Visual Cryptography With Identifiable Shares
碩士 === 元智大學 === 資訊工程學系 === 98 === The thesis proposes a visual cryptography (VC) scheme with identifiable shares. In the proposed (t, n), 2 ? t ? n sharing method, the input image O is encoded in n shares that exhibits the following features: (1) each share is the same scale as O and has noise-like...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/87030647164058874207 |
id |
ndltd-TW-098YZU05392027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098YZU053920272015-10-13T18:20:43Z http://ndltd.ncl.edu.tw/handle/87030647164058874207 Visual Cryptography With Identifiable Shares 具可識分存之視覺式秘密分享 Yao-Ting Lee 李曜廷 碩士 元智大學 資訊工程學系 98 The thesis proposes a visual cryptography (VC) scheme with identifiable shares. In the proposed (t, n), 2 ? t ? n sharing method, the input image O is encoded in n shares that exhibits the following features: (1) each share is the same scale as O and has noise-like appearance, (2) stacking t?1 or less shares reveals no secret, (3) the secrets can be revealed by superimposing t or more shares, (4) folding a share up can disclose some tag patterns, and (5) both of the secret information and the tag patterns are recognized by naked eye without any computation. The property to show up tag patterns on folded shares is a new concept in visual cryptography scheme. The tag patterns provide diverse capabilities to the VC scheme, such as (1) augmented message to the secret information, (2) a simple and user-friendly interface for managing the numerous shares created by VC schemes, and (3) evidence for verifying consistency among those shares cooperating in a decoding instance. A (2, 2) sharing scheme using random grids and another (t, n) VC method based on probabilistic VC are implemented. Simulation results show that both the revealed secret messages and tag patterns can be recognized easily by naked eye, and no regular patterns are appeared if less than t shares are stacked, demonstrating the feasibility and high security of the proposed scheme. Ran-Zan Wang 王任瓚 2010 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 元智大學 === 資訊工程學系 === 98 === The thesis proposes a visual cryptography (VC) scheme with identifiable shares. In the proposed (t, n), 2 ? t ? n sharing method, the input image O is encoded in n shares that exhibits the following features: (1) each share is the same scale as O and has noise-like appearance, (2) stacking t?1 or less shares reveals no secret, (3) the secrets can be revealed by superimposing t or more shares, (4) folding a share up can disclose some tag patterns, and (5) both of the secret information and the tag patterns are recognized by naked eye without any computation. The property to show up tag patterns on folded shares is a new concept in visual cryptography scheme. The tag patterns provide diverse capabilities to the VC scheme, such as (1) augmented message to the secret information, (2) a simple and user-friendly interface for managing the numerous shares created by VC schemes, and (3) evidence for verifying consistency among those shares cooperating in a decoding instance. A (2, 2) sharing scheme using random grids and another (t, n) VC method based on probabilistic VC are implemented. Simulation results show that both the revealed secret messages and tag patterns can be recognized easily by naked eye, and no regular patterns are appeared if less than t shares are stacked, demonstrating the feasibility and high security of the proposed scheme.
|
author2 |
Ran-Zan Wang |
author_facet |
Ran-Zan Wang Yao-Ting Lee 李曜廷 |
author |
Yao-Ting Lee 李曜廷 |
spellingShingle |
Yao-Ting Lee 李曜廷 Visual Cryptography With Identifiable Shares |
author_sort |
Yao-Ting Lee |
title |
Visual Cryptography With Identifiable Shares |
title_short |
Visual Cryptography With Identifiable Shares |
title_full |
Visual Cryptography With Identifiable Shares |
title_fullStr |
Visual Cryptography With Identifiable Shares |
title_full_unstemmed |
Visual Cryptography With Identifiable Shares |
title_sort |
visual cryptography with identifiable shares |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/87030647164058874207 |
work_keys_str_mv |
AT yaotinglee visualcryptographywithidentifiableshares AT lǐyàotíng visualcryptographywithidentifiableshares AT yaotinglee jùkěshífēncúnzhīshìjuéshìmìmìfēnxiǎng AT lǐyàotíng jùkěshífēncúnzhīshìjuéshìmìmìfēnxiǎng |
_version_ |
1718030187858231296 |