Dissertations / Theses on the topic 'MULTI SECRET SHARING SCHEME'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'MULTI SECRET SHARING SCHEME.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Miceli, Christopher. "One Time Password Scheme Via Secret Sharing Techniques." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1330.
Full textTurban, Tiina. "A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25874.
Full textFokin, Dennis. "A secure multi-party scheme with certificateless cryptography for secret key extraction." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231574.
Full textMånga system innehåller känslig data, exempelvis användaruppgifter som används för autentiseringsändamål. För stora system är en vanlig lösning att lagra data i en konfigurationsfil hos en betrodd tredje part. Det skulle emellertid innebära att den svagaste länken är om motståndare får tillgång till den betrodda parten. I teorin kan detta lösas genom att kryptera data men i praktiken flyttar det bara på problemet men löser det inte, eftersom någon typ av autentiseringsdata behövs för att dekryptera konfigurationsfilen. En mer flexibel lösning behövs som kräver mindre mänsklig interaktion samtidigt som det ger en högre grad av säkerhet. Denna avhandling föreslår ett komplett kryptografiskt system för att lösa detta problem i en typisk företagsmiljö med en ytterligare uppsättning implementationskrav genom att använda multipartsberäknande och Shamirs secret sharing protokoll. Dessutom kombinerar arbetet det nämnda systemet med ett certifikatfritt krypteringsbaserat protokoll kombinerat med multipartsberäkningar, eftersom certifikat oftast innebär en tidskrävande process. Systemet har utvärderats med avseende på säkerhet och effektivitet med slutsatsen att det ser lovande ut. När det gäller prestanda kommer huvuddelen av omkostnaden från den certifikatfria kryptografin, en begränsning för det specifika scenariot som kanske inte är närvarande i allmänhet. Arbetet ger också motiv för att vidareutveckla Java-bibliotek för kryptografi, speciellt för multipartsberäknande protokoll och certifikatlös kryptering.
Potay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.
Full textLai, Chun-Pong. "Several variants and generalizations of Shamir's secret sharing scheme /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20LAI.
Full textIncludes bibliographical references (leaves 55-58). Also available in electronic version. Access restricted to campus users.
Framner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Full textPRISMACLOUD
Kaskaloglu, Kerem. "Some Generalized Multipartite Access Structures." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611965/index.pdf.
Full textAl-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.
Full textPrakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.
Full textSmith, Guillaume. "Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets." Thesis, Toulouse, ISAE, 2014. http://www.theses.fr/2014ESAE0045/document.
Full textData from both individuals and companies is increasingly aggregated and analysed to provide new and improved services. There is a corresponding research effort to enable processing of such data in a secure and privacy preserving way, in line with the increasing public concerns and more stringent regulatory requirements for the protection of such data. Secure Multi-Party Computation (MPC) and secret sharing are mechanisms that can enable both secure distribution and computations on private data. In this thesis, we address the inefficiencies of these mechanisms by utilising results from a theoretically related rich area, erasure codes. We derive links between erasure codes and secret sharing, and use Maximum Distance Separable (MDS) codes as a basis to provide real-time applications relying on private user's data, revealing this data only to the selected group (which can be empty). The thesis has three contributions. A new class of erasure code called on-the-fly coding, have been introduced for their improvements in terms of recovery delay and achievable capacity. However little is known about the complexity of the systematic and non-systematic variants of this code, notably for live multicast transmission of multimedia content which is their ideal use case. The evaluation of both variants demonstrate that the systematic code outperforms the non-systematic one in regard to both the buffer sizes and the computation complexity. Then, we propose a new Layered secret sharing scheme and its application to Online Social Network (OSN). In current OSN, access to the user's profile information is managed by the service provider based on a limited set of rules. The proposed scheme enables automated profile sharing in OSN's groups with fine grained privacy control, via a multi-secret sharing scheme comprising of layered shares, without relying on a trusted third party. We evaluate the security of the scheme and the resulting profile's level of protection in an OSN scenario. Finally, after showing that erasure codes are efficient for real-time applications and that the security offered by secret sharing schemes can be applied to real-case applications, we derive the theoretical links between MDS codes and secret sharing to enable the implementation of efficient secret sharing scheme built from MDS codes. To illustrate this efficiency, we implement two of these schemes and evaluate their benefits in regard to computation and communication costs in an MPC application
Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Full textХіцко, Яна Володимирівна. "Математичне моделювання задач криптографії та обробки сигналів з використанням неканонічних гіперкомплексних числових систем." Thesis, НТУУ "КПІ", 2016. https://ela.kpi.ua/handle/123456789/15092.
Full textThe thesis is devoted to mathematical modeling of cryptography and signal problems using non-canonical hypercomplex numerical systems, which reduces the calculations amount during these models functioning and allows their optimization by individual characteristics. The modelling results of secret sharing scheme have shown that the use of non-canonical hypercomplex numerical systems starting from dimension 4 reduces the computation amount required in comparison with the use of canonical hypercomplex numerical systems. The methods for synthesis the noncanonical hypercomplex numerical system structures that satisfy the criteria for building a digital filter are developed. The digital filter is developed with the coefficients in noncanonical hypercomplex numerical systems and optimized by the parametric sensitivity.
Диссертация посвящена математическому моделированию задач криптографии и обработки сигналов с использованием неканонических гиперкомплексных числовых систем (ГЧС). Разработаны методы и способы представления и обработки данных в неканонических ГЧС, применение которых упрощает вид математических моделей, уменьшает количество вычислений при их функционировании и позволяет производить их оптимизацию по отдельным признакам. Анализ результатов работ последнего десятилетия по применению гиперкомплексных числовых систем в решении задач криптографии и обработки сигналов показал следущее: 1) применение канонических ГЧС к задаче разделения секрета повышает криптографическую стойкость, но вместе с тем увеличивает количество операций, требуемых для реализации такой задачи. Применение неканонических ГЧС дает возможность минимизировать количество вычислений за счет меньшей размерности системы; 2) синтез цифрового фильтра с использованием канонических ГЧС дает результаты по оптимизации его параметрической чувствительности, но поскольку выбор таких систем ограничен, неканонические ГЧС дают большие возможности по оптимизации чувствительности. В работе совершенствуются методы построения структур ГЧС заданной размерности, в том числе получения множества структур неканонических ГЧС, заданных в общем виде и неканонических гиперкомплексных числовых систем, изоморфных диагональной системе. Эти методы учитывают заданные ограничения представления данных в неканонических ГЧС для моделирования практических задач. Предлагается метод построения некоторых классов изоморфизма для неканонических ГЧС размерности 2. Изоморфные системы используются для минимизации вычислений при таком представления данных. В работе совершенствуются методы определения единичного элемента, нормы, сопряжения и делителей нуля для неканонических гиперкомплексных числовых систем; методы выполнения операций в таких системах. Впервые предлагается метод вычисления вычетов в неканонических ГЧС, который применяется в моделировании задачи разделения секрета и учитывает структурные особенности неканонических гиперкомплексных числовых систем. Предлагается модификация модулярной схемы разделения секрета, которая отличается от существующей представлением информации остатками в неканонических ГЧС по совокупности неканонических гиперкомплексных модулей. Реализована компьютерная модель задачи разделения секрета для неканонических ГЧС третьей и четвертой размерности в системе символьных вычислений MAPLE. Приведены результаты работы такой модели и сравнительные характеристики количества операций в части преобразования данных, непосредственно разделения секрета и восстановления данных. Анализ полученных результатов показал, что в целом, применение неканонических ГЧС к данной модели позволяет использовать меньшую размерность в зависимости от выбора констант при структурных единицах в таблице умножения системы, для обеспечения такой же криптостойкости, как и с использованием канонических ГЧС. Использование неканонической ГЧС размерности 3 для обеспечения такой же криптостойкости, как и при использовании канонической ГЧС размерности 4, не дает нужного эффекта для уменьшения количества вычислений, так как среднее количество операций увеличивается на 92%. Но уже при использовании неканонической ГЧС размерности 4 с 9-ю составными ячейками в таблице умножения с целыми коэффициентами из диапазона {-4,4}, для обеспечения такой же криптостойкости, как и при использовании канонической ГЧС размерности 6, количество требуемых вычислений уменьшается в среднем на 44%. Для успешного восстановления секрета, необходимо использовать числовые системы без делителей нуля и обладающих свойством мультипликативности нормы. В диссертационной работе впервые предлагается метод синтеза неканонических ГЧС, которые могут быть использованы при построении цифрового фильтра. Создана математическая модель рекурсивного цифрового фильтра с гиперкомплексными коэффициентами в полученных неканонических ГЧС третьей размерности. Впервые предлагается метод оптимизации суммарной параметрической чувствительности фильтра, построенного с использованием неканонических ГЧС который позволяет существенно уменьшить параметрическую чувствительность эквивалентного фильтра с вещественными коэффициентами (до ~50%) и существующих фильтров с гиперкомплексными коэффициентами (до ~40%). В работе описано расширение аналитически-программного инструментария в системе символьных вычислений MAPLE, который реализует предложенные модели и методы с учетом структурных особенностей неканонических ГЧС, а именно: определение основных свойств и выполнение операций над неканоническими гиперкомплексными числами; выполнение модулярных операций над неканоническими гиперкомплексными числами; построение структур неканонических ГЧС согласно заданным критериям, в том числе, критерию построения цифрового фильтра; реализация модели задачи разделения секрета в неканонических ГЧС и метода оптимизации параметрической чувствительности цифрового фильтра. Листинги кода приведены в приложениях.
WU, TSUNG-LIN, and 吳宗霖. "TWO NEW VISUAL CRYPTOGRAPHY SCHEMES:VISUAL MULTI-SECRETS SHARING SCHEME AND COLORED VISUAL SECRET SHARING SCHEME." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/46053020417663992896.
Full text國立東華大學
資訊工程學系
89
In the thesis, we present two new cryptography schemes, one is visual multi-secrets sharing scheme, and the other is colored visual secret sharing scheme. Conventional secret sharing schemes need knowledge of cryptography and cryptographic computations. In 1994, Shamir and Naor proposed a new technology, called as visual secret sharing scheme (or called visual cryptography). This scheme uses human visual system as its decoder, and does not need complex calculations. However, Shamir and Naor’s scheme shared only one secret when stacking transparencies. Here, we proposed visual secret sharing scheme with multiple shared secrets. For example, for a (2, 2) scheme with “x” shared secrets, we can stack these two transparencies at the different positions, and then “x” secrets appear. In [7], a visual multi-secret sharing scheme could share two secrets from two transparencies, but the security of this method is not perfect. Our method is easy and perfect security. Moreover, we can share x secrets more than two secrets. A colored Visual Secret Sharing (VSS) scheme is first introduced by Verheul and Van Tilborg [22]. However, the important disadvantage of this scheme is the reduction in resolution. Rijmen and Preneel [19] had improved the resolution of reduction. For a 2-out-of-2 colored VSS scheme with m! colors, it only needed m sub pixels. In this thesis, we show the mistake of Rijmen-Preneel scheme that it only produces about m!/2 colors for large m. Here, we also present a new construction of the colored VSS scheme, using the additive mixing of three primary colors light sources is proposed to correct the mistake. Moreover, The proposed scheme can enhance the level of color up to (m!)2 colors with a enhanced color mask, and finally we can recover a colored shared image with high quality.
Fu, Wen-Yin, and 傅文殷. "Multi-dimensional Space Based Secret Image Sharing Scheme." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88949325842933094380.
Full text玄奘大學
資訊管理學系碩士班
93
This thesis solves the visual cryptography problem by the Blakley strategy that is a geometry-based secret sharing strategy. We first partition the secret image into sets of t pixels. Every t pixels form a point under a t-dimensional space and we generate n affine hyperplanes intersecting in this point, where the set solution of each affine hyperplane is stored as shared image. The size of each shared image can be adjusted by the bits that each hyperplane parameter used. When reconstructing the original image, we only need to gather t shared images and calculate every t pixels from these shared images. The experimental results show that the proposed image sharing strategy is an efficient approach to generate shared images than previous works.
DALAL, SUNEEL. "DYNAMIC MULTI-SECRET SHARING SCHEME WITH CHEATER DETECTION." Thesis, 2017. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15988.
Full textChen, Cheng-Hua, and 陳政樺. "Enhancing Security of Boolean-Based Multi-Secret Imgae Sharing Scheme." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/xr84br.
Full text國立東華大學
資訊工程學系
102
In 1979, Shamir published a landmark paper about secret sharing. Afterwards, many researches extend secret sharing to secret image sharing (SIS) scheme. SIS scheme is usually referred to be a threshold (k, n)-SIS scheme, where k n, that divides a secret image into n shared images. We can reconstruct the secret image from any k shared images; but (k1) or fewer shared images cannot recover the secret image. There are two major types of SIS scheme: one is the polynomial-based SIS (PSIS) scheme, and the other is the visual cryptography scheme (VCS). VCS has a novel stacking-to-see property. Contrarily, the reconstructed image of PSIS scheme can obtain the distortion-less secret image but it needs the more complex computation. Therefore, some Boolean-based SIS schemes were proposed to recover the original image, and meantime only need simple Boolean operations. Recently, Chen and Wu propose a (n, n) multi SIS (MSIS) scheme sharing n secret images into n shared images based on Boolean operations. These n shared images can be used for reconstructing n secret images. However, in Chen and Wu’s (n, n)-MSIS scheme, we can recover some secret images (partial secret information) from (n1) or fewer shared images, and this compromises the threshold security. In this thesis, we propose a strong threshold (n, n)-MSIS scheme that do not leak partial secret information from (n1) or fewer shared images. Moreover, by using an inherent property of digital image, we propose a modified (n, n)-MSIS scheme to solve the problem of remanent images and enhance the randomness of shared images. Also, we theoretically that our (n, n)-MSIS scheme satisfies the strong threshold property.
Fang, Li-Chin, and 方儷瑾. "A Hierarchical Visual Multi-Secret Sharing Scheme without Pixel Expansion." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/07232603250679221563.
Full text中興大學
資訊科學系所
95
Traditional visual secret sharing scheme has provided sufficient security for a secret image by breaking it into share images (called shares). In current technology, multiple secret images can be hidden in the same set of shares after one of the shares is rotated at different degrees. However, these schemes are limited to (2, 2) or (3, 3)-visual secret sharing. Furthermore, the sizes of the shares will be expanded. In this thesis, we propose an improved visual multi-secret sharing scheme that adopts a hierarchical concept to manage the shares. The first secret can be obtained by stacking some subset of shares, and the second fragmented secret can be obtained by shifting some shares in the same set and stacking them together. Then, we merge all the fragmented secrets to obtain the whole information about the second secret. Our scheme can be generalized to (k, k)-visual secret sharing, and the sizes of shares remain the same as the secret image.
