Research in Visual Security — base on flat RGB Display
碩士 === 淡江大學 === 資訊管理學系 === 90 === Visual Security which differs from traditional cryptography was proposed in recent years. Visual Security does not need any cryptographic theory nor cryptographic algorism. The way to cryptograph is breaking down original image into several shared image...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/46414900476082463106 |
id |
ndltd-TW-090TKU00396006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090TKU003960062016-06-24T04:14:56Z http://ndltd.ncl.edu.tw/handle/46414900476082463106 Research in Visual Security — base on flat RGB Display 視覺資訊安全之研究-以平面RGB顯示為例 Chou Chi Hung 周啟弘 碩士 淡江大學 資訊管理學系 90 Visual Security which differs from traditional cryptography was proposed in recent years. Visual Security does not need any cryptographic theory nor cryptographic algorism. The way to cryptograph is breaking down original image into several shared images and each sheared image can not indicate the full information of original image. To decrypt we just need overlap these shared images and using human vision to obtain the original information. We discuss three Visual Security techniques based on RGB. During crypt we also use dispersing RGB and dropping off image degree to hide the original information. These ways extend the spirit of traditional Visual Security and provide a very simple way to decrypt-human vision. In terms of security , the probability of decrypt is based on pixel extend and 24-bits full color mode will be (256)-2m×n . It indicates that the cryptographic information can not be obtained from any single shared images. Hung-Chang Lee Ph.D. 李鴻璋 2002 學位論文 ; thesis 40 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 資訊管理學系 === 90 === Visual Security which differs from traditional cryptography was proposed in recent years. Visual Security does not need any cryptographic theory nor cryptographic algorism. The way to cryptograph is breaking down original image into several shared images and each sheared image can not indicate the full information of original image. To decrypt we just need overlap these shared images and using human vision to obtain the original information.
We discuss three Visual Security techniques based on RGB. During crypt we also use dispersing RGB and dropping off image degree to hide the original information. These ways extend the spirit of traditional Visual Security and provide a very simple way to decrypt-human vision. In terms of security , the probability of decrypt is based on pixel extend and 24-bits full color mode will be (256)-2m×n . It indicates that the cryptographic information can not be obtained from any single shared images.
|
author2 |
Hung-Chang Lee Ph.D. |
author_facet |
Hung-Chang Lee Ph.D. Chou Chi Hung 周啟弘 |
author |
Chou Chi Hung 周啟弘 |
spellingShingle |
Chou Chi Hung 周啟弘 Research in Visual Security — base on flat RGB Display |
author_sort |
Chou Chi Hung |
title |
Research in Visual Security — base on flat RGB Display |
title_short |
Research in Visual Security — base on flat RGB Display |
title_full |
Research in Visual Security — base on flat RGB Display |
title_fullStr |
Research in Visual Security — base on flat RGB Display |
title_full_unstemmed |
Research in Visual Security — base on flat RGB Display |
title_sort |
research in visual security — base on flat rgb display |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/46414900476082463106 |
work_keys_str_mv |
AT chouchihung researchinvisualsecuritybaseonflatrgbdisplay AT zhōuqǐhóng researchinvisualsecuritybaseonflatrgbdisplay AT chouchihung shìjuézīxùnānquánzhīyánjiūyǐpíngmiànrgbxiǎnshìwèilì AT zhōuqǐhóng shìjuézīxùnānquánzhīyánjiūyǐpíngmiànrgbxiǎnshìwèilì |
_version_ |
1718321053466361856 |