English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 111316/142225 (78%)
造访人次 : 48383527      在线人数 : 729
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/56887


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/56887


    题名: 視覺密碼技術旋轉與立體旋轉之研究
    A Study on Multiple Visual Cryptography via Rotation
    作者: 謝孟諺
    Hsieh, Meng Yen
    贡献者: 左瑞麟
    Tso, Ray Lin
    謝孟諺
    Hsieh, Meng Yen
    关键词: 視覺密碼
    多秘密分享
    visual cryptography
    multiple secrets
    日期: 2010
    上传时间: 2013-02-01 16:53:35 (UTC+8)
    摘要: 視覺密碼是一種特別的密碼系統,在1994由Noar與Shamir所提出的概念,透過設計好的模型,加密時將原始機密分散成數張雜亂無章的分享影像,解密時,不需要任何大量複雜的數學運算,只需結合所有分散影像,透過人類的視覺系統,即可解讀原始機密的方法,而此種方式不需要用到任何密碼學專業知識,且具有視覺化、操作容易、高度保密等優點。現今網路日益發達與開放的社會,視覺密碼可以增加我們資料的安全性。
    在本研究中將引用視覺密碼的基本概念,透過結合1998年Wu所提出旋轉式視覺密碼以及2001年Wu所提出平移視視覺密碼兩種概念,進而提出 "立體旋轉"的視覺密碼以增加解碼的困難度,可確保不易查出機密影像的資訊。
    Visual cryptography is considered as a special encryption system that can be decrypted by human vision in a way without any type of computing process. This technique was proposed by Noar and Shamir in 1994.It also increases safety for our information in today`s increasingly open network environment.
    Visual cryptography uses two transparent images and both of them reveal the information. One image contains random pixels and the other image contains the secret information. This research adopts the concepts of basic idea of visual cryptography and introduces a method that increases the complexity of decryption by wrapping up one layer of images so that one can not perceive the secret information from one single share images.
    參考文獻: [1] Naor, M. and Shamir A. (1994), Visual Cryptography, Advances in Cryptology:Eurpocrypt’94, Springer-Verlag, Berlin, pp. 1-12.
    [2] Naor, M. and Shamir A. (1996), Visual Cryptography II:Improving the Contrast via the Cover Base, Cambrdge workshop on Cryptographic Protocols.
    [3] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Constructions and Bounds for Visual Cryptography,” In 23rd International Colloquium on Automata, Languages and Programming (ICALP ‘96), Springer-Verlag, 1996a: pp. 416-428.
    [4] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Visual Cryptography for General Access Structures,”Information and Computation (129:2), 1996b: pp. 86-106.
    [5] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R., “Extended Capabilities for Visual Journal of Information, Technology and Society 2003(2) 37 Cryptography,” Theoretical Computer Science (250:1-2), 2001: pp. 143-161.
    [6] Blundo, C., De Bonis, A. and De Santis, A., “Improved Schemes for Visual Cryptography,”Designs, Codes and Cryptography (24), 2001: pp. 255-278.
    [7] Blundo, C. and De Santis, A., “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computer & Graphics (12:4), 1998: pp. 449-455.
    [8] Blundo, C., De Santis, A. and Stinson, D. R., “On the Contrast in Visual Cryptography Schemes,” Journal of Cryptology (12:4), 1999: pp. 261-289.
    [9] Droste, S., “New Results on Visual Cryptography,” In Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996: pp. 401-415.
    [10]C.C. Wu, “A Study on Visual Cryptography,” Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.
    [11]T.L. Wu, “Two New Visual Cryptography Schemes: Visual Multi-Secrets SharingScheme And Colored Visual Secret Sharing Scheme,” Master thesis, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, R.O.C, 2001.
    描述: 碩士
    國立政治大學
    資訊科學學系
    97971002
    99
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0097971002
    数据类型: thesis
    显示于类别:[資訊科學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    100201.pdf1345KbAdobe PDF2387检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