帳號:guest(18.189.189.67)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:楊嶧昀
作者(英文):Yi-Yun Yang
論文名稱:使用更改及重算策略提升影像品質的秘密影像分享
論文名稱(英文):Enhancing Image Quality in Secret Image Sharing by Modify-and-Recalculate Strategy
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:張道顧
郭文中
口試委員(英文):Tao-Ku Chang
Wen-Chung Kuo
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610621222
出版年(民國):109
畢業學年度:108
語文別:英文
論文頁數:40
關鍵詞:秘密分享秘密影像分享多項式秘密影像分享模除計算有限域
關鍵詞(英文):Secret sharingSecret image sharingPolynomial secret image sharingModular arithmeticFinite field
相關次數:
  • 推薦推薦:0
  • 點閱點閱:20
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:22
  • 收藏收藏:0
自1979年以來,Shamir提出(k,n)秘密分享後,具門檻式的秘密分享的研究便開始受到廣泛地研究。(k,n)秘密分享是將秘密分成n個子秘密,從任k個或k個以上的子秘密還原出原始秘密。倘若子秘密的數目低於k,則無法獲得任何秘密資訊。把秘密分享擴展到秘密影像分享時,並不只是簡單地把秘密替換成數位影像。而是要考慮下面四個主要關鍵問題:(1)秘密影像分享的秘密需是有意義的影像內容(2)有限域的選擇(3)多項式哪裡嵌入秘密(4)子影像內容是隨機或有意義。本論文主要是研究第二項—有限域的選擇,以維持還原後的秘密影像品質。
以有限域的選擇而言,很明顯地秘密分享需要選擇模除運算的mod p有限域,而且這個質數p必須是大於秘密值的最小質數。另一方面,秘密影像分享需能處理0~255的像素值。因此,最合理的有限域選擇是GF(2^8)有限域,它可以處理影像中的256個灰階值可以使秘密影像無損地還原。但是使用GF(2^8)有限域,運算較為複雜、耗費的時間也隨之提升。有人採用mod 251這種簡單的模除運算。因為251是小於256的最大質數,所以mod 251是有限域。雖然選擇mod 251降低了運算複雜度,但是大於250的像素值需刪減至250以下,這會導致失真。
本論文,我們保留了簡單模除運算在計算上帶來的優勢,並且放鬆植基於像素的處理方式(例如:1個像素是N=8位元、而2個像素是N=16位元)。本篇論文使用小於2^N的最大質數PG以及大於2^N的最小質數PS做為模數。使用PG時,若數值不小於PG則刪減像素值。使用PS時,需配上更改與重算策略來調整生成的模數運算結果,使其得落在合法的範圍0到2^N-1之間。更改時,可能會產生失真。在 N=8~17時,我們理論分析出最佳使用的PG與PS值。
Since Shamir proposed the (k, n) secret sharing scheme in 1979, research of threshold secret sharing has been widely studied. (k, n) secret sharing divides the secret into n shares (or shadows), and reconstructed by using any k or more shadows. However, nothing is revealed about secret for less than k shadows. When extending secret sharing to secret image sharing (SIS), we have to consider the following issues: (i) the secret of SIS should be meaningful visual image (ii) the choice of finite field (iii) embedded positions in a polynomial (iv) meaningful or unmeaningful shadows. In this thesis, our study is dedicated on issue (ii) how to choose a finite field to maintain the visual quality of recovered image.
A finite field of secret sharing should be used, such that the reconstruction can be successfully accomplished. Obviously, for achieving simple and fat computation, we often choose mod p modular operation, where p is a prime and larger than secret value. For SIS, we have to deal with the pixel values from 0 to 255. The most reasonable choice is GF(2^8), which can process 256 grayness in image and recover secret image without distortion. However, this increases the computation complexity when using GF(2^8). Thus, using simple modular arithmetic operation, e.g., mod 251, is adopted. Note: 251 is the greatest prime less than 256. This modular arithmetic has the less complexity when compared with GF(2^8), but has distortion because the grayness 251~255 is truncated to 250.
In this thesis. We still use simple modular arithmetic for efficient computation, and meantime we loose the restriction of using pixel-wised operation (for example: 1 pixel is N=8 bits and 2 pixels is N=16 bits). Here, we use the greatest prime PG, less than 2^N or the smallest prime PS greater than 2^N. For using mod PG operation, if the pixel value is not lesser than PG then we should truncate the pixel value. For using mod PS operation, the modify-and-recalculate strategy will be used to make sure that the modular result is within the interval [0, 2^N-1]. The distortion could be generated from modification. For N=8~17, we theoretically and experimentally to analyze the optimal using of PG and PS for various values of N.
Chapter 1 Introduction 1

Chapter 2 Related Work 5
2.1 Polynomial based SIS 5
2.2 Wu et al.’s method 6

Chapter 3 The Proposed Method 7
3.1 Motivation 7
3.2 Framework 8
3.3 Modify-and-recalculate strategy 11
3.4 Image quality by mod PS sharing 15

Chapter 4 Experiment and Comparison 19
4.1 Number of flipped bits 20
4.2 Visual quality 23
4.3 Comparisons 25
4.4 Hybrid used of mod PS and PG 28
4.5 Security analysis 28
4.6 Computational complexity 30

Chapter 5 Conclusion and Future Work 33

References 35
[BLAK79] G.R. Blakley, “Safeguarding Cryptographic Keys,” Proceedings of the AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317.
[CHEN11] T.H. Chen, and K.H. Tsao, “Threshold visual secret sharing by random grids,” Journal of Systems and Software, vol. 84, pp. 1197–1208, 2011.
[CHEN16] C.C. Chen, and S.C. Chen, “Two-layered structure for optimally essential secret image sharing scheme,” Journal of Visual Communication and Image Representation, vol. 38, pp.595–601, 2016.
[GHEB17] M. Ghebleh, A. Kanso, “A novel secret image sharing scheme using large primes,” Multimedia Tools and Applications, vol.77, pp. 11903–11923, 2018.
[HU19] Y.X. Hu, and Y.N. Liu, “A progressively essential secret image sharing scheme using hierarchy shadow,” Journal of Information Security and Applications, vol. 47, pp. 371–376, 2019.
[JIA18] X. Jia, D. Wang, D. Nie, and C. Zhang, “Collaborative visual cryptography schemes,” IEEE Transactions on Circuits and Systems for Video Technology. vol. 28, pp. 1056–1070, 2018.
[JIA18] X. Jia, D. Wang, Q. Chu, and Z. Chen, “An efficient XOR-based verifiable visual cryptographic scheme,” Multimedia Tools and Applications, vol. 78, pp. 8207–8223, 2019.
[KABI19] S. Kabirirad, and Z. Eslami, “Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations,” Journal of Information Security and Applications, vol. 47, pp.16–27, 2019.
[KANS17] A. Kanso, and M. Ghebleh, “An efficient (t, n)–threshold secret image sharing scheme,” Multimedia Tools and Applications, vol. 76, pp. 16369–16388, 2017.
[LI13] P. Li, C.N. Yang, C.C. Wu, Q. Kong, Y. Ma, “Essential secret image sharing scheme with different importance of shadows,” Journal of Visual Communication and Image Representation, vol. 24, pp. 1106–1114, 2013.
[LIN03] C.C. Lin, and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, pp. 405–414, 2004.
[LIN07] S.J. Lin, and J.C. Lin, “VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,” Pattern Recognition, vol. 40, pp. 3652–3666, 2007.
[LIN10] Y.Y. Lin, and R.Z. Wang, “Scalable secret image sharing with smaller shadow images,” IEEE Signal Processing Letters, vol. 17, 316–319, 2010.
[LIU10] F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptography schemes,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 27–38, 2010.
[LIU17] Y. Liu, and C.N. Yang, “Scalable secret image sharing scheme with essential shadows,” Signal Processing: Image Communication, vol. 58, pp. 49–55, 2017.
[LIU18] Y. Liu, C.N. Yang, S. Wu, and Y. Chou, “Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes,” Signal Processing: Image Communication, vol. 66, pp. 77–86, 2018.
[MEGH19] Y.K. Meghrajani, L.S. Desai, and H.S. Mazumdar, “Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share,” Journal of Information Security and Applications, vol. 47, pp. 267–74, 2019.
[NAOR95] M. Naor, and A. Shamir, “Visual cryptography,” In: Proceedings of the Advances in Cryptology– EUROCRYPT’94, Lecture Notes in Computer Science, vol. 950, pp.1–12, 1995.
[SHAM79] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, pp. 612–613, 1979.