Tsai, Hui-Chan. "Problems of Perfect Multi-Secret Sharing Schemes." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0020-2208200814583200.
Full textTsai, Hui-Chan, and 蔡惠嬋. "Problems of Perfect Multi-Secret Sharing Schemes." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/25774184520088973044.
Full textTsai, Tzung-Fu, and 蔡宗甫. "A Secret Sharing Scheme in Halftone Images Based on Multi-Scale Error Diffusion." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/87095336600713459895.
Full text國立中央大學
資訊工程學系
103
This research presents a secret sharing scheme in halftone images. Some gray-level images of the same resolution are selected and transferred to halftone ones, which are responsible for carrying a secret halftone image. Given the pixels of secret image as the constraint, the host images are generated using Multi-scale Error Diffusion (MED). The original pixels of host images are examined and the modified MED ensures that the resulting pixels of the host images should satisfy the required conditions. After grouping all the processed halftone images, the secret image can be successfully revealed. The research objective is maintaining the quality of all the halftone images in this secret sharing scenario. Another proposed method is termed "mutual embedding," in which a halftone share can be decoded using all the other shares by modifying the initial setting in this secret sharing scheme. Besides, the approach of selecting host images is proposed so that suitable images can be chosen from an image database to ensure the quality of resulting halftone images. The experimental results and discussions demonstrate the interesting characteristics of the proposed scheme.
HUYNH, NGOC TU, and 黃玉秀. "Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/22101770541745703948.
Full text逢甲大學
資訊工程學系
103
Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a secret key, secret sharing takes an approach to ensure well protection of transmitted information by allowing a secret message M to be divided into n pieces. Secret message M can be held by n participants to avoid the secret from incidentally or intentionally being lost. In a secret sharing scheme, leaking secret information from shadows, attacking on shadow image, enlarging shadow size, and the limitation of the number of secret image are existing issues which have arisen when developing an algorithm. Although existing algorithms provide remedies for such problems, the computational complexity of existing algorithms is still questionable. In this study, we propose five schemes to solve above-mentioned issues. These schemes first satisfy four general criteria of a secret image sharing algorithm: security, accuracy, computational complexity and shadow size. Moreover, each scheme has its specific features to tackle some existing problems. The first scheme aims to share and construct unlimited number of images. In addition, since the scheme is able to retrieve any secret image without revealing all other images, it can save execution time and computational cost. The second scheme generates very high quality of shadows to avoid suspicion of attackers on shadows. While the third scheme is capable of detecting and localizing tamper on shadow images, the fourth scheme is able to recover the secret even when attacks occurred. The final scheme solves the problem of cheating on given shadows. Furthermore, another major objective of this study is the visual secret sharing schemes which are suitable for real-time applications.
Chang, Jo-Yi, and 張若怡. "Visual Multi-Secret Image Sharing Schemes by Shifting Random Grids." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/75550143120453852311.
Full text國立暨南國際大學
資訊工程學系
100
Visual cryptography (VC), also called visual secret sharing (VSS), which is different from traditional cryptography. Visual Cryptography was proposed by Naor and Shamir in 1994, which combines traditional cryptography with conception of information sharing, encoding a secret image into n pieces of share images. We give the share images to participants who will obtain noise-like, unidentified images which cannot be restored to original secret image when participants only have one share image. The main concept of visual secret sharing is that any complicated mathematical measurement is needless when the sharing scheme decodes the secret images, nor a large amount of computer operation and knowledge of cryptography. The only thing we need to do is collecting k shared images and superimposing them, and then the original secret image can be distinguished, decoded, and reconstructed by human visual system. The proposed visual secret sharing schemes were designed by using the random grid (RG). Recently, it has drawn more and more attention to encode more than one secret image into two shares by RG-based VSS techniques. However, previous techniques can only encrypt at most four secret images at one time, and the distortion of the reconstructed secret images is obvious when the number of the secret images increases up to now. In this thesis, we propose a RG-based scheme which is able to encrypt multi-secret images into two shares by shifting random grids. As compared with the traditional VC-based VSS, RG-based VSS need not to design the codebook of conventional VC, and the size of share images will not be expanded. Also, users can adjust the distortion in our schemes. Our schemes calculate almost each pixel of the secret images by shifting random grids. These schemes achieve the best utilization of all of the pixels on secret images, and reduce the quantity of distortion when decrypting the secret images. Therefore, users can get more information by using our shifting random grids techniques.
Chen, Lu-Chung, and 陳律仲. "A Study on Quality-Enhanced Visual Multi-Secret Images Sharing Schemes." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/66388519971612910850.
