帳號:guest(3.15.189.199)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:陳怡誠
作者(英文):Yi-Cheng Chen
論文名稱:門檻值可變的k-out-of-n 漸進式秘密影像分享機制
論文名稱(英文):Threshold Changeable (k, n) Progressive Secret Image Sharing Scheme
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:郭文中
張道顧
口試委員(英文):Wen-Chung Kuo
Tao-Ku Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610721225
出版年(民國):109
畢業學年度:108
語文別:英文
論文頁數:31
關鍵詞:秘密影像分享門檻可變機制全有或全無解碼模型漸進式解碼模型
關鍵詞(英文):Secret image sharingThreshold changeable schemeAll-or-nothingProgressive recovery
相關次數:
  • 推薦推薦:0
  • 點閱點閱:19
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:16
  • 收藏收藏:0
秘密影像分享是結合了密碼與數位影像技術的研究,使秘密影像能夠在一種安全的協議下被妥善的保護以及分享。秘密影像分享技術是一種需要滿足門檻值條件,才能夠解回秘密影像。此種技術可以有各種不同的應用,能有效率、妥善地防止惡意攻擊、及竊取等等的破壞行為。有關秘密影像分享,現有文獻已有大量的研究和實作。一般而言,秘密影像分享大部分是 (k, n) 門檻式機制。所謂門檻方案,k為解回秘密的門檻值,n則為子影像的數目。k張以上的子影像可解回秘密影像,若是少於k張子影像則不能解回。其中 k值是固定的,也稱為全有或全無解碼模型 (all-or-nothing decoding model)。另外一種秘密影像分享的解密模型,我們稱之為漸進式的解碼模型 (progressive decoding model)。k張子影像可解回部份秘密影像,(k+1)張子影像解得更清晰秘密影像,直到所有n張子影像解回完整的秘密。

本論文研究門檻值可變的秘密影像。從一個原本是(k, n)漸進式的解密模型,因安全環境的改變,門檻轉換成變全有或全無解碼模型。這個安全環境改變的原因可能是解回秘密的迫切性增加。我們等不及這種漸進式的解密,需所有n個使用者都到位參與解才能回完整秘密。在我們的方案中,每位參與者只需要保留一個初始子影像。在漸進式的解碼模型,這些初始子影像不需要任何修改即可用來做漸進式解回秘密影像。另一方面,當選擇全有或全無解碼模型時,系統管理者會發佈額外的訊息,k個參與者藉由這些公佈的額外訊息與自己的初始子影像就能採用全有或全無的模型解回秘密影像。我們提出了兩種門檻值可變的(k, n)漸進式秘密影像分享機制,他們各自公佈的訊息量不一樣。
Secret image sharing is a combination of cryptographic and digital imaging, so that secret images can be properly protected and shared under a secure protocol. Secret image sharing needs to meet the threshold conditions to be able to retrieve the secret image, it can apply on various applications, which can efficiently prevent malicious attacks, stealing, and other sabotages also have a lot of research and implementation of existing literature. In SIS-(k, n) scheme, k is the threshold for retrieving secrets, and n is the number of sub-images. Recover the secret image if sub-images more than k, otherwise it cannot be recovery. We called all-or-nothing decoding model when the k is fixed. In another type, we called progressive decoding model. The k sub-images can recover part of the secret images then the (k+1) sub-images resolve the secret images more clearly, until all n sub-images resolve the all secret.

The thesis proposes thresholds changeable SIS-scheme. In the (k, n) progressive decryption model, due to changes in the environment, the threshold will convert to all-or-nothing decoding model. Since the security environment may increase urgency to recover the secret. It not convenience for urgency, cause this model requires all n users engage then be able to recover the secret. In our scheme, each participant only needs to keep an initial sub-image. In the progressive decoding model, these initial sub-images can be used to progressively retrieve the secret image without any modification. On the other hand, when the all-or-nothing decoding model is selected, the dealer will publish additional information then the k participants use all-or-nothing by the additional information and their sub-images. We propose two (k, n) progressive SIS-schemes with thresholds changeable and each of which has different amount of information.


