IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES

碩士 === 大同大學 === 電機工程學系(所) === 97 === In the field of information security, there is a category of technology called Information Hiding Technique [1] which encrypts and decrypts in different ways from the traditional encryption technology in the past. It is based on the behavior of hiding secret info...

Full description

Bibliographic Details
Main Authors: Yung-Cheng Tseng, 曾泳承
Other Authors: Shuem-Shyang Wang
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/83387012339845663447
id ndltd-TW-097TTU05442019
record_format oai_dc
spelling ndltd-TW-097TTU054420192016-05-02T04:11:10Z http://ndltd.ncl.edu.tw/handle/83387012339845663447 IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES 分享機密影像於多張影像之改進方法 Yung-Cheng Tseng 曾泳承 碩士 大同大學 電機工程學系(所) 97 In the field of information security, there is a category of technology called Information Hiding Technique [1] which encrypts and decrypts in different ways from the traditional encryption technology in the past. It is based on the behavior of hiding secret information , thus ensure the security. One of the Information Hiding Techniques, called Visual Cryptography proposed by [3] Noar and Shamir in 1994, does not need computer calculation because it has no complicated calculation formula. We can decode the hidden information by color contrast and superimposing shares which consist of a transparency through human visual system. In the original Visual Cryptography, the pixels of the image are almost composed of black and white. Consequently, whether in the cover images of separated shares or images reconstructed by superimposing shares, the color performance is restricted to black and white. As a result, color visual cryptography was then developed. Adding colors makes images more vivid and closer to people’s life. It is found that not every coding manner can precisely depict the original colors of encrypted or reconstructed images. In [2] it proposed a good algorithm to share a secret gray image in Multiple images. However, the outcome of camouflage image is not satisfactory, and the picture is also enlarged to 3×3, which is 9 times bigger than the original image size. This thesis is to improve this algorithm to make the camouflage images more similar to the original cover images, and reduce the size enlarged from 3×3 to 2×2, so as to decrease the zoom ratio. Shuem-Shyang Wang 汪順祥 2009 學位論文 ; thesis 103 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大同大學 === 電機工程學系(所) === 97 === In the field of information security, there is a category of technology called Information Hiding Technique [1] which encrypts and decrypts in different ways from the traditional encryption technology in the past. It is based on the behavior of hiding secret information , thus ensure the security. One of the Information Hiding Techniques, called Visual Cryptography proposed by [3] Noar and Shamir in 1994, does not need computer calculation because it has no complicated calculation formula. We can decode the hidden information by color contrast and superimposing shares which consist of a transparency through human visual system. In the original Visual Cryptography, the pixels of the image are almost composed of black and white. Consequently, whether in the cover images of separated shares or images reconstructed by superimposing shares, the color performance is restricted to black and white. As a result, color visual cryptography was then developed. Adding colors makes images more vivid and closer to people’s life. It is found that not every coding manner can precisely depict the original colors of encrypted or reconstructed images. In [2] it proposed a good algorithm to share a secret gray image in Multiple images. However, the outcome of camouflage image is not satisfactory, and the picture is also enlarged to 3×3, which is 9 times bigger than the original image size. This thesis is to improve this algorithm to make the camouflage images more similar to the original cover images, and reduce the size enlarged from 3×3 to 2×2, so as to decrease the zoom ratio.
author2 Shuem-Shyang Wang
author_facet Shuem-Shyang Wang
Yung-Cheng Tseng
曾泳承
author Yung-Cheng Tseng
曾泳承
spellingShingle Yung-Cheng Tseng
曾泳承
IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
author_sort Yung-Cheng Tseng
title IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
title_short IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
title_full IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
title_fullStr IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
title_full_unstemmed IMPROVED METHODS FOR SHARING A SECRET IMAGE IN MULTIPLE IMAGES
title_sort improved methods for sharing a secret image in multiple images
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/83387012339845663447
work_keys_str_mv AT yungchengtseng improvedmethodsforsharingasecretimageinmultipleimages
AT céngyǒngchéng improvedmethodsforsharingasecretimageinmultipleimages
AT yungchengtseng fēnxiǎngjīmìyǐngxiàngyúduōzhāngyǐngxiàngzhīgǎijìnfāngfǎ
AT céngyǒngchéng fēnxiǎngjīmìyǐngxiàngyúduōzhāngyǐngxiàngzhīgǎijìnfāngfǎ
_version_ 1718253455068364800