Full text國立暨南國際大學
資訊工程學系
103
Visual secret sharing (VSS) is a technique of image encryption, and we decrypt secret images by human visual system without any computations. Furthermore, we can assume visual secret sharing as visual version of secret sharing, so visual secret sharing inherits all advantages of secret sharing. The concept of VSS is encrypting a secret image into two meaningless shares. We can only decrypt the secret image by stacking these shares together. Random grid is an approach to implement visual secret sharing. In recent years, many research for encrypting many secret images into two shares are proposed. The topic of these research is multiple secret-images sharing. This thesis proposes three quality-enhanced schemes basing on shifting random grids. In theory, we can encrypt unlimited number of secret images by using the AOSRG scheme which be held by Chang in 2012. However, the distortion of AOSRG scheme is large when the number of secret images 6. Because of this reason, the number of secret image to be encrypted is restricted. In this thesis, we propose three improved schemes. Two of those are adding the number of pixels on shares to decrease the distortion, and the other is evenly distributing black pixels on shares to increase the image quality. The image quality of those schemes are better than AOSRG scheme. Therefore, we can encrypt more secret images by using the proposed schemes.
Liu, Ji-Cheng, and 呂俊成. "The Study of Multi-Document Signcryption Based on Threshold Secret Sharing Schemes." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/75124383088983663394.
Full text國防大學管理學院
資訊管理學系
100
Without an encryption, the secret message cannot be reliably or safely transmitted through the Internet, and this may cause great damage. When sending a lot of messages to somebody at a time, it can be quite a chore, requiring a great deal of valuable time to encrypt each message sent. However, this problem can be resolved by introducing a signcryption scheme in the communication architecture. We propose a multi-document signcryption scheme that is based on Elliptic Curve Cryptosystem (ECC) and threshold scheme. Our research results have been presented in various contributions as follows. (1)We use ECC to encrypt messages and make sure that ciphertexts are really secure. (2)We implement the ECC’s point addition on the ciphertext to exhibit a substantial avalanche effect. (3)Based on Elliptic Curve Discrete Logarithm Problem (ECDLP) and Random Knapsacks Problem (RKP) at the same time, our system has dual complications to the process residing in the underlying methods as the strength of encryption/decryption increases. (4)Relying on the threshold secret sharing scheme, the confidentiality of ciphertexts is maintained. (5)The proposed scheme operates on self-certified characteristic to construct efficient certified decision procedure, and achieves a signcryption with small computational cost for multi- document encryption.
Tzuoh-Yi, Lin, and 林祚儀. "Verifiable Multi-Secrets Sharing Schemes." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/18142635476797500263.
Full text國立臺灣科技大學
管理技術研究所
86
Shamir''s and Blakley''s (t, n) threshold secret sharing schemes and Ito et al.''s generalized access structure secret sharing scheme have the following drawbacks in practical applications: (1) Once the secret has been recovered, the remaining unreleased shadows are useless. That is, the shadows are used only once for sharing one single secret. If some new secret is to be shared by the same participants, it requires additional interactions for distributing new shadows to them. (2) It cannot withstand the cheating by participant. A malicious participant may succeed a cheating trick by presenting a fake shadow to the other cooperators during secret reconstruction, so that only he/she can recover the true secret alone without being detected. (3) It cannot withstand the cheating by the dealer. If the dealer initially distributes a fake shadow to a certain participant,then that participant would never obtain the true secret later on. In this paper, we propose a (t, n)-threshold verifiable multi-secrets sharing scheme and a generalized verifiable multi-secret sharing scheme for overcoming the disadvantages inherent in Shamir''s and Ito et al.''s scheme, respectively. Both schemes provide that (1) Each participant holds only one single shadow for sharing multiple secrets. (2) Each participant can efficient verify the own shadow initially distributed by the dealer. (3) Any participant can identify any cheating cooperators during secret reconstruction. (4) The dealer can freely give any set of secrets in advance for sharing.
Su, Yu-An, and 蘇俞安. "A hierarchical secret sharing scheme." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/29635387611639142580.
Full textYeh, Pei-Shan, and 葉培珊. "Progressive Visual Secret Sharing Scheme." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/35393473175408699251.
Full text銘傳大學
資訊工程學系碩士班
99
Visual cryptography uses traditional cryptography for sharing visual secrets. The main principle is to use cryptography encryption, and then the secret can be encrypted into more than one meaningless noise-like share, so the secret can be safely shared. In the decryption phase, participants stack shares, then the secret images can be revealed and be decoded by human’s eyes system. The progressive visual cryptography can stack few shares to show secret images with multi-level quality. Participants only need to stack more than two shares,then they can use progressive characteristic to reveal secret. Hence, some shares don’t arrive at the receiver during transmission process, or even one part of shares are lost, the receiver still can be decoded it properly. In this paper we propose two progressive visual secret sharing schemes. We first propose an extended progressive visual secret sharing scheme for binary secret images. The method is dedicated to getting high contrast and great linearly progressive effect. Additionally, it can let user to regulate stego’s density arbitrarily. Stego’s density enables to control image quality. Then, we propose an extended progressive visual secret sharing scheme for color secret images, which makes our research more applied. The experimental results show that our methods not only doesn’t introduce pixel expansion but also improve recovered image’s progressive effect and quality.
TSAI, YING-ZHEN, and 蔡穎榛. "Secret Sharing Scheme in Parallel." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/d97c4p.
