Tolerable Key Distortion Based on Secret Sharing Technology
碩士 === 靜宜大學 === 資訊傳播工程學系碩士班 === 98 === Image secret sharing is to share a secret image into many shadow images. Each participator owns a part of secret information, but they can not extract the secret data from their own share. The secret image can be recovered only when the number of shadow images...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/29943306412484684961 |
Summary: | 碩士 === 靜宜大學 === 資訊傳播工程學系碩士班 === 98 === Image secret sharing is to share a secret image into many shadow images. Each participator owns a part of secret information, but they can not extract the secret data from their own share. The secret image can be recovered only when the number of shadow images is large than the predefine threshold. In traditional secret sharing methods, secret key is the important data, and it cannot distortion differ from the original key. In this thesis, we proposed two tolerable key-distortion schemes for secret image sharing. In the first scheme called quantization-based secret sharing scheme is based on the Shamir’s secret sharing mechanism. The first scheme does not need to do pixel expansion. The second scheme is called relation-key based secret sharing scheme. The second scheme needs to do pixel expansion for shadow images generation. The new shadow image was generated by rotating the previous shadow images in order. The secret can be reconstructed if we get enough shares and decoding in order. Both two methods can provide tolerable key distortion and obtains acceptable image quality of recovered secret image.
|
---|