第一章 介紹 1
1.1 背景知識 1
1.2 論文貢獻 2
1.3 論文架構 3
第二章 預備知識 5
2.1 基於多項式的(k, n)秘密影像分享
2.2 Yang-Chu's (k, n)秘密影像分享
第三章 主要機制 9
3.1 論文動機 9
3.2 主要方案 11
第四章 範例與實驗 19
4.1 範例一 Yang-Chu's方案 19
4.2 範例二 主要方案三 21
4.3 範例三 主要方案四 22
第五章 結論與未來展望 26
參考文獻 28
[HARN15] L. Harn and C.F. Hsu, Dynamic threshold secret reconstruction and its application to the threshold cryptography, ”Information Processing Letters,” vol. 115, pp. 851-857, 2015.
[LAKH18] P. Lakhanpal and Prof. D. Agrawal, Enhanced secure mechanism for ARP poisoning and MITM attack, ”International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE),”vol. 6, 2018.
[LAL17] S. Lal and Prof.S. Sharma, Load balancing and its challenges in cloud computing: A review paper, ”International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE),”vol. 5, 2017.
[LE11] T.H.N. Le, C.C. Lin, C.C. Chang and H.B. Le,Ahigh quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images, ”Digital Signal Processing,”vol. 21, pp. 734-745, 2011.
[LEE15] J.S. Lee, C.C. Chang, N.T. Huynh and H.Y. Tsai, Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique, ”Digital Signal Processing,”vol. 40, pp.131-139, 2015.
[LI16] P. Li, C.N. Yang and Z. Zhou, Essential secret image sharing scheme with the same size of shadows, ”Digital Signal Processing,” vol 50, pp. 51-60, 2016.
[LI18] P. Li, Z. Liu and C.N.A. Yang, Construction Method of (t, k, n)- essential secret image sharing scheme, ”Signal Processing: Image Communication,” vol. 65, pp. 210-220, 2018.
[LIN10] Y.Y. Lin and R.Z.Wang, Scalable secret image sharing with smaller shadow images, ”IEEE Signal Processing Letters,”vol. 17, pp. 316-319, 2010.
[LIU14] Y.X. Liu, C.N. Yang and P.H. Yeh, Reducing shadow size in smooth scalable secret image sharing, ”Security and Communication Networks,”vol. 7, pp. 2237-2244, May, 2014.
[LIU17] L.T. Liu, Y.L. Lu, X.H. Yan and H.X. Wan, Greyscaleimages-oriented progressive secret sharing based on the linear congruence equation,” Multimedia Tools and Applications,”vol. 2, pp. 1-28, 2017.
[LIU18] Y.X. Liu, C.N. Yang, S.Y. Wu and Y.S. Chou, Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes,” Signal Processing: Image Communication,”vol. 66, pp. 77-86, 2018.
[LIU19] Y.X. Liu, C.N. Yang, C.M. Wu, Q.D. Sun and W. Bi, Threshold changeable secret image sharing scheme based on interpolation polynomial, Cheating Prevention in Visual Cryptography, “Multimedia tools and Applications,”vol. 78, pp. 18653-18667, 2019.
[MAHE17] S. Maheswari and K. Chitra, A novel approach for software defect prediction using learning algorithms, ” International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”, vol. 5, , 2017.
[NAOR95] M. Naor and A. Shamir, Visual cryptography, ”Proc of EUROCRYPT 1994,”LNCS 950, pp. 1-12, 1995.
[SHYU13] S.J. Shyu and H.W. Jiang, General constructions for threshold multiple-secret visual cryptography Schemes, ”IEEE Transactions on Information Forensics and Security,”vol. 2, pp. 733-743, 2013.
[THIE02] C.C. Thien and J.C. Lin, Secret image sharing General k, ”Computers and Graphics,”vol. 26, pp. 765-770, 2002.
[WANG06] R.Z. Wang and C.H. Su, Secret image sharing with smaller shadow images, ”Pattern Recognition Letters”, vol. 27, pp. 551-555, 2006.
[WANG07] R.Z. Wang and S.J. Shyu, Scalable secret image sharing, ”Signal Processing: Image Communication,”vol. 22, pp. 363-373, 2007.
[WU11] C.C. Wu, S.J. Kao and M.S. Hwang, A high quality image sharing with steganography and adaptive authentication scheme, ”Journal of Systems and Software,”vol. 84, pp. 2196-2207, 2011.
[YAN18] X.Yan,Y. Lu, L. Liu, J. Liu and G.Yang, Chinese remainder theorem-based two-in-one image secret sharing with three decoding options,” Digital Signal Processing,”vol. 82, pp. 80-90, 2018.
[YANG10] C.N. Yang and S.M. Huang, Constructions and properties of k out of n scalable secret image sharing, ”Optics Communications,”vol. 283, pp. 1750-1762, 2010.
[YANG11] C.N. Yang and Y.Y. Chu, A general (k, n) scalable secret image sharing scheme with the smooth scalability, ”Journal of Systems and Software,” vol. 84, pp. 1726-1733, 2011.
[YANG12] C.N. Yang, H.W. Shih, C.C. Wu and L. Harn, K out of n region incrementing scheme in visual cryptography, ”IEEE Transactions on Circuits and Systems for Video Technology”, vol. 22, pp. 799-809, 2012.
[YANG13] C.N. Yang, Y.C. Lin and C.C. Wu, Region in region incrementing visual cryptography scheme, ”Proc IWDW2012”, LNCS 7809, pp.449-463, 2013.
[YANG14] C.N. Yang and Y.Y. Yang, New extended visual cryptography schemes with clearer shadow images, ”Information Sciences,”vol. 271, pp. 246-263,2014
[YANG15] C.N. Yang, P. Li, C.C. Wu and S.R. Cai, Reducing shadow size in sssential secret image sharing by conjunctive herarchical approach, ”Signal Processing: Image Communication”, vol. 31, pp. 1-9, 2015.
[YANG17] Y.X. Liu and C.N. Yang, Scalable secret image sharing scheme with essential shadows, ” Signal Processing: Image Communication”, vol. 58, pp. 49−55, 2017.
[YUAN16] L. Yuan, M. Li, C. Guo, K.-K.R. Choo and Y. Ren, Novel threshold changeable secret sharing schemes based on polynomial interpolation,” PloS One,”vol.11, pp. 1-19, 2016.
[ZHAN12] Z. Zhang, Y.M. Chee, S. Ling, M. Liu and H. Wang, Threshold changeable secret sharing schemes revisited, ”Theoretical Computer Science,”vol. 418, pp. 106-115, 2012.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *