英文摘要
|
In the recent studies of visual cryptography (VC) or progressive VC, every share created by above two schemas has same capabilities to recover the secret image. As a result, managers are unable to give proper advantage to participants according to their importance. Consequently, providing each share a suitable recovering capability will be an effective way to solve this problem. In this paper, we propose a novel secret sharing method namely (n, n)-priority and progressive visual sharing model ((n, n)-PPVSM), every participant will be assigned a distinct weighting value, assuming that each one's significance is different from each other.Particularly, every pixel has the probability of 2k/(n^2+n) to be distributed as black in the k-th weighting share (WS(superscript k)), and this share has a better ability than the l-th weighting share (WS(superscript l)) to reveal the secret image if k≧l. When superimposing all shares, the upper bound of the white part in the secret image to be appeared as a black point will be 2/(n+1), and the black part is fully black, the restored image's contrast is equal to (n-1)/(n+1), and the contents will be clearly identified.Comparing our work with others, (n, n)-PPVSM has the following advantages: (1) Every share has different abilities to reveal secret information. (2) The contrast of the restored image is better than traditional VC. (3) This mechanism is more suitable for gray-level and color images in progressive sharing, and the cryptographers can clearly identify confidential content visually. (4) The size of shares is the same as the one of the secret images.
|
参考文献
|
-
侯永昌、官振宇(2011)。像素不擴展之漸進式視覺密碼。電子商務學報,13(1),99-116。
連結:
-
Chen, S. K.,Lin, J. C.(2005).Fault-tolerant and progressive transmission of images.Pattern Recognition,38(12),2466-2471.
-
Fang, W. P.,Lin, J. C.(2006).Progressive viewing and sharing of sensitive images.Pattern Recognition and Image Analysis,16(4),638-642.
-
Hou, Y. C.(2003).Visual cryptography for color images.Pattern Recognition,36(7),1619-1629.
-
Hou, Y. C.,Chang, C. Y.,Hsu, C. S.(2001).Visual cryptography for color images without pixel expansion.Proceeding of CISST'2001
-
Hsu, C. S.,Hou, Y. C.(2005).Copyright protection scheme for digital images using visual cryptography and sampling methods.Optical Engineering,44(7),077003-1-077003-10.
-
Ito, R.,Kuwakado, H.,Tanaka, H.(1999).Image size invariant visual cryptography.IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,E82-A(10),2172-2177.
-
Naor, M.,Shamir, A.(1995).visual cryptography.Advances in Cryptology- EUROCRYPT' 94
-
Panko, R. R.(2009).Business Data Networks and Telecommunications.Pearson Prentice Hall.
-
Randles, R. H.,Wolfe, D. A.(1979).Introduction to the Theory of Nonparametric Statistics.New York:Wiley.
-
Silberschatz, A.,Galvin, P. B.,Gagne, G.(2004).Operating System Concepts.John Wiley & Sons Inc.
-
Thien, C. C.,Lin, J. C.(2002).Secret image sharing.Computers & Graphics,26(5),765-770.
-
Tu, S. F.,Hou, Y. C.(2007).Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images.Imaging Science Journal,55(2),90-101.
-
Wang, R. Z.,Shyu, S. J.(2007).Scalable secret image sharing.Signal Processing: Image Communication,22(4),363-373.
-
Yang, C. N.(2004).New visual secret sharing schemes using probabilistic method.Pattern Recognition Letters,25(4),481-494.
-
Yang, C. N.,Chen, T. S.(2007).Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast.Optical Engineering,46(9),097005-1-097005-19.
|