Full text銘傳大學
資訊工程學系碩士班
106
The aim of a (k, n) threshold secret sharing scheme is to encrypt a secret s into n parts (called shares) such that any k participants can recover s using their shares, while any group of less than k ones cannot. In [1], when the size of s grows large (e.g. multimedia data), the efficiency of sharing/decoding s becomes a major problem. Kurihara et al. proposed a fast (k, n)-threshold scheme [4]. This scheme enables fast computation to make shares and recover the secret from two or more shares by using just EXCLUSIVE-OR(XOR) operations. We designed efficient and parallel implementations on Shamir’s threshold secret sharing scheme and Kurihara et al.’s fast (k ,n)-threshold scheme using sequential CPU and parallel GPU platforms, respectively, in a personal computer. Experimental results show that GPU could achieve an appealing speedup over CPU when dealing with the sharing of multimedia data.
Chen, Kun, and 陳琨. "Visual Multi-Secrets Sharing Schemes Based Upon Rotating." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/y6ht75.
Full text銘傳大學
資訊工程學系碩士班
95
Visual cryptographic schemes are able to encrypt a secret image into several transparencies (called shares) such that only when transparencies are superimposed can the secret image be revealed. The study of visual cryptography is different from that of traditional cryptography due to the fact that their decryption processes are different, that is, the former is by human visual system while the latter is by computing devices. A new trend in visual cryptography is growing that aims at secretly sharing multiple secret images in several shares. In this paper, we propose a novel visual multiple secret sharing scheme in which multiple secret images can be shared in two circle shares. Based upon the rotation operation, the secret images can be obtained when the two shares are superimposed with pre-determined rotation angles.
Chuang, Yu-Lin, and 莊玉麟. "A Study on Secret Sharing Scheme." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/02647884612700699150.
Full text國立暨南國際大學
資訊工程學系
93
Secret sharing schemes are methods for distributing a secret among n participants in such a way that any qualified subsets of participants can recover the secret, and unqualified participants can not. Secret sharing scheme is very useful in the applications of our life. Up to now, the related papers are still published frequently. In 1987, Feldman proposed a verifiable secret sharing scheme, that every participant can verify their share is true or not. Wu and He proposed a geometric approach for sharing secrets by using a hyperspherical polynomial in 1995. The secret can hide in any one of the coefficients of the polynomial. In 2004, Yang, Chang and Hwang proposed a (t, n) multi-secret sharing scheme based on Shamir’s secret sharing scheme. The dealer need not redistribute new shares to every participant for next new secret that need to be shared. We propose a new geometric approach for sharing secrets based on a hyperelliptic function in this thesis. Moreover, we modify it to be : 1. it can verify the shares and detect the cheater, 2. it can be used online, and 3. to be a online secret sharing scheme with verification and detection. Next, we proposed a verifiable and detectable secret sharing scheme, an online secret sharing scheme, and an online verifiable and detectable (t, n) multi-secret sharing scheme based on the secret sharing scheme that proposed by Wu and He. Last, we also proposed an online verifiable and detectable (t, n) multi-secret sharing scheme based on Shamir’s scheme.
Kuo-Feng, Hwang. "A Study on Multiple Secret Sharing Scheme." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0005-2408200601100300.
Full textHe, Wei Hua, and 何煒華. "Secret sharing scheme based on algebraic geometry." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/03716096161362503651.
Full textChou, Chih-Wei, and 周志維. "Secret Image Sharing Based on Blakley’s Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/48961850366412302745.
Full text國立東華大學
資訊工程學系
101
In 1979, Shamir and Blakley independently proposed (k, n) secret sharing (SS), respectively. In a (k, n)-SS, where k n, a secret data is shared into n shares. In such a way, any k shares can be used to reconstruct the secret, but use of any number of shares less than k will not provide any information about the secret. For Shamir’s (k, n)-SS, the secret data is embedded into the constant term of a (k1)-degree polynomials. On the other hand, Blakely’s (k, n)-SS divides secret data into n hyperplanes. The secret can be recovered from the intersection of these hyperplanes. Security and protection of digital image are important research issues for the digital image processing and cryptography. Therefore, secret image sharing scheme (SISS) based on SS are accordingly proposed. For example, by using Shamir’s (k, n)-SS, Thien and Lin embedded all secret pixels into all k coefficients in polynomial to construct the (k, n)-SISS. Recently, Tso proposed an efficient (k, n)-SISS based on Blakley’s (k, n)-SS, to share a secret image into n shadow images (referred to as shadows). One can decode a secret image with any k or more than k shadows, but one cannot obtain any information about the secret from fewer than k shadows. With the help of quantization, Tso’s (k, n)-SISS can reduce the storage space. However, Tso’s scheme cannot correctly decode the secret image for some cases. In this thesis, we correct this error and propose a modified (k, n)-SISS to correctly decode the secret image,. Meantime, our scheme has the better visual quality of the decoded image when compared with Tso’s scheme.
Hwang, Kuo-Feng, and 黃國峰. "A Study on Multiple Secret Sharing Scheme." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/63249824438005695296.
