博碩士論文 102522067 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:20 、訪客IP:3.147.104.108
姓名 蔡宗甫(Tzung-Fu Tsai)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 基於多層次誤差擴散之數位半色調資訊共享機制
(A Secret Sharing Scheme in Halftone Images Based on Multi-Scale Error Diffusion)
相關論文
★ 基於QT之跨平台無線心率分析系統實現★ 網路電話之額外訊息傳輸機制
★ 針對與運動比賽精彩畫面相關串場效果之偵測★ 植基於向量量化之視訊/影像內容驗證技術
★ 植基於串場效果偵測與內容分析之棒球比賽精華擷取系統★ 以視覺特徵擷取為基礎之影像視訊內容認證技術
★ 使用動態背景補償以偵測與追蹤移動監控畫面之前景物★ 應用於H.264/AVC視訊內容認證之適應式數位浮水印
★ 棒球比賽精華片段擷取分類系統★ 利用H.264/AVC特徵之多攝影機即時追蹤系統
★ 利用隱式型態模式之高速公路前車偵測機制★ 基於時間域與空間域特徵擷取之影片複製偵測機制
★ 結合數位浮水印與興趣區域位元率控制之車行視訊編碼★ 應用於數位智權管理之H.264/AVC視訊加解密暨數位浮水印機制
★ 基於文字與主播偵測之新聞視訊分析系統★ 植基於數位浮水印之H.264/AVC視訊內容驗證機制
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 本論文提出一個利用數位半色調影像做為機密資訊傳遞的共享機制。多張數位影像被當做載體並轉換為數位半色調影像,影像在轉換的過程中,我們利用半色調影像的特性,將相同大小的機密半色調影像嵌入於載體中,達成秘密通訊及資料共享的目標。此機制的數位半色調轉換基於多層次誤差擴散演算法,每次選擇適當的影像與位置放置白點,並根據機密半色調影像的內容讓同位置的白點個數滿足隱藏條件,研究的主要目標在於嵌入秘密影像的同時亦保持載體半色調影像的畫質。此外,我們提出數位半色調影像的互嵌機制,在不指定欲嵌入機密影像的情況下,能夠在參與共享的M 張影像中,利用任何M-1 張影像擷取剩餘的一張半色調影像。為了從資料庫中選擇適當的影像作為資料載體,我們提供選圖機制做為實作參考。實驗結果顯示所有數位半色調影像能夠維持良好的畫質,能夠成功地將機密半色調影像被嵌入與擷取,達到秘密通訊與資訊共享之目的。
摘要(英) This research presents a secret sharing scheme in halftone images. Some gray-level images of the same resolution are selected and transferred to halftone ones, which are responsible for carrying a secret halftone image. Given the pixels of secret image as the constraint, the host images are generated using Multi-scale Error Diffusion (MED). The original pixels of host images are examined and the modified MED ensures that the resulting pixels of the host images should satisfy the required conditions. After grouping all the processed halftone images, the secret image can be successfully revealed. The research objective is maintaining the quality of all the halftone images in this secret sharing scenario. Another proposed method is termed "mutual embedding," in which a halftone share can be decoded using all the other shares by modifying the initial setting in this secret sharing scheme. Besides, the approach of selecting host images is proposed so that suitable images can be chosen from an image database to ensure the quality of resulting halftone images. The experimental results and discussions demonstrate the interesting characteristics of the proposed scheme.
關鍵字(中) ★ 資訊共享
★ 資料隱藏
★ 數位半色調
★ 多層次誤差擴散
關鍵字(英) ★ Halftoning
★ Multi-Scale Error Diffusion
★ Information Hiding
★ Secret Sharing
論文目次 1 Introduction 1
1.1 Significance of the Research . . . . . . . . . . . . . . . . . 1
1.2 Contribution of Research . . . . . . . . . . . . . . . . . . . 4
1.3 The Organization of Thesis . . . . . . . . . . . . . . . . . 4
2 Preliminaries 6
2.1 Review of the MED Algorithm . . . . . . . . . . . . . . . 6
2.2 Review of the Related Work . . . . . . . . . . . . . . . . . 8
3 The Secret Sharing Scheme with MED 11
3.1 Initial Host Halftone Images . . . . . . . . . . . . . . . . . 12
3.2 ”Painting” on Dirty Papers . . . . . . . . . . . . . . . . . 13
3.3 Generating the Final Host Halftone Images . . . . . . . . . 16
3.4 Extracting the Secret Halftone Image . . . . . . . . . . . . 16
3.5 Mutual embedding of halftone images . . . . . . . . . . . . 17
3.6 The Image Quality Evaluation of Halftoning . . . . . . . . 18
3.7 The Method of Selecting Images . . . . . . . . . . . . . . . 18
3.7.1 Avoid the Image with Larger Dark Areas . . . . . . 18
3.7.2 Selecting the Images with Balanced Intensity . . . 20
4 Experimental Results 25
4.1 Test Conditions . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2 Different Numbers of Host Halftone Images . . . . . . . . 27
4.2.1 The Intuitive Method . . . . . . . . . . . . . . . . 27
4.2.2 The Influence from the Number of Host Images . . 27
4.3 The Appropriate Host Halftone Images . . . . . . . . . . . 34
4.4 Encrypting the Secret Halftone Image . . . . . . . . . . . 37
4.5 The Influence of Secret Image Generating Methods . . . . 38
4.6 Mutual Embedding . . . . . . . . . . . . . . . . . . . . . . 39
5 Conclusion and Future Work 41
Reference 42
參考文獻 [1] M. Naor and A. Shamir. Visual cryptography. In Advances in Cryptograhy:
EUROCRYPT, LNCS, volume 950, pages 1–12, 1995.
