A Study of Novel Visual Secret Sharing with Non-expansion Share Images
碩士 === 國立中興大學 === 資訊管理學系所 === 98 === Visual secret sharing was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can not obtain any information about the secret image. The manager distributes these share ima...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/58118319204647693506 |
id |
ndltd-TW-098NCHU5396004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NCHU53960042015-10-30T04:05:03Z http://ndltd.ncl.edu.tw/handle/58118319204647693506 A Study of Novel Visual Secret Sharing with Non-expansion Share Images 像素不擴張視覺機密分享技術之研究 Hong-Hao Chen 陳鴻豪 碩士 國立中興大學 資訊管理學系所 98 Visual secret sharing was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can not obtain any information about the secret image. The manager distributes these share images to different participants. The secret image can be recovered by stacking the qualified set of share images. On the contrary, nothing can be obtained if the set is unqualified. The main issues of visual secret sharing are how to reduce expansion rate and raise revealing contrast of the recovered secret image. Therefore, this thesis proposes two visual secret sharing schemes without pixel expansion and provides better quality of the recovered secret image. The first scheme is based on pixel swapping technique. This scheme embeds a main secret and an extra confidential image into two cover images. Both of the generated share images are meaningful. People can obtain the main secret image by stacking the share images together, and the extra confidential image can be revealed by shifting one of the share images for certain units for authentication. Except for sharing binary secret image, this scheme can also apply to share color secret image. The second scheme encodes a grayscale secret image into two share images with six kinds of gray levels. This scheme provides better visual quality of recovered secret image. In decoding process, the properties of non-expansion and high recovered image quality preserve the characteristics of original secret image; so that the recovered secret information can be recognized correctly, correctness is raised. Furthermore, the meaningful share images in the first scheme and high quality of share images do not attract to attackers and easy for management, security is enhanced. Chwei-Shyong Tsai 蔡垂雄 2010 學位論文 ; thesis 54 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊管理學系所 === 98 === Visual secret sharing was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can not obtain any information about the secret image. The manager distributes these share images to different participants. The secret image can be recovered by stacking the qualified set of share images. On the contrary, nothing can be obtained if the set is unqualified. The main issues of visual secret sharing are how to reduce expansion rate and raise revealing contrast of the recovered secret image. Therefore, this thesis proposes two visual secret sharing schemes without pixel expansion and provides better quality of the recovered secret image. The first scheme is based on pixel swapping technique. This scheme embeds a main secret and an extra confidential image into two cover images. Both of the generated share images are meaningful. People can obtain the main secret image by stacking the share images together, and the extra confidential image can be revealed by shifting one of the share images for certain units for authentication. Except for sharing binary secret image, this scheme can also apply to share color secret image. The second scheme encodes a grayscale secret image into two share images with six kinds of gray levels. This scheme provides better visual quality of recovered secret image. In decoding process, the properties of non-expansion and high recovered image quality preserve the characteristics of original secret image; so that the recovered secret information can be recognized correctly, correctness is raised. Furthermore, the meaningful share images in the first scheme and high quality of share images do not attract to attackers and easy for management, security is enhanced.
|
author2 |
Chwei-Shyong Tsai |
author_facet |
Chwei-Shyong Tsai Hong-Hao Chen 陳鴻豪 |
author |
Hong-Hao Chen 陳鴻豪 |
spellingShingle |
Hong-Hao Chen 陳鴻豪 A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
author_sort |
Hong-Hao Chen |
title |
A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
title_short |
A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
title_full |
A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
title_fullStr |
A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
title_full_unstemmed |
A Study of Novel Visual Secret Sharing with Non-expansion Share Images |
title_sort |
study of novel visual secret sharing with non-expansion share images |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/58118319204647693506 |
work_keys_str_mv |
AT honghaochen astudyofnovelvisualsecretsharingwithnonexpansionshareimages AT chénhóngháo astudyofnovelvisualsecretsharingwithnonexpansionshareimages AT honghaochen xiàngsùbùkuòzhāngshìjuéjīmìfēnxiǎngjìshùzhīyánjiū AT chénhóngháo xiàngsùbùkuòzhāngshìjuéjīmìfēnxiǎngjìshùzhīyánjiū AT honghaochen studyofnovelvisualsecretsharingwithnonexpansionshareimages AT chénhóngháo studyofnovelvisualsecretsharingwithnonexpansionshareimages |
_version_ |
1718115702734323712 |