Full text國立中興大學
應用數學系所
94
Authenticated key distribution is one of the most important mechanisms for providing secure services in networking environments. When a group of people share a common key in a distributed system, it is highly desirable to have robust key management such that a maximum level of secrecy (privacy) can be achieved while allowing some faults (resiliency) to be tolerated. Secret sharing schemes help users to share a secret in a group. A secret sharing scheme is a method that allows a secret to be shared among a finite set of participants in such a way that only qualified subsets of participants can recover it. In this dissertation, the proposed scheme permits each participant to share secrets with other participants by holding only his secret key and dynamically change the access structure on-line for distributed systems. Only the qualified subset of participants can obtain the shared secret in a distributed system. Each participant is allowed to check whether another participant has provided the true information in the recovery phase or not. We propose a new solution based on systematic block codes that can dynamically change the access structure with m shared secrets. We designed a systematic block code generator matrix G(2m+1, m+1) that can be pre-computed and implemented on VLSI chips. The security of our scheme is the same as that of the RSA cryptosystem and Shamir’s (t, n) threshold scheme. Our scheme has the advantages of easy generator matrix construction, smaller communication overhead and nondisclosure of user secrets after multiple secret reconstruction phases. We improve the process efficiency and security for multiple secret sharing in distributed systems.
Tien, Chi-Hung, and 田啟宏. "An ID-Based Dynamic Secret Sharing Scheme." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/52359206116869208670.
Full text逢甲大學
資訊工程學系
89
In this thesis, we will introduce the ID-based cryptosystem into the (t, n) threshold secret sharing scheme, we proposed a new ID-based dynamic secret sharing scheme. In our scheme, each shadowholders needs to manage only one secret key, and uses their own identity as public key. The proposed scheme hence reduces the key storage space, and the problems of identification and key management. More to the point, our scheme can also be extended to the generalized secret sharing scheme easily so as to provide various applications.
Huang, Tzu-Chen, and 黃資真. "Visual Secret Sharing Scheme with Perfect Contrast." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/21465296681020364550.
Full text南台科技大學
資訊管理系
97
Traditional cryptography usually needs complex operations on data protection in order to prevent the leakage of confidential information. Naor and Shamir first proposed visual secret sharing scheme in 1995. The main characteristic on visual secret sharing scheme is to decode confidential information by human’s visual system. So, it does not need any computation. VSS often uses half toning technology to deal with gray images or color images, but it cannot provide perfect contrast. The paper proposes visual secret sharing scheme with perfect contrast, which provides perfect contrast to enhance the result of distinguishability. The thesis proposes a (2,n) visual secret sharing scheme and a (k,n) visual secret sharing scheme. The (2,n) visual secret sharing scheme uses bit-level decomposition, random numbers and Boolean operations to share secret images. The (k,n) visual secret sharing scheme uses bit-level decomposition and perfect black visual cryptography to share secret images.
Lin, Tzong Horng, and 林宗宏. "A Secure Group-Oriented Secret Sharing Scheme." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/48664961404996730326.
Full text國立中正大學
資訊工程研究所
81
In the past, secret information transmission and cryptoanalysis were only concerned with person to person communication. Recently , the network systems have become more and more popular, and various kinds of information security have become very important topics. It is also well-known that groups such as schools, governments, private enterprises, and organizations are very important in the real world. Fast and secure information transmission is now also an important objective for each group. In this thesis a new generalized cryptosystem for Group-Oriented Cryptography (GOC) is proposed. In this scheme, the system only needs to store a set of the users'' secret keys, where each user can select his own secret key freely. The scheme allows the sender to group receivers into access instances, and then disjunctively combine these access instances into an access structure. A secret can only be decoded by utilizing all the secret keys owned by the users of any access instance. An important contribution of our scheme is that when two companies want to transmit messages to each other, the sender does not need to know the structure of the company which will receive the messages.
Lin, Jen-Yu, and 林仁昱. "A Study on the Fault-Tolerant Visual Multi-Secrets Sharing Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/fcrxvx.
Full text國立暨南國際大學
資訊工程學系
105
V isual cryptography is to encrypt a secret image into two meaningless random images, called shares, such that it can be decrypted by stacking these two shares without any calculations. Random grid is a simple and low-cost method, the characteristic is that it does not need any code book. The size of each share will be the same size as the secret image. In practice, there would be problems in alignment when staking these two shares by hand. Besides, share more secret images in the same time will enhance the functionality of the scheme. Therefore, this thesis propose a new visual secret sharing scheme which encrypt multi-secret images into two shares in the same time, and it is not necessary to align the shares precisely from image encryption without pixel expansion. Both theoretical analysis and simulation results demonstrate the effectiveness and practicality of the proposed scheme.
Huang, Ching-Chun, and 黃竫淳. "A Visual Secret Sharing Scheme without Pixel Expansion." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/37283035561843875606.
