帳號:guest(3.147.242.119)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:李育昇
作者(英文):Yu-Sheng Li
論文名稱:使用簡單模除運算的 Base64 資料分享機制
論文名稱(英文):Secret Base64 Data Sharing Scheme by Simple Modular Arithmetic
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:郭文中
張道顧
口試委員(英文):Wen-Chung Kuo
Tao-Ku Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:611021222
出版年(民國):112
畢業學年度:111
語文別:英文
論文頁數:68
關鍵詞:秘密分享有限域模運算拉格朗日插值法Base64 編碼霍夫曼編碼
關鍵詞(英文):Secret sharingFinite fieldModular arithmeticLagrange interpolationBase64 codeHuffman code
相關次數:
  • 推薦推薦:0
  • 點閱點閱:19
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:24
  • 收藏收藏:0
(k, n) 秘密分享(Secret Sharing; SS)是一種將秘密數據分為n個子秘密的方法,其中k表示重建秘密時所需要的最少子秘密數量也就是門檻值、n則是所有子秘密的數目。(k, n)-SS只需要k個子秘密就能使用Lagrange interpolation多項式插值的方法恢復原始數據達到保護秘密的功能。但是,任何(k 1)個或更少的子秘密都無法解回原始秘密數據。(k, n)-SS最初的目的是保護密碼系統中的秘密鑰,現在它已被擴展並廣泛應用於許多應用情境,例如秘密影像分享(Secret Image Sharing; SIS)、和秘密文件分享(Secret Document Sharing; SIS)。把SS擴展至SIS、和SDS時,並不只是簡單地把秘密替換成影像、文件。而是要考慮秘密的樣式(隨機或有意義)、有限域的選擇、嵌入秘密的多項式係數位置、以及子影像和子文件的樣式。
當我們想要通過SS在分散式網路中分享秘密數據時,有時候不適合以原始數據格式傳輸分享,因為某些應用、或協議(例如加密、電子郵件、和HTML)的保留字元或者控制字元會造成通信協議中斷。植基於這個想法,給了我們研究秘密Base64數據分享機制(簡稱SBS)的動機。如同將SS擴展到SIS、和SDS時有其考量的條件,我們研究將SS擴展到SBS時也需考慮和處理使用Base64資料作為秘密時的一些問題。在本論文“使用簡單模除運算的Base64資料分享機制”,我們使用了無損秘密資料的模運算而不用比較複雜的GF(2N)有限域,其中N是6的倍數以配合Base64碼。我們對N=6、12、18、和24,選了不同的模除運算。另外,也對檔案長時間儲存放置(所謂的靜態數據)時,設計使用霍夫曼編碼具低複雜度、高壓縮率的SBS機制。本文做了三種不同類型秘密資料,文件文字、影像、與加密影像的實驗模擬。實驗結果呈現了我們的SBS機制確實可以正常運作。
A (k, n) Secret Sharing (SS) is a threshold scheme to share secret data into n sub secrets (referred to as shares). The value of k is the minimum number of shares required to reconstruct the secret and n represents the total number of share. For recovery, (k, n)-SS could k shares to recover secret via Lagrange interpolation. However, any (k 1) or fewer shares cannot be used for recovering secret data. The (k, n)-SS is first presented to safeguard a key in cryptosystem. Now, the approach of SS is extended to the secret image sharing (SIS) and secret document sharing. The extension of SS to SIS (or SDS) is not trivial and just using “image” and “document” as secret. We should carefully think about some key issues of extending SS to SIS, e.g., type of secret (random or meaningful), choice of finite field, positions of coefficients in a polynomial for embedding secret, and patterns on shares.
When we want to share secret data in a distributed network using SS approach, it is not suitable to use the files of shares directly. Because some applications and communication protocols (for example using ciphertext, e-mail and HTML) may have control character or non-printing character, and this will result in interruption. Base on this notion, we take the lead to study secret Base64 data sharing (SBS) scheme. Same as designing SIS and SDS, when extending SS to SBS some critical issues should be carefully addressed. In this thesis, we propose a (k, n)-SBS by using simple modular arithmetic instead of complicated finite field instead GF(2N), where N is a multiple of 6. For N=6, 12, 18 and 24, we choose various modular arithmetic operations. Consider the case “data at rest, we also design a Huffman code based low-complexity and high-compress compressing method for SBS. Three type of secrets: document, image and encrypted image, are used for testing SBS. Experiments our SBS performs correctly.
Chapter 1 Introduction 1
1.1 Background 1
1.2 Organization of The Thesis 3
Chapter 2 Previous Works 7
2.1 Shamir’s (k, n)-SS 7
2.2 The (k, n)-SIS 8
2.3 Base64 Codes 9
Chapter 3 The Proposed (k, n)-SBS 11
3.1 Design Concept 11
3.2 Generation and Recovery of (k, n)-SBS 24
Chapter 4 Experiment and Discussion 35
4.1 The (k, n)-SBS using (mod PG) 35
4.2 Comparison of using (mod PG) and (mod PS) for N = 6~24 41
4.3 Discussion 44
Chapter 5 Conclusion and Future Work 49
References 53
[AHMA19]A.M. Ahmadian and M. Amirmazlaghani, “A novel secret imagesharing with steganography scheme utilizing Optimal Asymmetric
Encryption Padding and Information Dispersal Algorithms,” SignalProcessing: Image Comm., vol. 74, pp. 78-88, 2019.
[BLAK79]G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference,vol. 48, pp. 313-317, 1979.
[CHAN08]C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing Secrets in StegoImages with Authentication,” Pattern Recognition, vol. 41, pp. 3130-3137, 2008.
