A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure

碩士 === 玄奘大學 === 資訊管理學系碩士班 === 105 === With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be se...

Full description

Bibliographic Details
Main Authors: Yu Shih-Hsuan, 游識玄
Other Authors: Yang Chyuan-Huei Thomas
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/4zkvkg
id ndltd-TW-105HCU00396005
record_format oai_dc
spelling ndltd-TW-105HCU003960052019-05-15T23:32:18Z http://ndltd.ncl.edu.tw/handle/4zkvkg A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure 應用四元樹結構的視覺影像秘密分享 Yu Shih-Hsuan 游識玄 碩士 玄奘大學 資訊管理學系碩士班 105 With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be seen confidential images directly to the human eye without complex operations. In this study, we use the quad-tree structure to represent the secret image with two kinds of methods, one is applying Naor and Shamir (2, 2) visual Cryptography Secret Image Sharing Scheme and another is applying a codebooks to separate it into 2 to 4 parts to share. Experiments have shown that the results can have the general effect of visual cryptography. The secret image can be retrieved to the original image with extended pixels and the original-like secret image with non-extended pixels from any two of sharing parts. Yang Chyuan-Huei Thomas 楊權輝 2017 學位論文 ; thesis 43 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 玄奘大學 === 資訊管理學系碩士班 === 105 === With more and more developed the information technology industry, so how to safely pass information becomes very important. In recent years, many people discuss on visual cryptography secret sharing methods. The characteristics of visual secret sharing can be seen confidential images directly to the human eye without complex operations. In this study, we use the quad-tree structure to represent the secret image with two kinds of methods, one is applying Naor and Shamir (2, 2) visual Cryptography Secret Image Sharing Scheme and another is applying a codebooks to separate it into 2 to 4 parts to share. Experiments have shown that the results can have the general effect of visual cryptography. The secret image can be retrieved to the original image with extended pixels and the original-like secret image with non-extended pixels from any two of sharing parts.
author2 Yang Chyuan-Huei Thomas
author_facet Yang Chyuan-Huei Thomas
Yu Shih-Hsuan
游識玄
author Yu Shih-Hsuan
游識玄
spellingShingle Yu Shih-Hsuan
游識玄
A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
author_sort Yu Shih-Hsuan
title A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
title_short A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
title_full A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
title_fullStr A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
title_full_unstemmed A Visual Cryptography Secret Image Sharing Scheme with Quad-tree Structure
title_sort visual cryptography secret image sharing scheme with quad-tree structure
publishDate 2017
url http://ndltd.ncl.edu.tw/handle/4zkvkg
work_keys_str_mv AT yushihhsuan avisualcryptographysecretimagesharingschemewithquadtreestructure
AT yóushíxuán avisualcryptographysecretimagesharingschemewithquadtreestructure
AT yushihhsuan yīngyòngsìyuánshùjiégòudeshìjuéyǐngxiàngmìmìfēnxiǎng
AT yóushíxuán yīngyòngsìyuánshùjiégòudeshìjuéyǐngxiàngmìmìfēnxiǎng
AT yushihhsuan visualcryptographysecretimagesharingschemewithquadtreestructure
AT yóushíxuán visualcryptographysecretimagesharingschemewithquadtreestructure
_version_ 1719149328346382336