题名

在彩色視覺密碼技術中產生具有意義的彩色視覺分享

并列篇名

Generating Friendly and Colorful Shares in Color Visual Cryptography

DOI

10.29614/DRMM.201104.0004

作者

陳宗和;曹凱翔;張述傑

关键词

影像加密 ; 視覺密碼學 ; 有意義的分享影像 ; image encryption ; visual cryptography ; meaningful

期刊名称

資訊安全通訊

卷期/出版年月

17卷2期(2011 / 04 / 01)

页次

37 - 47

内容语文

繁體中文

中文摘要

對於影像及視訊等多媒體資訊的保護,在近年來已經成為十分重要的議題,許多對於影像加密的研究文獻中是以視覺密碼學(Visual Cryptography, VC)作為研究及改良的基礎,VC 技術將一張秘密影像分解成兩張看似無意義的分享影像(share image),由單張的分享影像並不能得知任何跟原始秘密有關的資訊;若是蒐集到全部的分享影像並相疊之後,傴靠視覺即可得知原秘密,完全不必借助電腦設備。典型的視覺密碼學只能加密黑白影像,並且會產生出兩張無意義的分享影像(share)以解密,然而這些看似雜訊的分享影像,使用者在使用或管理上並不方便。本篇論文將改良傳統視覺密碼學,能夠加密彩色影像,所產生的彩色分享影像也將是有意義的彩色影像,因此,能方便使用者使用或管理大量的分享影像。此外,值得注意的,本方法並沒有產生額外的像素擴展。

英文摘要

Recently, multimedia security has drawn much attention in academia and industry. A lot of research aiming at the confidentiality of images has been proposed based on Visual Cryptography (VC) which encrypts a binary image by generating two meaningless share images. Subsequently, in case of stacking two collected share images, the original secret can be disclosed by human visual system without involving any computational resource. Unfortunately, it is inconvenient for users to manage more and more meaningless share images. In this paper, an enhanced scheme which encrypts a color secret image into two colorful and meaningful share images is proposed to facilitate the management and usage of numerous share images.

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. Ateniese, G.,Blundo, C.,De Santis, A.,Stinson, D. R.(2001).Extended capabilities for visual cryptography.Theoretical Computer Science,250(1-2),134-161.
  2. Chang, C. C.,Chuang, J. C.,Lin, P. Y.(2005).Sharing a secret two-tone image in two gray-level images.Proceedings of the 11th International Conference on Parallel and Distributed Systems
  3. Chang,C. C.,Tai, W. L.,Lin, C. C.(2005).Hiding a secret colour image in two colour images.The Imaging Science Journal,53(4),229-240.
  4. Chen, T. H.,Tsai, D. S.(2006).Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol.Pattern Recognition,39(8),1530-1541.
  5. Fang, W. P.(2008).Friendly progressive visual secret sharing.Pattern Recognition,41(4),1410-1414.
  6. Fang, W. P.,Lin, J. C.(2006).Visual cryptography with extra ability of hiding confidential data.Journal of Electronic imaging,15(2)
  7. Hou, Y. C.(2003).Visual cryptography for color images.Pattern Recognition,36,1619-1629.
  8. Hwang, R. J.,Chang, C. C.(2001).Hiding a picture in two pictures.Optical Engineering,40(3),342-351.
  9. Leung, B.W.,Ng, F. Y.,Wong, D. S.(2009).On the security of a visual cryptography scheme for color images.Pattern Recognition,42(5),929-940.
  10. Lukac, R.,Plataniotis, K. N.(2005).Bit-level based secret sharing for image encryption.Pattern Recognitio,38(5),767-772.
  11. Nakajima, M.,Yamaguchi, Y.(2004).Enhancing registration tolerance of extended visual cryptography for natural images.Journal of Electronic Imaging,13(3),654-662.
  12. Naor, M.,Pinkas, B.(1997).Visual authentication and identification.Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science,Santa Barbara, California, USA:
  13. Naor, M.,Shamir, A.(1995).Visual cryptography.Proceedings of Advances in Cryptology-Eurocrypt '94, Lecture Notes in Computer Science,Berlin:
  14. Prakash, N. K.,Govindaraju, S.(2007).Visual Secrect Sharing Schemes for Color Image Using Halftoning.Proceedings of International Conference on Computational Intelligence and Multimedia Applications
  15. Shyu, S. J.(2007).Image encryption by random grids.Pattern Recognitio,40(3),1014-1031.
  16. Tsai, D. S.,Chen, T. H.,Horng, G.(2008).On generating meaningful shares in visual secret sharing schemes.The Imaging Science Journal,56,49-55.
  17. Zhou, G.,Arce, R.,Crescenzo, G. D.(2006).Halftone visual cryptography.IEEE Transactions on Image Processing,15(8),2441-2453.