On Visual Cryptography of Multiple Secret Images
碩士 === 國立交通大學 === 多媒體工程研究所 === 102 === This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method enco...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/k3qv8e |
id |
ndltd-TW-102NCTU5641031 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NCTU56410312019-05-15T21:50:57Z http://ndltd.ncl.edu.tw/handle/k3qv8e On Visual Cryptography of Multiple Secret Images 多張機密影像的視覺加密技術 Li, Fong-Jheng 李豐政 碩士 國立交通大學 多媒體工程研究所 102 This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method encodes twelve secret images into two transparencies. We can get twelve secret images respectively by eight different stacking types. 2) High hiding capacity: for four given secret images, two transparencies are produced. Stacking in different manners, we can decode four secret images respectively. Total space needed is smaller than the bits of total secret images. In constrained (2,3) model, the method encodes four secret images into three transparencies. We only can decode secret images by stacking the most important transparency with either one of the two other transparencies. This method can be extended into (2,k) model. Finally, in the folding model, we fold down a transparency, and then stack with the other to decode secret images. Lin, Ja-Chen 林志青 2014 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 多媒體工程研究所 === 102 === This master’s thesis proposes three schemes on visual cryptography of multiple secret images sharing: (2,2) model, constrained (2,3) model, and folding model. In the (2,2) model, we present two different schemes : 1) Multiple types of stacking: this method encodes twelve secret images into two transparencies. We can get twelve secret images respectively by eight different stacking types. 2) High hiding capacity: for four given secret images, two transparencies are produced. Stacking in different manners, we can decode four secret images respectively. Total space needed is smaller than the bits of total secret images. In constrained (2,3) model, the method encodes four secret images into three transparencies. We only can decode secret images by stacking the most important transparency with either one of the two other transparencies. This method can be extended into (2,k) model. Finally, in the folding model, we fold down a transparency, and then stack with the other to decode secret images.
|
author2 |
Lin, Ja-Chen |
author_facet |
Lin, Ja-Chen Li, Fong-Jheng 李豐政 |
author |
Li, Fong-Jheng 李豐政 |
spellingShingle |
Li, Fong-Jheng 李豐政 On Visual Cryptography of Multiple Secret Images |
author_sort |
Li, Fong-Jheng |
title |
On Visual Cryptography of Multiple Secret Images |
title_short |
On Visual Cryptography of Multiple Secret Images |
title_full |
On Visual Cryptography of Multiple Secret Images |
title_fullStr |
On Visual Cryptography of Multiple Secret Images |
title_full_unstemmed |
On Visual Cryptography of Multiple Secret Images |
title_sort |
on visual cryptography of multiple secret images |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/k3qv8e |
work_keys_str_mv |
AT lifongjheng onvisualcryptographyofmultiplesecretimages AT lǐfēngzhèng onvisualcryptographyofmultiplesecretimages AT lifongjheng duōzhāngjīmìyǐngxiàngdeshìjuéjiāmìjìshù AT lǐfēngzhèng duōzhāngjīmìyǐngxiàngdeshìjuéjiāmìjìshù |
_version_ |
1719120022167617536 |