淡江大學機構典藏:Item 987654321/34203
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64178/96951 (66%)
Visitors : 11061600      Online Users : 23088
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/34203


    Title: 應用互斥或運算於全彩機密影像之分享
    Other Titles: True color secret image sharing by using xor operation
    Authors: 呂晏君;Lu, Yen-chun
    Contributors: 淡江大學資訊管理學系碩士班
    侯永昌;Hou, Young-chang
    Keywords: 機密影像分享;彩色影像隱藏技術;互斥或運算;secret image sharing;true color image hiding;XOR operating
    Date: 2007
    Issue Date: 2010-01-11 05:01:39 (UTC+8)
    Abstract: 為了建立一個安全的網路傳輸環境,傳統方法是利用複雜的數學公式來做加密運算。但是,此方法在加密和解密的過程中,需要耗費大量的時間,而且經加密後的機密資料容易引起截取者的興趣,使資料傳送過程中容易遭受攻擊,降低安全性。此外,到目前所提出彩色影像隱藏的技術或研究,對於機密影像隠藏的顏色數量,都是有所限制。
    在本研究中,為了減少加密和解密的時間,我們運用資料隱藏的觀念,將機密資料隱藏於二張有意義的資料中,例如:圖片,讓人無法查覺到機密資料的存在,並只需利用少量的運算,即可求得機密資料。我們應用互斥或(XOR)的運算,即可將全彩機密資料,顏色數量約1677萬色,隱藏於分享影像中。此方法不但沒有顏色的限制,而且不需另外傳送色盤,增加安全性。和相關領域的研究比起來,我們的檔案大小也減小許多。
    To build a safe Internet transmission environment, people use complicated algorithms for encryption and decryption. However, this process takes plenty of computing time. Moreover, the encrypted and meaningless data could be a target and become more vulnerable to malicious users. The concept of data masquerade is also applied to the field of color image hiding. Nonetheless, current color image hiding technologies and researches have the drawback of limited number of colors.
    In order to reduce computing time in cryptography, we use the concept of data hiding to conceal confidential information in two meaningful data sets, e.g. image files. The operation we used is XOR operation. While common users could not perceive the existence of confidential data, authorized users using our proposed method could spend minimal computing time to reveal this information. Furthermore, this method has no restriction of color numbers and there is no need to convey a color table separately. The proposed technique increases security on transmission and generates smaller file sizes comparing with other related works
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown312View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback