。

English Abstract

This study presents an (s, t, n) progressive method for sharing a secret image. In which n shared images are generated from the secret image, collecting s shared images acquires coarse resolution of secret image, and collecting t or more shared images losslessly recovers the secret image. The proposed method employs the Chinese Remainder Theorem to share subimages acquired from integer wavelet transform with different thresholds for satisfying the progressive property. First, the proposed scheme applies the secret image to integer wavelet subimages. The maximum subimage number needed in wavelet transform is obtained from threshold s and t. Then, all subimages are partitioned to (t-s+1) groups and share each group with different thresholds to reconstruct the secret image progressively. Experimental results demonstrate that the proposed scheme based on Chinese Remainder Theorem preserves efficiency and progressive properties.

Topic Category 基礎與應用科學 > 資訊科學
工學院 > 資訊工程學系碩士班
  1. [1] C. C. Chen, C. C. Chen, Y. C. Lin, “A Weighted Modulated Secret Image Sharing Method”, Journal of Electronic Imaging, Vol. 18, No.4, 2009, 043011.
  2. [2] S. K. Chen and J. C. Lin, “Fault-tolerance and progressive transmission of images”, Pattern Recognition, Vol. 38, No. 12, 2005, pp. 2466–2471.
  3. [3] T. H. Chen and C. S. Wu, “Efficient multi-secret image sharing based on Boolean operations”, Signal Processing, Vol. 91, No. 1, 2011, pp. 90–97.
  4. [4] W. P. Fang, “Friendly progressive visual secret sharing”, Pattern Recognition, Vol. 41, No. 4, 2008, pp. 1410–1414.
  5. [5] P. J. V. Fleet, Discrete Wavelet Transformations: An Elementary Approach with Applications, John Wiley & Sons, Inc., 2011.
  6. [6] C. Guo, C.C. Chang, C. Qin, “A hierarchical threshold secret image sharing”, Pattern Recognition Letters, Vol. 33, No. 1, 2012, pp. 83–91.
  7. [7] Y. C. Hou, Z. Y. Quan, C. F. Tsai, A. Y. Tseng, “Block-based progressive visual secret sharing”, Information Sciences, Vol. 233, No. 1, 2013, pp.290–304.
  8. [8] Y. C. Hou and Z. Y. Quan “Progressive Visual Cryptography with Unexpanded Shares”, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 21, No. 11, 2011, pp.1760–1764.
  9. [9] C. P. Huang, C. H. Hsieh, P. S. Huang, “Progressive sharing for a secret image”, Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 517–527.
  10. [10] K. H. Hung, Y. J. Chang, J. C. Lin, “Progressive sharing of an image”, Optical Engineering, Vol. 48, No. 4, 2008, 047006.
  11. [11] S. J. Lin, S. K. Chen, J. C. Lin, “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Journal of Visual Communication and Image Research, Vol. 21, No. 8, 2010, pp. 900–916.
  12. [12] M Quisquater, B Preneel, J. Vandewalla, “On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem”, in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, 2002, pp.199–210
  13. [13] S. J. Shyu and Y. R. Chen, “Threshold Secret Image Sharing by Chinese Remainder Theorem”, in IEEE Asia-Pacific Services Computing Conference, 2008, pp. 1332–1337.
  14. [14] C. C. Thien and J. C. Lin, “Secret image sharing”, Computers & Graphics, Vol. 26, No. 5, 2002, pp. 765–770.
  15. [15] M. Ulutas, G. Ulutas, V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images”, The Journal of Systems and Software, Vol. 86, No. 2, 2013, pp. 485–500.
  16. [16] D. Wang, L. Zhang, N. Ma, X. Li, “Two secret sharing schemes based on Boolean operations”, Pattern Recognition, Vol. 40, No. 10, 2007, pp. 2776–2785.
  17. [17] R. Z. Wang, Y. F. Chien, Y. Y. Lin, “Scalable user-friendly image sharing”, Journal of Visual Communication and Image Research, Vol. 21, No. 7, 2010, pp. 751–761.
  18. [18] X. Wu, D. Ou, Q. Liang, W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata”, The Journal of Systems and Software, Vol. 85, No. 8, 2012, pp. 1852–1863.
  19. [19] C. N. Yang, J. F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, Vol. 285, No. 7, 2012, pp. 1725–1735.