Cheating Immune Block-based Progressive Visual Cryptography

碩士 === 國立東華大學 === 資訊工程學系 === 101 === In a (k, n)-VCS, any k participants can print out their shadows on transparencies and stack them on an overhead projector to visually decode the secret image without computer hardware or computation. Recently, Hou et al. introduced a (2, n) block-based progressiv...

Full description

Bibliographic Details
Main Authors: Yi-Chin Lin, 林易青
Other Authors: Ching-Nung Yang
Format: Others
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/70757100531708692175
id ndltd-TW-101NDHU5392045
record_format oai_dc
spelling ndltd-TW-101NDHU53920452015-10-13T22:40:50Z http://ndltd.ncl.edu.tw/handle/70757100531708692175 Cheating Immune Block-based Progressive Visual Cryptography 具詐欺防禦之區塊累進式視覺密碼機制 Yi-Chin Lin 林易青 碩士 國立東華大學 資訊工程學系 101 In a (k, n)-VCS, any k participants can print out their shadows on transparencies and stack them on an overhead projector to visually decode the secret image without computer hardware or computation. Recently, Hou et al. introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS), which the image blocks can be gradually recovered step by step. In Hou et al.’s (2, n)-BPVCS, a secret image is subdivided into n non-overlapped image blocks. When stacking any t (2  t  n) shadows, all the image blocks associated with these t participants will be recovered. Unfortunately, Hou et al.’s (2, n)-BVCPS suffers from the cheating problem, which any two dishonest participants might collude together to tamper their image blocks shared with other honest participants. Also, they can impersonate an honest participant to force other honest participants to reconstruct the wrong secret. In this thesis, we solve the cheating problem and propose a cheating immune (2, n)-BPVCS. Additionally, Hou et al.’s scheme is only suitable for the 2-out-of-n case, i.e., (k, n)-BPVCS where k=2. Here, we also present a (k, n)-BPVCS. The problem we consider in this thesis is that of constructing the cheating immune BVCPS that are robust against dishonest participants. This thesis has four main contributions: (1) we provide two cheating types in Hou et al.’s (2, n)-BPVCS (2) we propose a cheating immune (2, n)-BPVCS (3) we propose a general cheating immune (k, n)-BPVCS, where k and n can be any integers (4) our (2, n)-BPVCS and (k, n)-BPVCS are theoretically proven to satisfy the progressive recovery, the security, and the cheating immune capability. Ching-Nung Yang 楊慶隆 2013 學位論文 ; thesis 65
collection NDLTD
format Others
sources NDLTD
description 碩士 === 國立東華大學 === 資訊工程學系 === 101 === In a (k, n)-VCS, any k participants can print out their shadows on transparencies and stack them on an overhead projector to visually decode the secret image without computer hardware or computation. Recently, Hou et al. introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS), which the image blocks can be gradually recovered step by step. In Hou et al.’s (2, n)-BPVCS, a secret image is subdivided into n non-overlapped image blocks. When stacking any t (2  t  n) shadows, all the image blocks associated with these t participants will be recovered. Unfortunately, Hou et al.’s (2, n)-BVCPS suffers from the cheating problem, which any two dishonest participants might collude together to tamper their image blocks shared with other honest participants. Also, they can impersonate an honest participant to force other honest participants to reconstruct the wrong secret. In this thesis, we solve the cheating problem and propose a cheating immune (2, n)-BPVCS. Additionally, Hou et al.’s scheme is only suitable for the 2-out-of-n case, i.e., (k, n)-BPVCS where k=2. Here, we also present a (k, n)-BPVCS. The problem we consider in this thesis is that of constructing the cheating immune BVCPS that are robust against dishonest participants. This thesis has four main contributions: (1) we provide two cheating types in Hou et al.’s (2, n)-BPVCS (2) we propose a cheating immune (2, n)-BPVCS (3) we propose a general cheating immune (k, n)-BPVCS, where k and n can be any integers (4) our (2, n)-BPVCS and (k, n)-BPVCS are theoretically proven to satisfy the progressive recovery, the security, and the cheating immune capability.
author2 Ching-Nung Yang
author_facet Ching-Nung Yang
Yi-Chin Lin
林易青
author Yi-Chin Lin
林易青
spellingShingle Yi-Chin Lin
林易青
Cheating Immune Block-based Progressive Visual Cryptography
author_sort Yi-Chin Lin
title Cheating Immune Block-based Progressive Visual Cryptography
title_short Cheating Immune Block-based Progressive Visual Cryptography
title_full Cheating Immune Block-based Progressive Visual Cryptography
title_fullStr Cheating Immune Block-based Progressive Visual Cryptography
title_full_unstemmed Cheating Immune Block-based Progressive Visual Cryptography
title_sort cheating immune block-based progressive visual cryptography
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/70757100531708692175
work_keys_str_mv AT yichinlin cheatingimmuneblockbasedprogressivevisualcryptography
AT línyìqīng cheatingimmuneblockbasedprogressivevisualcryptography
AT yichinlin jùzhàqīfángyùzhīqūkuàilèijìnshìshìjuémìmǎjīzhì
AT línyìqīng jùzhàqīfángyùzhīqūkuàilèijìnshìshìjuémìmǎjīzhì
_version_ 1718080210453135360