淡江大學機構典藏:Item 987654321/23032
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62805/95882 (66%)
Visitors : 3924246      Online Users : 605
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/23032


    Title: 視覺資訊安全之研究-以平面RGB顯示為例
    Authors: 李鴻璋;周啟宏
    Contributors: 淡江大學資訊管理學系
    Keywords: 資訊安全;影像處理;加密;解密;視覺安全;Information Security;Image Processing;Encryption;Decryption;Visual Security
    Date: 2002-05
    Issue Date: 2009-11-30 14:29:53 (UTC+8)
    Publisher: 臺北縣淡水鎮 : 淡江大學資訊管理學系; 高雄市 : 中華民國資訊管理學會
    Abstract: 視覺安全為一項有別於傳統的加密解密技術。視覺安全並不需要傳統密碼學的高深知識,也沒有傳統密碼學的複雜運算式子,只需要將機密訊息分成數張分享影像,使得各別分享影像無法顯示原來的機密訊息;而在解密時,只需要將各分享影像予以重疊,即可利用人類之視覺系統讀取原來的機密訊息。本文以平面RGB顯示來探討視覺安全技術,文中利用色彩分離及色彩降階等技術,提出三個彩色影像的視覺安全方法。這些方法延續了傳統視覺安全的基本精神,不需要任何密碼學的繁雜算式而是直接利用人類的視覺系統即可以進行解密工作。在安全上,文中應用擴散方法及無色階限制,使得理論上分享影像中的機密訊息被完全破解之機率為1/4/sup m*n/,亦即可以確保機密訊息無法由單一的分享影像中取得。
    Visual Security which is differ from traditional cryptography wasproposed in recent years. Visual Security does not need anycryptographic theory nor cryptographic algorism. The way tocryptograph is breaking down original image into several shared imagesand each sheared image can not indicate the full information oforiginal image. To decrypt we just need overlap these shared imagesand using human vision to obtain the original information. We discussthree Visual Security techniques base on RGB. During crypt we alsousing disperse RGB and drop-off image degree to hide the originalinformation. These ways extend the spirit of traditional VisualSecurity, and provide a very simple way to decrypt-human vision. Interms of security, base on pixel extend and 24-bits full color modethe probability of decrypt will be 1/4/sup m*n/. This indicate thatthe cryptographic information can not be obtained from any singleshare images.
    Relation: 第十三屆國際資訊管理學術研討會論文集(I)=Proceedings of the 13th International Conference on Information Management(I),頁25-35
    Appears in Collections:[Graduate Institute & Department of Information Management] Proceeding

    Files in This Item:

    File SizeFormat
    index.html0KbHTML176View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback