淡江大學機構典藏:Item 987654321/76349
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 62805/95882 (66%)
造訪人次 : 3948955      線上人數 : 1048
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/76349


    題名: 一個兼具欺騙偵測與關鍵分享之影像秘密分享技術研究
    其他題名: A Research of Secret Image Sharing Scheme with Cheater Identification and Essential Share
    作者: 陳建彰
    貢獻者: 淡江大學資訊工程學系
    關鍵詞: 影像秘密分享;欺騙偵測;關鍵分享
    日期: 2011-08
    上傳時間: 2012-05-07 14:55:47 (UTC+8)
    摘要: 傳統(t,n)影像秘密分享技術將一張機密影像分享至n 位參與者手中,每位參與者 持有一把金鑰及一份分享影像,而集合t 位參與者的金鑰及分享影像即能回復原秘密影 像。影像秘密分享技術提供重要影像在傳遞、保存上的安全。而影像秘密分享技術的欺 騙偵測功能在於具備偵測出任一參與者以偽造之金鑰或分享影像參與還原處理的能 力。同時,關鍵分享功能為部份分享影像在還原過程是不可或缺的。 本計畫預期研究一個同時具有欺騙偵測與關鍵分享功能的影像秘密分享技術。前人 或有偵測金鑰之真偽,亦或有判斷分享影像之真偽,然未有一個有效率的方法來判斷此 二者的真偽。本計畫在欺騙偵測的研究上同時偵測金鑰與分享影像二者之真偽,並預期 以指數運算的方式處理,其優點是可以透過網路使用,並確保有效率地達到偵測欺騙者 的目的。在關鍵分享的相關研究上,前人鮮少研究具關鍵分享功能的影像秘密分享技 術,本研究以融合可逆式浮水印技術的方式提供影像秘密分享技術具關鍵分享的能力。 同時結合目前正在進行的以中國餘式定理為基礎的相異權重影像秘密分享技術研究,建 置一個多功能的影像秘密分享架構。本計劃預期將完成理論探討、實驗模擬、軟體開發、 及原始碼分享等工作。並預期對影像秘密分享問題的研究上,有具體而前瞻性的貢獻。
    A (t, n) secret image sharing scheme shares a secret image to n participants, in which each one possesses one secret key and one shared image. In recovery, collecting t secret keys and their corresponding shared images are needed. The secret image sharing scheme is essential to protect an important image. This project discusses two problems, says the cheater identification and essential share, in secret image sharing scheme. Cheater identification intends to identify any cheater in recovery, both in checking secret key or shared image. On the other hand, the essential share is that some participants are needed in recovery. This criterion also means that those important participants, maybe only one or two, are necessary in recovery procedure. This project presents a secret image sharing scheme both with abilities of cheater identification and essential sharing. In cheater identification research, some scholars present the identification about secret key or shared image, but not both in these two criteria. Therefore, this study wants to present an exponential computation-based cheater identification scheme, both in secret key and shared image, and the scheme is efficiently computed over networks. In essential share research, few researchers present efficient method and this study wants to present a reversible watermarking technique-based scheme to overcome this problem. Combined with our recent research on weighted secret image sharing scheme, a secret image sharing scheme with several abilities is hoped to be well-constructed. Theoretical development, experimental simulation, software development, and source code sharing are main works in this project.
    顯示於類別:[資訊工程學系暨研究所] 研究報告

    文件中的檔案:

    沒有與此文件相關的檔案.

    在機構典藏中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