A New (k, n) Multi-Secret Visual Cryptography
碩士 === 國立東華大學 === 資訊工程學系 === 98 === In a (k, n) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images to visually decode the secret image without the help of...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/41422145031354390961 |
id |
ndltd-TW-098NDHU5392051 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NDHU53920512016-04-22T04:23:10Z http://ndltd.ncl.edu.tw/handle/41422145031354390961 A New (k, n) Multi-Secret Visual Cryptography 新型的(k,n)多秘密視覺密碼 Ting-Hao Chung 鍾庭顥 碩士 國立東華大學 資訊工程學系 98 In a (k, n) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images to visually decode the secret image without the help of hardware or computation, but (k-1) or fewer participants will not gain any information. This distinctive property of easy decoding by the human visual system can be used to securely and cheaply share any printed-text secret image- such as a password- in situations where no computer assistance is available or desirable. Due to the uniqueness of VCS and more visual data in the modern visual communication, there will be more and more intended applications of VCS in the future. Up to now, the VSS technology has been adopted in many applications such as digital image indexing, watermarking, securing display, embedding private information. Most researches on VCS are to share one secret only, and this limits its possible applications. In this thesis we consider the case when the secret image is more than one, and this is a so-called multi-secret VCS (MVCS). The previous works on MVCS are all the simple 2-out-of-2 cases. We consider a general (k, n, s)-MVCS for any k, n and s using ringed shadows. This thesis has three main contributions: (1) our scheme is the first general (k, n)-MVCS, which can be applied on any k and n (2) we give the formal security and contrast conditions of (k, n)-MVCS (3) we theoretically prove that the proposed (k, n)-MVCS satisfies the security and contrast conditions. Ching-Nung Yang 楊慶隆 2010 學位論文 ; thesis 57 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立東華大學 === 資訊工程學系 === 98 === In a (k, n) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images to visually decode the secret image without the help of hardware or computation, but (k-1) or fewer participants will not gain any information. This distinctive property of easy decoding by the human visual system can be used to securely and cheaply share any printed-text secret image- such as a password- in situations where no computer assistance is available or desirable. Due to the uniqueness of VCS and more visual data in the modern visual communication, there will be more and more intended applications of VCS in the future. Up to now, the VSS technology has been adopted in many applications such as digital image indexing, watermarking, securing display, embedding private information.
Most researches on VCS are to share one secret only, and this limits its possible applications. In this thesis we consider the case when the secret image is more than one, and this is a so-called multi-secret VCS (MVCS). The previous works on MVCS are all the simple 2-out-of-2 cases. We consider a general (k, n, s)-MVCS for any k, n and s using ringed shadows. This thesis has three main contributions: (1) our scheme is the first general (k, n)-MVCS, which can be applied on any k and n (2) we give the formal security and contrast conditions of (k, n)-MVCS (3) we theoretically prove that the proposed (k, n)-MVCS satisfies the security and contrast conditions.
|
author2 |
Ching-Nung Yang |
author_facet |
Ching-Nung Yang Ting-Hao Chung 鍾庭顥 |
author |
Ting-Hao Chung 鍾庭顥 |
spellingShingle |
Ting-Hao Chung 鍾庭顥 A New (k, n) Multi-Secret Visual Cryptography |
author_sort |
Ting-Hao Chung |
title |
A New (k, n) Multi-Secret Visual Cryptography |
title_short |
A New (k, n) Multi-Secret Visual Cryptography |
title_full |
A New (k, n) Multi-Secret Visual Cryptography |
title_fullStr |
A New (k, n) Multi-Secret Visual Cryptography |
title_full_unstemmed |
A New (k, n) Multi-Secret Visual Cryptography |
title_sort |
new (k, n) multi-secret visual cryptography |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/41422145031354390961 |
work_keys_str_mv |
AT tinghaochung anewknmultisecretvisualcryptography AT zhōngtínghào anewknmultisecretvisualcryptography AT tinghaochung xīnxíngdeknduōmìmìshìjuémìmǎ AT zhōngtínghào xīnxíngdeknduōmìmìshìjuémìmǎ AT tinghaochung newknmultisecretvisualcryptography AT zhōngtínghào newknmultisecretvisualcryptography |
_version_ |
1718230023296516096 |