Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 視覺密碼技術旋轉與立體旋轉之研究
A Study on Multiple Visual Cryptography via Rotation
作者 謝孟諺
Hsieh, Meng Yen
貢獻者 左瑞麟
Tso, Ray Lin
謝孟諺
Hsieh, Meng Yen
關鍵詞 視覺密碼
多秘密分享
visual cryptography
multiple secrets
日期 2010
上傳時間 1-Feb-2013 16:53:35 (UTC+8)
摘要 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。
在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。
Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment.
Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images.
參考文獻 [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.
[2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.
[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428.
[4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106.
[5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161.
[6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278.
[7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455.
[8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289.
[9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415.
[10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.
[11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001.
描述 碩士
國立政治大學
資訊科學學系
97971002
99
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0097971002
資料類型 thesis
dc.contributor.advisor 左瑞麟zh_TW
dc.contributor.advisor Tso, Ray Linen_US
dc.contributor.author (Authors) 謝孟諺zh_TW
dc.contributor.author (Authors) Hsieh, Meng Yenen_US
dc.creator (作者) 謝孟諺zh_TW
dc.creator (作者) Hsieh, Meng Yenen_US
dc.date (日期) 2010en_US
dc.date.accessioned 1-Feb-2013 16:53:35 (UTC+8)-
dc.date.available 1-Feb-2013 16:53:35 (UTC+8)-
dc.date.issued (上傳時間) 1-Feb-2013 16:53:35 (UTC+8)-
dc.identifier (Other Identifiers) G0097971002en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/56887-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 97971002zh_TW
dc.description (描述) 99zh_TW
dc.description.abstract (摘要) 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。
在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。
zh_TW
dc.description.abstract (摘要) Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment.
Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images.
en_US
dc.description.tableofcontents 摘要I............................................... 1
目錄II.............................................. 2
圖目錄III........................................... 3
表目錄IV............................................ 4
第一章 緒論.......................................... 6
1.1 研究背景.................................................. 6
1.2 研究動機、方式................................... 7
第二章 文獻探討.................................................. 8
2.1 視覺機密分享機制.................................................. 8
2.2 (1,2)、(2,2)視覺祕密分享機制................ 9
2.2.1 (1,2)視覺祕密分享機制.................................................. 9
2.2.2 (2,2)視覺祕密分享機制......................... 10
2.3 視覺多重機密分享機制........................... 11
2.3.1 旋轉式視覺機密分享機制......................... 12
2.3.2 平移式視覺密碼分享機制......................... 16
第三章平移、旋轉為基礎之立體旋轉視覺多重機密分享機制.... 19
3.1 平移與旋轉的關係.............................. 19
3.2 圖例說明如何立體旋轉.......................... 20
3.3 立體旋轉視覺多重機密基本概念................... 20
3.3.1 建構方法..................................... 20
3.3.2 立體旋轉視覺基本概念.......................... 21
3.3.3 加密方式與演算法............................. 21
第四章 範例示範與實驗結果........................... 24
4.1 範例示範.................................... 24
4.2 實驗結果.................................... 24
第五章 結論........................................ 25
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0097971002en_US
dc.subject (關鍵詞) 視覺密碼zh_TW
dc.subject (關鍵詞) 多秘密分享zh_TW
dc.subject (關鍵詞) visual cryptographyen_US
dc.subject (關鍵詞) multiple secretsen_US
dc.title (題名) 視覺密碼技術旋轉與立體旋轉之研究zh_TW
dc.title (題名) A Study on Multiple Visual Cryptography via Rotationen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.
[2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.
[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428.
[4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106.
[5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161.
[6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278.
[7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455.
[8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289.
[9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415.
[10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.
[11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001.
zh_TW