A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
碩士 === 玄奘大學 === 資訊管理學系碩士班 === 105 === With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be se...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4zkvkg |
id |
ndltd-TW-105HCU00396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105HCU003960052019-05-15T23:32:18Z http://ndltd.ncl.edu.tw/handle/4zkvkg A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure 應用四元樹結構的視覺影像秘密分享 Yu Shih-Hsuan 游識玄 碩士 玄奘大學 資訊管理學系碩士班 105 With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be seen confidential images directly to the human eye without complex operations. In this study, we use the quad-tree structure to represent the secret image with two kinds of methods, one is applying Naor and Shamir (2, 2) visual Cryptography Secret Image Sharing Scheme and another is applying a codebooks to separate it into 2 to 4 parts to share. Experiments have shown that the results can have the general effect of visual cryptography. The secret image can be retrieved to the original image with extended pixels and the original-like secret image with non-extended pixels from any two of sharing parts. Yang Chyuan-Huei Thomas 楊權輝 2017 學位論文 ; thesis 43 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 玄奘大學 === 資訊管理學系碩士班 === 105 === With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be seen confidential images directly to the human eye without complex operations. In this study, we use the quad-tree structure to represent the secret image with two kinds of methods, one is applying Naor and Shamir (2, 2) visual Cryptography Secret Image Sharing Scheme and another is applying a codebooks to separate it into 2 to 4 parts to share. Experiments have shown that the results can have the general effect of visual cryptography. The secret image can be retrieved to the original image with extended pixels and the original-like secret image with non-extended pixels from any two of sharing parts.
|
author2 |
Yang Chyuan-Huei Thomas |
author_facet |
Yang Chyuan-Huei Thomas Yu Shih-Hsuan 游識玄 |
author |
Yu Shih-Hsuan 游識玄 |
spellingShingle |
Yu Shih-Hsuan 游識玄 A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
author_sort |
Yu Shih-Hsuan |
title |
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
title_short |
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
title_full |
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
title_fullStr |
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
title_full_unstemmed |
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure |
title_sort |
visual cryptography secret image sharing scheme with quad-tree structure |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/4zkvkg |
work_keys_str_mv |
AT yushihhsuan avisualcryptographysecretimagesharingschemewithquadtreestructure AT yóushíxuán avisualcryptographysecretimagesharingschemewithquadtreestructure AT yushihhsuan yīngyòngsìyuánshùjiégòudeshìjuéyǐngxiàngmìmìfēnxiǎng AT yóushíxuán yīngyòngsìyuánshùjiégòudeshìjuéyǐngxiàngmìmìfēnxiǎng AT yushihhsuan visualcryptographysecretimagesharingschemewithquadtreestructure AT yóushíxuán visualcryptographysecretimagesharingschemewithquadtreestructure |
_version_ |
1719149328346382336 |