[CHEN16]C.C. Chen and S.C. Chen, “Two-layered Structure for OptimallyEssential Secret Image Sharing Scheme” Journal of Visual Communication and Image Representation, vol. 38, pp. 595-601,2016.
[KANS17]A. Kanso and M. Ghebleh, “An Efficient (t, n)–threshold Secret Image Sharing Scheme,” Multimedia Tools and Appl., vol. 76, pp. 16369-16388, 2017.
[LI13]P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential Secret Image Sharing Scheme with Different Importance of Shadows, Journal of Visual Communication and Image Representation, vol. 24, pp. 1106-1114, 2013.
[LI16]P. Li, C.N. Yang, and Z. Zhou, “Essential Secret Image Sharing Scheme with the Same Size of Shadows,” Digital Signal Processing, vol. 50, pp. 51-60, 2016.
[LIN04]C.C. Lin and W.H. Tsai, “Secret Image Sharing with Steganography and Authentication,” Journal of Systems & Software, vol. 73, pp. 405-414, 2004.
[LIN21]Y.X. Liu, C.N. Yang, and Q. Sun, “Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management,”IEEE Trans. on Intelligent Trans. Sys., vol. 22, pp. 3952-3960, July 2021.
[LIU17]Y.X. Liu and C.N. Yang, “Scalable Secret Image Sharing Scheme with Essential Shadows,” Signal Processing: Image Communication, vol.58, pp. 49-55, Oct., 2017.
[SHAM79]A. Shamir, “How to Share A Secret,” Communications of the Association for Computing Machinery, vol. 22, pp. 612-613, 1979.
[THIE02]C.C. Thien and J.C. Lin, “Secret Image Sharing,” Computers & Graphics, vol. 26, pp. 765-770, 2002.
[WU11]C.C. Wu, S.J. Kao, and M.S. Hwang, “A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme, Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011.
[WU18]X. Wu, C.N. Yang, Y.T. Zhuang, and S.C. Hsu, “Improving Recovered Image Quality in Secret Image Sharing by Simple Modular Arithmetic”, Signal Processing: Image Communication, vol. 66, pp. 42-49, 2018.
[WU19a]Z. Wu, Y.N. Liu, D. Wang, and C.N. Yang, “An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial,”Symmetry, vol. 11, 69, 2019.
[WU19b]X. Wu and C.N. Yang, Partial reversible AMBTC-based Secret Image Sharing with Steganography, Digital Signal Processing, vol. 93, pp. 22-33, 2019.
[WU19c]X. Wu and C.-N. Yang, “Invertible Secret Image Sharing with Steganography and Authentication for AMBTC Compressed Images,” Signal Processing: Image Communication, vol. 78, pp. 437-447, 2019.
[WU20]X. Wu, C.N. Yang, and Y.Y. Yang, “A Hybrid Scheme for Enhancing Recovered Image Quality in Polynomial Based Secret Image Sharing by Modify-and-Recalculate Strategy,” Journal of Information Security and Applications, vol. 51, Article 102452, 2020.
[WU21]X. Wu, C.N. Yang, and J.M. Li, “Secure Image Secret Sharing over Distributed Cloud Network,” Signal Processing, vol. 178, Article 107768, 2021.
[XION20]L. Xiong, X. Zhong, and C.N. Yang, “DWT-SISA: A Secure and Effective Discrete Wavelet Transform-based Secret Image Sharing with Authentication,” Signal Processing, vol. 173, Article 107571, 2020.
[XION21a]L. Xiong, X. Zhong, C.N. Yang, and X. Han, “Transform Domainbased Invertible and Lossless Secret Image Sharing with Authentication,” IEEE Trans. on Info. Forensics and Security, vol. 16, pp. 2912-2925, 2021.
[XION21b]L. Xiong et al., “RSIS: A Secure and Reliable Secret Image Sharing System based on Extended Hamming Codes in Industrial Internet of Things,” IEEE Internet of Things Journal (doi: 10.1109/JIOT.2021.3139657), 2021.
[YANG07]C. Yang, T. Chen, K. Yu, and C. Wang, “Improvements of Image Sharing with Steganography and Authentication,” Journal of Systems and Software, vol. 80, pp. 1070-1076, 2007.
[YANG12]C.-N. Yang, J.-F. Ouyang, and L. Harn, “Steganography and Authentication in Image Sharing without Parity Bits, Optics Communications, vol. 285, pp. 1725-1735, 2012.
[YANG14]C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, “Secret Image Sharing without Keeping Permutation Key,” 2014 International Conference Comm. Tec. (ICCT), pp. 410-416, 2014.
[YANG21a]C.N. Yang, X. Wu, H.Y. Lin, and C. Kim, “Intragroup and Intergroup Secret Image Sharing Based on Homomorphic Lagrange Interpolation,” Journal of Information Security and Applications, Vol. 61, Article 102910, 2021.
[YANG21b]C.N. Yang, P.Y. Tsai, and Y.X. Liu, “A (k, n) Secret Document Sharing with Meaningful Shares,” Journal of Information Security and Applications, vol. 62, Article 102973, 2021.
[YANG22]C.N. Yang, X. Wu, M.J. Chung, and X. Zhang, “Distortionless AMBTC-based Secret Image Sharing by Simple Modular Arithmetic,” Journal of Visual Communication and Image Representation, vol. 84, Article 103482, 2022.
[ZHOU18]Z. Zhou, C.N. Yang, Y. Cao, and X. Sun, “Secret Image Sharing based on Encrypted Pixels,” IEEE Access, vol. 6, pp. 15021-15025, Mar., 2018.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *