跳到主要內容區塊

多機密視覺機密分享機制與其在行動裝置上的應用

論文內容
論文分類 碩士論文
學號 G972105
姓名 黃昱霖
標題 多機密視覺機密分享機制與其在行動裝置上的應用
指導教授 賴阿福 徐熊健
畢業日期 2011-01
附件檔案  
參考連結 http://163.21.239.2/cgi-bin/cdrfb3/tmtcgsweb.cgi?o=dtmtccdr
摘要 由於行動裝置上的處理器運算速度遠不及桌上型電腦,所以許多需大量運算的加解密技術皆不適合在行動裝置環境使用,視覺機密分享機制的優點在於僅需很低運算量即可將機密解密,相當適合行動裝置環境使用。本研究利用視覺機密分享機制理念設計了一個新的門檻式多機密視覺機密分享機制,且利用此機制在行動裝置環境下建置了一個認證系統,使用者可以透過由視覺機密分享機制產生的分享影像在付款前先驗證金額是否正確再進行付款,我們以一個簡易的電子付款場景做驗證,展現此理念是可行的。
參考文獻 [1] N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete Cosine Transform," IEEE Transactions on Computers, pp. 90-93, 1974. 
[2] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, "Visual cryptography for general access structures," Information and Computation, vol. 129, pp. 86-106, 1996. 
[3] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, pp. 143-161, 2001. 
[4] G. R. Blakley, "Safeguarding cryptographic keys," Proceedings of the National Computer Conference, 1979, pp. 313-317. 
[5] C. Blundo, A. D. Bonis, and A. D. Santis, "Improved Schemes for Visual Cryptography," Designs, Codes and Cryptography, vol. 24, pp. 255 - 278, 2001. 
[6] J. Chen, T.-S. Chen, H.-C. Hsu, and H.-W. Chen, "New visual cryptography system based on circular shadow image and fixed angle segmentation," Journal of Electronic Imaging, vol. 14, 2005. 
[7] J. Chen, T.-S. Chen, H.-C. Hsu, and Y.-H. Lin, "Using multi-ringed shadow image of visual cryptography to hide more secret messages," The Imaging Science Journal, vol. 57, pp. 101-108, 2009. 
[8] T.-S. Chen, J.-H. Shiesh, and H.-W. Chen, "Using Circular Shadow Image and Fixed Angle Segmentation for Visual Cryptography System," Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, 2002. 
[9] S. Cimatoa, R. D. Priscob, and A. D. Santisb, "Colored visual cryptography without color darkening," Theoretical Computer Science, vol. 374, pp. 261-276, 2007. 
[10] S. Droste, "New results on visual cryptography," Advances in Cryptology: CRYPTO'96 Lecture Notes in Computer Science, vol. 1109, pp. 401-415, 1996. 
[11] J.-B. Feng, H.-C. Wu, C.-S. Tsai, Y.-F. Chang, and Y.-P. Chu, "Visual secret sharing for multiple secrets," Pattern Recognition, vol. 41, pp. 3572-3581, 2008. 
[12] Y. C. Hou, "Visual cryptography for color images," Pattern Recognition, vol. 36, pp. 1619-1629, 2003. 
[13] H.-C. Hsu, J. Chen, T.-S. Chen, and Y.-H. Lin, "Special type of circular visual cryptography for multiple secret hiding," The Imaging Science Journal, vol. 55, pp. 175-179, 2007. 
[14] H. C. Hsu, T. S. Chen, and Y. H. Lin, "The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing," Proceedings of the IEEE International Conference on Networking, Sensing & Control, 2004. 
[15] K. T. Knox, "Error diffusion: a theoretical view," in SPIE: Human Vision, Visual Processing, and Digital Display IV, pp. 326-331, 1993. 
[16] B. W. Leung, F. Y. Ng, and D. S. Wong, "On the security of a visual cryptography scheme for color images," Pattern Recognition, vol. 42, pp. 929-940, 2009. 
[17] S.-J. Lin, S.-K. Chen, and J.-C. Lin, "Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion," Journal of Visual Communication and Image Representation, vol. 21, pp. 900-916, 2010. 
[18] M. Naor and A. Shamir, "Visual cryptography," presented at the Advances in Cryptology: Eurocrypt'94 , Lecture Notes in Computer Science, 1995. 
[19] M. Naor and B. Pinkas, "Visual authentication and identification," Advances in Cryptology: CRYPTO'97 Lecture Notes in Computer Science, 1997. 
[20] A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612 - 613, 1979. 
[21] S. J. Shyu, "Efficient visual secret sharing scheme for color images," Pattern Recognition, vol. 39, pp. 866-880, 2006. 
[22] S. J. Shyu, "Image encryption by random grids " Pattern Recognition, vol. 40, pp. 1014-1031, 2007. 
[23] S. J. Shyu, S.-Y. Huang, Y.-K. Lee, R.-Z. Wang, and K. Chen, "Sharing multiple secrets in visual cryptography," Pattern Recognition, vol. 40, pp. 3633-3651, 2007. 
[24] S. J. Shyu, "Image encryption by multiple random grids " Pattern Recognition, vol. 42, pp. 1582-1596, 2009. 
[25] C. C. Thien and J. C. Lin, "Secret Image Sharing," Computers & Graphics, vol. 26, pp. 765-770, 2002. 
[26] C. C. Thien and J. C. Lin, "An Image-Sharing Method With User-Friendly Shadow Images," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 1161-1169, 2003. 
[27] R. Ulichney, "A review of halftoning techniques," in SPIE: Color Imaging: Device Independent Color, Color Hardcopy, and Graphic Arts V, pp. 378-391, 2000. 
[28] M. Ulutas, R. Yazlcl, V. V. Nabiyev, and G. Ulutas, "(2, 2)-Secret Sharing scheme with improved share randomness," Proceedings of the IEEE 23th International Symposium on Computer and Information Sciences, 2008. 
[29] R.-Z. Wang, Y.-C. Lan, Y.-K. Lee, S.-Y. Huang, S.-J. Shyu, and T.-L. Chia, "Incrementing visual cryptography using random grids " Optics Communications, vol. 283, pp. 4242-4249, 2010. 
[30] R. Z. Wang and S. J. Shyu, "Scalable secret image sharing," Signal Processing: Image Communication, vol. 22, pp. 363-373, 2007. 
[31] T. Welch, "A Technique for High-Performance Data Compression," IEEE Transactions on Computers, vol. 17, pp. 8-19, 1984. 
[32] Wikipedia. JPEG. Available: http://en.wikipedia.org/wiki/JPEG 
[33] Wikipedia. Graphics Interchange Format. Available: http://en.wikipedia.org/wiki/GIF 
[34] Wikipedia. Portable Network Graphics. Available: http://en.wikipedia.org/wiki/.png 
[35] C. C. Wu and L. H. Chen, "A study on visual cryptography," Master, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. 
[36] H.-C. Wu and C.-C. Chang, "Sharing visual multi-secrets using circle shares," Computer Standards & Interfaces, vol. 134 (28), pp. 123-135, 2005. 
[37] H.-C. Wu, H.-C. Wang, and C.-S. Tsai, "Multiple image sharing based on colour visual cryptography," The Imaging Science Journal, vol. 54, 2006. 
[38] J. Ziv and A. Lempel, "Compression of Individual Sequences Via Variable-Rate Coding," IEEE Transactions on Information Theory, vol. 24, pp. 530-536, 1978. 

 

瀏覽數  
將此文章推薦給親友
請輸入此驗證碼