On Visual Cryptography of Multiple Secret Images

碩士 === 國立交通大學 === 多媒體工程研究所 === 102 === This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method enco...

Full description

Bibliographic Details
Main Authors: Li, Fong-Jheng, 李豐政
Other Authors: Lin, Ja-Chen
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/k3qv8e
id ndltd-TW-102NCTU5641031
record_format oai_dc
spelling ndltd-TW-102NCTU56410312019-05-15T21:50:57Z http://ndltd.ncl.edu.tw/handle/k3qv8e On Visual Cryptography of Multiple Secret Images 多張機密影像的視覺加密技術 Li, Fong-Jheng 李豐政 碩士 國立交通大學 多媒體工程研究所 102 This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method encodes twelve secret images into two transparencies. We can get twelve secret images respectively by eight different stacking types. 2) High hiding capacity: for four given secret images, two transparencies are produced. Stacking in different manners, we can decode four secret images respectively. Total space needed is smaller than the bits of total secret images. In constrained (2,3) model, the method encodes four secret images into three transparencies. We only can decode secret images by stacking the most important transparency with either one of the two other transparencies. This method can be extended into (2,k) model. Finally, in the folding model, we fold down a transparency, and then stack with the other to decode secret images. Lin, Ja-Chen 林志青 2014 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 多媒體工程研究所 === 102 === This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method encodes twelve secret images into two transparencies. We can get twelve secret images respectively by eight different stacking types. 2) High hiding capacity: for four given secret images, two transparencies are produced. Stacking in different manners, we can decode four secret images respectively. Total space needed is smaller than the bits of total secret images. In constrained (2,3) model, the method encodes four secret images into three transparencies. We only can decode secret images by stacking the most important transparency with either one of the two other transparencies. This method can be extended into (2,k) model. Finally, in the folding model, we fold down a transparency, and then stack with the other to decode secret images.
author2 Lin, Ja-Chen
author_facet Lin, Ja-Chen
Li, Fong-Jheng
李豐政
author Li, Fong-Jheng
李豐政
spellingShingle Li, Fong-Jheng
李豐政
On Visual Cryptography of Multiple Secret Images
author_sort Li, Fong-Jheng
title On Visual Cryptography of Multiple Secret Images
title_short On Visual Cryptography of Multiple Secret Images
title_full On Visual Cryptography of Multiple Secret Images
title_fullStr On Visual Cryptography of Multiple Secret Images
title_full_unstemmed On Visual Cryptography of Multiple Secret Images
title_sort on visual cryptography of multiple secret images
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/k3qv8e
work_keys_str_mv AT lifongjheng onvisualcryptographyofmultiplesecretimages
AT lǐfēngzhèng onvisualcryptographyofmultiplesecretimages
AT lifongjheng duōzhāngjīmìyǐngxiàngdeshìjuéjiāmìjìshù
AT lǐfēngzhèng duōzhāngjīmìyǐngxiàngdeshìjuéjiāmìjìshù
_version_ 1719120022167617536