[SRIV16] S. Srividhya, R. Sathishkumar, and G.F. Sudha, “Implementation of tiOISSS with meaningful shadows and with an additional authentication image,” Journal of Visual Communication and Image Representation, vol. 38, pp. 284–296, 2016.
[THIE02] C.C. Thien, and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, pp. 765–770, 2002.
[THIE03] C.C. Thien, and J.C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 1161–1169. 2003.
[WANG04] R.Z. Wang, and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, pp. 551–555, 2006.
[WANG13] D.S. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal contrast grayscale visual cryptography schemes with reversing,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 2059–2072, 2013.
[WEIR10] J. Weir, and W. Yan, “A comprehensive study of visual cryptography,” Transactions on Data Hiding and Multimedia Security V,” pp. 70–105, 2010.
[WU14] X. Wu, and W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1592–1605, 2014.
[WU18] X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving recovered image quality in secret image sharing by simple modular arithmetic,” Signal Processing: Image Communication, vol. 66, pp. 42–49, 2018.
[WU19a] X. Wu, and Z.R. Lai, “Random grid based color visual cryptography scheme for black and white secret images with general access structures,” Signal Processing: Image Communication, vol. 75, pp.100–110, 2019.
[WU19b] X. Wu, and C.N. Yang, “A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,” Journal of Visual Communication and Image Representation, vol. 61, pp. 74–84, 2019.
[WU19c] X. Wu X, C.N. Yang, “Partial reversible AMBTC-based secret image sharing with steganography,” Digital Signal Processing, vol. 93, pp. 22–33, 2019.
[WU19d] X. Wu, and C.N. Yang, “Invertible secret image sharing with steganography and authentication for AMBTC compressed images,” Signal Processing: Image Communication, vol. 78, pp. 437–447, 2019.
[YAN17] X. Yan, and Y. Lu, “Contrast-improved visual secret sharing based on random grid for general access structure,” Digital Signal Processing, vol. 71, pp. 36–45,2017.
[YAN19a] X. Yan, Y. Lu, and L. Liu, “A general progressive secret image sharing construction method,” Signal Processing Image Communication, vol. 71, pp. 66–75, 2019.
[YAN19b] X. Yan, L. Liu, Y. Lu, Q. Gong, “Security analysis and classification of image secret sharing,” Journal of Information Security and Applications, vol. 47, pp. 208–16, 2019.
[YANG04] C.N. Yang, “New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters, vol. 25, pp. 486–494, 2004.
[YANG07] C.N. Yang, T.S. Chen, K.H. Yu, C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, pp. 1070–1076, 2007.
[YANG10a] C.N. Yang, C.B. Ciou, “Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,” Image and Vision Computing, vol. 28, pp. 1600–1610, 2010.
[YANG10b] C.N. Yang, and S.M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Optics Communications, vol. 283, pp. 1750–1762, 2010.
[YANG11] C.N. Yang, and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems and Software, vol. 84 pp. 1726–1733, 2011.
[YANG12] C.N. Yang, J.F. Ouyang, L. Harn, “Steganography and authentication in image sharing without parity bits,” Optics Communications, vol. 285, pp. 1725–1735, 2012.
[YANG15] C.N. Yang, P. Li, C.C. Wu, and S.R. Cai, “Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach,” Signal Processing: Image Communication, vol. 31, pp. 1–9, 2015.
[ZHAO09] R. Zhao, J. Zhao, F. Dai, and F. Zhao, “A new image secret sharing scheme to identify cheaters,” Computer Standards & Interfaces, vol. 31, pp. 252–257, 2009.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *