A Study of Secret Image Sharing Schemes

碩士 === 國立暨南國際大學 === 資訊工程學系 === 97 === Secret image sharing scheme can efficiently solve the problems that are digit materials, military documents and important images could be forged, falsified and stolen, etc. Up to now, there are many scholars to design various secret image sharing schemes. Howeve...

Full description

Bibliographic Details
Main Authors: Ching-Fen Lee, 李青芬
Other Authors: Justie Su-Tzu Juan
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/73027276099498502428
id ndltd-TW-097NCNU0392011
record_format oai_dc
spelling ndltd-TW-097NCNU03920112015-11-20T04:18:47Z http://ndltd.ncl.edu.tw/handle/73027276099498502428 A Study of Secret Image Sharing Schemes 秘密影像分享系統之研究 Ching-Fen Lee 李青芬 碩士 國立暨南國際大學 資訊工程學系 97 Secret image sharing scheme can efficiently solve the problems that are digit materials, military documents and important images could be forged, falsified and stolen, etc. Up to now, there are many scholars to design various secret image sharing schemes. However, most of the schemes have many drawbacks and limits or still can be improved. For example: the computation is too complex; each participant holds too many shares; those schemes only can be applied in specified access structure; cannot share multi-secret images, achieve the capabilities of the multi-use, verification and detection at the same time. Based on the above defects, the goal of this thesis presents secret image sharing schemes with more integrity and multi-function. Therefore, we will divide thesis into three parts: In first part, Shyu and Chen proposed multiple secret images sharing schemes in 2008, but the secret images could be found by a set of unqualified participants in their general access structure sharing scheme. Therefore, we propose two multi-secret images sharing schemes (t, n)-MSISS1 and GMSISS1. The sizes of the public image and time complexity of these two schemes are better than Shyu and Chen’s schemes. Moreover, any set of the unqualified participants cannot found the secret images in these two schemes. In second part, Shi et al. proposed a (t, n)-threshold secret sharing scheme for image encryption in 2008, but there are some drawbacks in this scheme: the phenomenon shapes of the secret image could be found by using the public image, the width must be equal to the height, and the size of the secret images must be the same upon sharing multi-secret images. Therefore, we propose two multi-secret images sharing schemes (t, n)-MSISS2 and GMSISS2 to solve these problems. Furthermore, the proposed (t, n)-MSISS2 and GMSISS2 can respectively achieve sharing multi-secret images, multi-use, and each participant only holds one share, and GMSISS2 can be used for any general access structure. In third part, Zhao et al. proposed image secret sharing scheme to identify cheaters in 2009. But these exists the problem of disguise, and cannot achieve multi-use forever in Zhao et al.’s scheme. Therefore, we propose a verifiable and detectable multi-secret images sharing scheme with general access structure VDGMSISS to provide a verifiable procedure to authenticate identity of valid participants and a detectable method to check accuracy of the share. In addition, the proposed VDGMSISS can achieve some properties, such as sharing multi-secret images, multi-use, without security channel and be used for any access structure. Justie Su-Tzu Juan 阮夙姿 2009 學位論文 ; thesis 87 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立暨南國際大學 === 資訊工程學系 === 97 === Secret image sharing scheme can efficiently solve the problems that are digit materials, military documents and important images could be forged, falsified and stolen, etc. Up to now, there are many scholars to design various secret image sharing schemes. However, most of the schemes have many drawbacks and limits or still can be improved. For example: the computation is too complex; each participant holds too many shares; those schemes only can be applied in specified access structure; cannot share multi-secret images, achieve the capabilities of the multi-use, verification and detection at the same time. Based on the above defects, the goal of this thesis presents secret image sharing schemes with more integrity and multi-function. Therefore, we will divide thesis into three parts: In first part, Shyu and Chen proposed multiple secret images sharing schemes in 2008, but the secret images could be found by a set of unqualified participants in their general access structure sharing scheme. Therefore, we propose two multi-secret images sharing schemes (t, n)-MSISS1 and GMSISS1. The sizes of the public image and time complexity of these two schemes are better than Shyu and Chen’s schemes. Moreover, any set of the unqualified participants cannot found the secret images in these two schemes. In second part, Shi et al. proposed a (t, n)-threshold secret sharing scheme for image encryption in 2008, but there are some drawbacks in this scheme: the phenomenon shapes of the secret image could be found by using the public image, the width must be equal to the height, and the size of the secret images must be the same upon sharing multi-secret images. Therefore, we propose two multi-secret images sharing schemes (t, n)-MSISS2 and GMSISS2 to solve these problems. Furthermore, the proposed (t, n)-MSISS2 and GMSISS2 can respectively achieve sharing multi-secret images, multi-use, and each participant only holds one share, and GMSISS2 can be used for any general access structure. In third part, Zhao et al. proposed image secret sharing scheme to identify cheaters in 2009. But these exists the problem of disguise, and cannot achieve multi-use forever in Zhao et al.’s scheme. Therefore, we propose a verifiable and detectable multi-secret images sharing scheme with general access structure VDGMSISS to provide a verifiable procedure to authenticate identity of valid participants and a detectable method to check accuracy of the share. In addition, the proposed VDGMSISS can achieve some properties, such as sharing multi-secret images, multi-use, without security channel and be used for any access structure.
author2 Justie Su-Tzu Juan
author_facet Justie Su-Tzu Juan
Ching-Fen Lee
李青芬
author Ching-Fen Lee
李青芬
spellingShingle Ching-Fen Lee
李青芬
A Study of Secret Image Sharing Schemes
author_sort Ching-Fen Lee
title A Study of Secret Image Sharing Schemes
title_short A Study of Secret Image Sharing Schemes
title_full A Study of Secret Image Sharing Schemes
title_fullStr A Study of Secret Image Sharing Schemes
title_full_unstemmed A Study of Secret Image Sharing Schemes
title_sort study of secret image sharing schemes
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/73027276099498502428
work_keys_str_mv AT chingfenlee astudyofsecretimagesharingschemes
AT lǐqīngfēn astudyofsecretimagesharingschemes
AT chingfenlee mìmìyǐngxiàngfēnxiǎngxìtǒngzhīyánjiū
AT lǐqīngfēn mìmìyǐngxiàngfēnxiǎngxìtǒngzhīyánjiū
AT chingfenlee studyofsecretimagesharingschemes
AT lǐqīngfēn studyofsecretimagesharingschemes
_version_ 1718132644645961728