[2] R. Ulichney. Digital Halftoning. Cambridge, MA, USA: MIT Press,
1987.
[3] R. A. Ulichney. The void-and-cluster method for dither array generation.
In Proc. SPIE, Human Vis. Visual Process., Digit. Displays
IV, volume 1913, pages 332–343, Feb. 1993.
[4] D. E. Knuth. Digital halftones by dot diffusion. In ACM Trans.
Graph., volume 6, pages 245–273, Oct. 1987.
[5] C. N. Judice J. F. Jarvis and W. H. Ninke. A survey of techniques
for the display of continuous-tone pictures on bilevel displays. In
Comput. Graph. Image Process, volume 5, pages 13–40, 1976.
[6] Ioannis Katsavounidis and C.-C. Jay Kuo. A Multiscale Error Diffusion
Technique for Digital Halftoning. In IEEE Tronsmfiom on
Image Processing, volume 6, pages 483–490, 1997.
[7] M. Analoui and Bernice E. Rogowitz J. P. Allebach. Model based
halftoning using direct binary search. In Human Vision, Visual Processing,
and Digital Display III, volume 1666, pages 96–108, 1992.
[8] P. W. Wong. Adaptive error diffusion and its application in multiresolution
rendering. In IEEE Trans. Image Process., volume 5, pages
1184–1196, 1996.
[9] P. W. Wong. Multi-resolution binary image embedding. In Proc.
SPIE, volume 5020, pages 423–429, 2003.
[10] Y. H. Fung and Y. H. Chan. Embedding Halftones of Different Resolutions
in a Full-Scale Halftone. In IEEE Signal Process. Lett.,
volume 13, pages 153–156, Mar. 2006.
[11] J. M. Guo and J. J. Tsai. Data Hiding in Halftone Images Using
Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up
Table. In IEEE International Symposium on Circuits and Systems,
volume 1, pages 201–204, Aug. 2009.
[12] J. M. Guo and J. H. Huang. Data Hiding in Halftone Images with
Secret-Shared Dot Diffusion. In IEEE International Symposium on
Circuits and Systems, pages 1133–1136, 2010.
[13] G. R. Arce Z. Zhou and G. Di Crescenzo. Halftone visual cryptography.
In IEEE Trans. Image Process., volume 15, pages 2441–2453,
Aug. 2006.
[14] Z. Wang and G. R. Arce. Halftone visual cryptography by iterative
halftoning. In IEEE Int. Conf. Acoustics, Speech and Signal
Processing, pages 1822–1825, 2010.
[15] Vinay Rishiwal K. V. Arya and Arun Kumar Yadav. An Efficient
Halftone Visual Secret Sharing Scheme. In IEEE Industrial and Information
Systems, pages 1–5, 2014.
[16] AnujTiwari K. V. Arya and Lovelesh Saxena. A novel technique for
biometric based on user identification using watermarking and visual
cryptography. In proc. of International Conference on Computer
Apli-cation and Network Security, pages 283–287, 2011.
[17] Nitty Sarah Alex and L. Jani Anbarasi. Enhanced image secret sharing
via error diffusion in halftone visual cryptography. In IEEE Advanced
Computing and Communication Technologies, pages 393–397,
2011.
[18] Aman Kamboj and D.K.Gupta. An improved Halftone Visual Secret
Sharing Scheme for gray-level images based on error diffusion in
forward and backward direction. In IEEE Advanced Computing and
Communication Technologies, pages 125–130, 2015.
[19] J. M. Guo and Y. F. Liu. Joint compression/watermarking scheme
using majority-parity guidance and halftone-based block truncation
coding. In IEEE Trans. Image Process., volume 19, pages 2056–2069,
Aug. 2010.
指導教授 蘇柏齊(Po-Chyi Su) 審核日期 2015-8-24
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明