English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140891 (78%)
Visitors : 46243974      Online Users : 1186
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/56887
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/56887


    Title: 視覺密碼技術旋轉與立體旋轉之研究
    A Study on Multiple Visual Cryptography via Rotation
    Authors: 謝孟諺
    Hsieh, Meng Yen
    Contributors: 左瑞麟
    Tso, Ray Lin
    謝孟諺
    Hsieh, Meng Yen
    Keywords: 視覺密碼
    多秘密分享
    visual cryptography
    multiple secrets
    Date: 2010
    Issue Date: 2013-02-01 16:53:35 (UTC+8)
    Abstract: 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。
    在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。
    Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment.
    Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images.
    Reference: [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.
    [2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.
    [3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428.
    [4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106.
    [5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161.
    [6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278.
    [7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455.
    [8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289.
    [9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415.
    [10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.
    [11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001.
    Description: 碩士
    國立政治大學
    資訊科學學系
    97971002
    99
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0097971002
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    100201.pdf1345KbAdobe PDF2370View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback