淡江大學機構典藏:Item 987654321/76349
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62805/95882 (66%)
Visitors : 3932548      Online Users : 484
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/76349


    Title: 一個兼具欺騙偵測與關鍵分享之影像秘密分享技術研究
    Other Titles: A Research of Secret Image Sharing Scheme with Cheater Identification and Essential Share
    Authors: 陳建彰
    Contributors: 淡江大學資訊工程學系
    Keywords: 影像秘密分享;欺騙偵測;關鍵分享
    Date: 2011-08
    Issue Date: 2012-05-07 14:55:47 (UTC+8)
    Abstract: 傳統(t,n)影像秘密分享技術將一張機密影像分享至n 位參與者手中,每位參與者 持有一把金鑰及一份分享影像,而集合t 位參與者的金鑰及分享影像即能回復原秘密影 像。影像秘密分享技術提供重要影像在傳遞、保存上的安全。而影像秘密分享技術的欺 騙偵測功能在於具備偵測出任一參與者以偽造之金鑰或分享影像參與還原處理的能 力。同時,關鍵分享功能為部份分享影像在還原過程是不可或缺的。 本計畫預期研究一個同時具有欺騙偵測與關鍵分享功能的影像秘密分享技術。前人 或有偵測金鑰之真偽,亦或有判斷分享影像之真偽,然未有一個有效率的方法來判斷此 二者的真偽。本計畫在欺騙偵測的研究上同時偵測金鑰與分享影像二者之真偽,並預期 以指數運算的方式處理,其優點是可以透過網路使用,並確保有效率地達到偵測欺騙者 的目的。在關鍵分享的相關研究上,前人鮮少研究具關鍵分享功能的影像秘密分享技 術,本研究以融合可逆式浮水印技術的方式提供影像秘密分享技術具關鍵分享的能力。 同時結合目前正在進行的以中國餘式定理為基礎的相異權重影像秘密分享技術研究,建 置一個多功能的影像秘密分享架構。本計劃預期將完成理論探討、實驗模擬、軟體開發、 及原始碼分享等工作。並預期對影像秘密分享問題的研究上,有具體而前瞻性的貢獻。
    A (t, n) secret image sharing scheme shares a secret image to n participants, in which each one possesses one secret key and one shared image. In recovery, collecting t secret keys and their corresponding shared images are needed. The secret image sharing scheme is essential to protect an important image. This project discusses two problems, says the cheater identification and essential share, in secret image sharing scheme. Cheater identification intends to identify any cheater in recovery, both in checking secret key or shared image. On the other hand, the essential share is that some participants are needed in recovery. This criterion also means that those important participants, maybe only one or two, are necessary in recovery procedure. This project presents a secret image sharing scheme both with abilities of cheater identification and essential sharing. In cheater identification research, some scholars present the identification about secret key or shared image, but not both in these two criteria. Therefore, this study wants to present an exponential computation-based cheater identification scheme, both in secret key and shared image, and the scheme is efficiently computed over networks. In essential share research, few researchers present efficient method and this study wants to present a reversible watermarking technique-based scheme to overcome this problem. Combined with our recent research on weighted secret image sharing scheme, a secret image sharing scheme with several abilities is hoped to be well-constructed. Theoretical development, experimental simulation, software development, and source code sharing are main works in this project.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Research Paper

    Files in This Item:

    There are no files associated with this item.

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback