Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images
博士 === 國立交通大學 === 資訊科學與工程研究所 === 99 === In the dissertation, several technologies to protect digital images are proposed. To diffuse the content of a secret image, Visual Cryptography and Sharing are both studied in the dissertation. First, a Flip Visual Cryptography system is proposed. Two secret i...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/32877555637020716032 |
id |
ndltd-TW-099NCTU5394039 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCTU53940392016-04-08T04:22:00Z http://ndltd.ncl.edu.tw/handle/32877555637020716032 Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images 影像之視覺式分享,權重式分享,修復與高品質資訊隱藏 Lin, Sian-Jheng 林憲正 博士 國立交通大學 資訊科學與工程研究所 99 In the dissertation, several technologies to protect digital images are proposed. To diffuse the content of a secret image, Visual Cryptography and Sharing are both studied in the dissertation. First, a Flip Visual Cryptography system is proposed. Two secret images are encoded as two transparencies. Stacking the two transparencies can reveal one secret, and the second secret is revealed by stacking the second transparency with the flipped version of the first transparency. The proposed scheme is proved to have perfect security and conditionally-optimal contrast. In the second topic of the dissertation, a weighted secret image sharing method is proposed. Each shadow has a weight which indicates the shadow’s relative importance. The secret image can be decoded as long as the total sum of received weights reaches a specified threshold. The weighted sharing method is based on polynomial division, and the traditional polynomial-style secret image sharing is a sub-case of ours. Moreover, by observing the characteristics of GF(2k), a fast sharing algorithm is also proposed. In the third topic of the dissertation, in order to have confidential transmission, an image-hiding method based on weighted-sum function is proposed. Compared with previous works, the proposed method has following advantages: i) wide range of embedding rate (such as 0.5 to 4.0 bits per pixel); ii) competitive PSNR values over the whole wide range; iii) once an embedding rate is given, our look-up table can predict the PSNR value, even before the actual embedding. In the fourth topic of the dissertation, in order to protect the accuracy of an image, a semi-fragile watermarking method with recovery ability is proposed. The recovery data are shared among many shadows; then each shadow is embedded in the DCT domain of an image block. When the watermarked image is tampered with in some area, the non-damaged shadows are extracted from image blocks; then the recovery data are decoded from those non-damaged shadows. The recovery data are then used to repair the damaged area. Experiments show that the proposed method can resist some content-preserving operations within certain degrees, such as JPEG compression, Gaussian noise, and brightness adjustment. Lin, Ja-Chen 林志青 2010 學位論文 ; thesis 124 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立交通大學 === 資訊科學與工程研究所 === 99 === In the dissertation, several technologies to protect digital images are proposed. To diffuse the content of a secret image, Visual Cryptography and Sharing are both studied in the dissertation. First, a Flip Visual Cryptography system is proposed. Two secret images are encoded as two transparencies. Stacking the two transparencies can reveal one secret, and the second secret is revealed by stacking the second transparency with the flipped version of the first transparency. The proposed scheme is proved to have perfect security and conditionally-optimal contrast.
In the second topic of the dissertation, a weighted secret image sharing method is proposed. Each shadow has a weight which indicates the shadow’s relative importance. The secret image can be decoded as long as the total sum of received weights reaches a specified threshold. The weighted sharing method is based on polynomial division, and the traditional polynomial-style secret image sharing is a sub-case of ours. Moreover, by observing the characteristics of GF(2k), a fast sharing algorithm is also proposed.
In the third topic of the dissertation, in order to have confidential transmission, an image-hiding method based on weighted-sum function is proposed. Compared with previous works, the proposed method has following advantages: i) wide range of embedding rate (such as 0.5 to 4.0 bits per pixel); ii) competitive PSNR values over the whole wide range; iii) once an embedding rate is given, our look-up table can predict the PSNR value, even before the actual embedding.
In the fourth topic of the dissertation, in order to protect the accuracy of an image, a semi-fragile watermarking method with recovery ability is proposed. The recovery data are shared among many shadows; then each shadow is embedded in the DCT domain of an image block. When the watermarked image is tampered with in some area, the non-damaged shadows are extracted from image blocks; then the recovery data are decoded from those non-damaged shadows. The recovery data are then used to repair the damaged area. Experiments show that the proposed method can resist some content-preserving operations within certain degrees, such as JPEG compression, Gaussian noise, and brightness adjustment.
|
author2 |
Lin, Ja-Chen |
author_facet |
Lin, Ja-Chen Lin, Sian-Jheng 林憲正 |
author |
Lin, Sian-Jheng 林憲正 |
spellingShingle |
Lin, Sian-Jheng 林憲正 Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
author_sort |
Lin, Sian-Jheng |
title |
Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
title_short |
Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
title_full |
Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
title_fullStr |
Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
title_full_unstemmed |
Visual Cryptography, Weighted Sharing, Damage Repairing, and High Quality Hiding of Images |
title_sort |
visual cryptography, weighted sharing, damage repairing, and high quality hiding of images |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/32877555637020716032 |
work_keys_str_mv |
AT linsianjheng visualcryptographyweightedsharingdamagerepairingandhighqualityhidingofimages AT línxiànzhèng visualcryptographyweightedsharingdamagerepairingandhighqualityhidingofimages AT linsianjheng yǐngxiàngzhīshìjuéshìfēnxiǎngquánzhòngshìfēnxiǎngxiūfùyǔgāopǐnzhìzīxùnyǐncáng AT línxiànzhèng yǐngxiàngzhīshìjuéshìfēnxiǎngquánzhòngshìfēnxiǎngxiūfùyǔgāopǐnzhìzīxùnyǐncáng |
_version_ |
1718219208326643712 |