题名

基因演繹式之關鍵性視覺判讀機制研究

并列篇名

Genetic Algorithms Highlighting the Target Secret in Visual Cryptography

DOI

10.6382/JIM.200804.0005

作者

王旭正(Shiuh-Jeng Wang);王蕙禛(Huei-Jhen Wang);林立群(Li-Cheng Lin)

关键词

科技應用 ; 視覺密碼學 ; 基因演算法 ; 安全環境 ; High-tech demands ; visual cryptography ; genetic algorithm ; security

期刊名称

資訊管理學報

卷期/出版年月

15卷2期(2008 / 04 / 01)

页次

85 - 107

内容语文

繁體中文

中文摘要

視覺安全是一種以視覺效果為辨識秘密的機制,其不需要計算大量的複雜數學,和其他傳統的密碼系統比較起來,方便許多。不過,視覺安全在使用上仍有許多議題有待研究與討論。其中,文獻(邱文怡等2002)曾試圖運用善於搜尋問題的最佳解答之基因演算法,來解決視覺安全裡影像擴張與有意義性的問題。然而,我們發現用其方法所產生的秘密影像中,原應為黑色的像素,在某些時候可能變成白像素,或者白像素可能變成黑像素。這將造成使用者不容易判讀出正確的秘密訊息。因此,本文提出另一種做法,以改變基因演算法的運作方式,來解決此方面的議題。運用我們的方法,可以確保秘密訊息的正確性,並有效降低人眼判讀的錯誤。

英文摘要

Secure concern in visual cryptography is yet another cipher mechanism used in the lower computation requirements. Compared to the text-based cryptography, such as DES and RSA, the time cost in decryption is much saved due to the secret is gained directly by our human vision systems. In secure concerns, how to make visual cryptography practical applying in real cases in the computer systems, there are still open issues in this way. Accordingly, one of the studied literature in (邱文怡等 2002), the genetic-based algorithm was proposed to realize the visual cryptography in the shadow/share image generation, in such a way that the size of share image is able to remain the same one of target image showing the secret. It is great research work using the manner of the genetic-based algorithm. In this case, we further observed that the secret shown in the target image can be improved better in order to resolve the misconception in the recognition of critical secret reading. It is conducted the uniform generations of black-pixel and white-pixel in our proposed algorithms. As the experiments given in our scheme, the secret shown in the target image is really undoubtedly visible to make the confusions clear in the recognitions of critical view-points.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. Naor, M.,Shamir, A.(1995).Visual Cryptography.In Advances in Cryptology-EUROCRYPT '94, LNCS 950, Springer-Verlag.
  2. Shamir, A.(1978).How to Share a Secret.Communications of the ACM (22).
  3. Tsai, D.S.,Chen, T.H,Horng, G.(2006).A New Cheating Prevention Scheme for Visual Cryptography.Proceedings of the 16th National Conference on Information Security, R.O.C..
  4. 吳佳鴻(2003)。碩士論文(碩士論文)。中央大學資訊管理學系。
  5. 沈伯成(2003)。碩士論文(碩士論文)。中央大學資訊管理學系。
  6. 周鵬程(2002)。全華科技圖書
  7. 邱文怡、洪國寶、王乾隆、許琪慧(2002)。應用微小母體之基因演算法於視覺密碼學。第十二屆全國資訊安全會議
  8. 侯永昌、張雅惠(2003)。應用遺傳演算法於向量量化之新編碼簿設計法。電腦學刊,15(2)
  9. 黃昭平、張克章、侯永昌(2000)。基因密碼產生器之設計與研究。中華管理評論,3(1),173-186。