Publications-Theses
Article View/Open
Publication Export
-
Google ScholarTM
NCCU Library
Citation Infomation
Related Publications in TAIR
題名 視覺密碼技術旋轉與立體旋轉之研究
A Study on Multiple Visual Cryptography via Rotation作者 謝孟諺
Hsieh, Meng Yen貢獻者 左瑞麟
Tso, Ray Lin
謝孟諺
Hsieh, Meng Yen關鍵詞 視覺密碼
多秘密分享
visual cryptography
multiple secrets日期 2010 上傳時間 1-Feb-2013 16:53:35 (UTC+8) 摘要 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。 在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。
Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment. Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images.參考文獻 [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.[2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428. [4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106. [5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161. [6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278. [7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455. [8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289. [9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415. [10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.[11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001. 描述 碩士
國立政治大學
資訊科學學系
97971002
99資料來源 http://thesis.lib.nccu.edu.tw/record/#G0097971002 資料類型 thesis dc.contributor.advisor 左瑞麟 zh_TW dc.contributor.advisor Tso, Ray Lin en_US dc.contributor.author (Authors) 謝孟諺 zh_TW dc.contributor.author (Authors) Hsieh, Meng Yen en_US dc.creator (作者) 謝孟諺 zh_TW dc.creator (作者) Hsieh, Meng Yen en_US dc.date (日期) 2010 en_US dc.date.accessioned 1-Feb-2013 16:53:35 (UTC+8) - dc.date.available 1-Feb-2013 16:53:35 (UTC+8) - dc.date.issued (上傳時間) 1-Feb-2013 16:53:35 (UTC+8) - dc.identifier (Other Identifiers) G0097971002 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/56887 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學學系 zh_TW dc.description (描述) 97971002 zh_TW dc.description (描述) 99 zh_TW dc.description.abstract (摘要) 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。 在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。 zh_TW dc.description.abstract (摘要) Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment. Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images. en_US dc.description.tableofcontents 摘要I............................................... 1目錄II.............................................. 2圖目錄III........................................... 3表目錄IV............................................ 4第一章 緒論.......................................... 61.1 研究背景.................................................. 61.2 研究動機、方式................................... 7第二章 文獻探討.................................................. 82.1 視覺機密分享機制.................................................. 82.2 (1,2)、(2,2)視覺祕密分享機制................ 92.2.1 (1,2)視覺祕密分享機制.................................................. 92.2.2 (2,2)視覺祕密分享機制......................... 102.3 視覺多重機密分享機制........................... 112.3.1 旋轉式視覺機密分享機制......................... 122.3.2 平移式視覺密碼分享機制......................... 16第三章平移、旋轉為基礎之立體旋轉視覺多重機密分享機制.... 193.1 平移與旋轉的關係.............................. 193.2 圖例說明如何立體旋轉.......................... 203.3 立體旋轉視覺多重機密基本概念................... 203.3.1 建構方法..................................... 203.3.2 立體旋轉視覺基本概念.......................... 213.3.3 加密方式與演算法............................. 21第四章 範例示範與實驗結果........................... 244.1 範例示範.................................... 244.2 實驗結果.................................... 24第五章 結論........................................ 25 zh_TW dc.language.iso en_US - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0097971002 en_US dc.subject (關鍵詞) 視覺密碼 zh_TW dc.subject (關鍵詞) 多秘密分享 zh_TW dc.subject (關鍵詞) visual cryptography en_US dc.subject (關鍵詞) multiple secrets en_US dc.title (題名) 視覺密碼技術旋轉與立體旋轉之研究 zh_TW dc.title (題名) A Study on Multiple Visual Cryptography via Rotation en_US dc.type (資料類型) thesis en dc.relation.reference (參考文獻) [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.[2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.[3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428. [4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106. [5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161. [6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278. [7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455. [8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289. [9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415. [10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.[11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001. zh_TW