Full text國立中興大學
資訊科學研究所
92
Visual secret sharing (VSS) scheme is a cryptography technique, which protects the secret information by dividing the image into several share images. Since VSS scheme uses only the human vision system for decryption, advanced cryptographic knowledge and complex computation are not needed. Although the secret information will never be revealed from a single share image for the traditional VSS scheme, the image size of the share is substantially expanded that each pixel is mapped into a block consisting of several sub-pixels. This scheme greatly deteriorates bandwidth limitation on the network and exhausts memory space on the storage system. In addition, the degraded image quality caused by reduced contrast is normally observed in the reconstructed secret image. In this thesis, we propose a novel VSS scheme with non-expandable image size by mapping a block in a secret image into its corresponding blocks with the same size in the share images. The result shows that the image quality has been improved by applying multi-level rather than two-level scheme for classifying the blocks based on the number of black points. Future works will be concentrated on developing a scheme for hiding shares in meaningful images rather than the images composed of random dots to prevent hackers’ attention. Finding new schemes for improving the image quality for the reconstructed secret image is also a challenging topic in the near future.
Lu, Dong-Yi, and 呂東宜. "On the study of Proactive Secret Sharing Scheme." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/72022043583164531935.
Full textZabłocki, Aleksander. "On some generalizations of Shamir’s secret sharing scheme." Doctoral thesis, 2015. https://depotuw.ceon.pl/handle/item/2069.
Full textSchematem Lai-Dinga współdzielenia sekretu (oznaczenie: Sigma^{LD}_q(c, i)) dla parametrów c = (c_0, ..., c_{k-1}), i, q nazywamy modyfikację k-progowego schematu Shamira, w której udziałem uczestnika x w F_q jest wartość wielomianu P(x) = \sum_{j = 0}^{k-1} a_j x^{c_j}, przy czym współczynniki a_j są tajne, zaś wykładniki c_j jawne, zaś wartością sekretu jest współczynnik a_i. Kontynuując wcześniejsze badania Spieża, Urbanowicza i in., badamy struktury dostępu realizowane przez takie schematy, a także zachowanie tzw. zbiorów progowych, gdzie zbiór uczestników nazywamy progowym, jeśli schemat po obcięciu do niego staje się k-progowy.Jednym z naszych ważniejszych celów jest podanie asymptotycznych oszacowań liczby zbiorów progowych (bądź nie-progowych) o danej wielkości n w schemacie Lai-Dinga Sigma^{LD}_q(\mathbf{c}, i), przy czym w oszacowaniach tych rolę zmiennej pełni q, zaś c, i, n są parametrami (mogącymi wpływać na stałe w notacji asymptotycznej). Uogólniając wcześniejsze wyniki dla c = (0, 1, ..., k-1, wykazujemy w ogólności, że liczba zbiorów progowych wynosi Theta(q^n). Odnośnie zbiorów nie-progowych, wykazujemy, że dla ustalonych c oraz i liczba takich zbiorów o wielkości k - 1 może wynosić 0 dla wszystkich q, Theta(q^{k-2}) dla wszystkich q, lub w sposób okresowy przełączać się pomiędzy tymi dwoma wzorcami. Ponadto dla wielu przypadków podajemy rozsądne z obliczeniowego punktu widzenia ograniczenia dolne na q (a także na charakterystykę ciała F_q), powyżej których takie zbiory muszą istnieć. Ma to miejsce w szczególności gdy ciąg c jest arytmetyczny, lub gdy w ciągu \hat{c}_i (powstającym z c przez usunięcie c_i) każde dwa kolejne przyrosty są względnie pierwsze.W ramach powyższego rozumowania (na potrzeby wykorzystywanego w nim twierdzenia Weila) badamy absolutną nierozkładalność klasycznych wielomianów Schura nad ciałami skończonymi. Wykorzystując rozumowania Mongego i Rajana i przenosząc (częściowo) metody Rajana z C nad ciała skończone, otrzymujemy nowy wynik dotyczący nierozkładalności dużej klasy wielomianów Schura. Co więcej, wykorzystując inną, nową metodę, opartą na wielościanach Newtona, uogólniamy powyższe kryterium nierozkładalności na szeroką klasę zaburzeń wielomianów Schura.W ostatnim rozdziale pracy gromadzimy kilka spostrzeżeń dotyczących struktur dostępu w schematach Lai-Dinga. Najpierw wykazujemy, że są one niemal równie ogólne jak w schematach Brickella, choć nasza konstrukcja odpowiedniego schematu Lai-Dinga ma znaczny stopień złożoności. Następnie analizujemy przypadki, gdy ciąg c lub \hat{c}_i jest arytmetyczny. O ile pierwszy z nich zasadniczo sprowadza się do schematów typu Shamira, o tyle w drugim można znaleźć nowe przykłady struktur dostępowych, w tym niektóre struktury grafowe; podajemy charakteryzację grafów uzyskiwalnych w powyższy sposób.
Huang, Jian-Ying, and 黃建螢. "Android System Development on Secret Audio Sharing Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/98008317608328267553.
Full text淡江大學
資訊工程學系資訊網路與通訊碩士班
101
This study presents an (s, t, n) progressive method for sharing an audio. In an (s, t, n) progressive audio sharing scheme, n shared audios are generated from the secret audio, gathering s shared audios acquires coarse resolution of secret audio, and using t shared audios can reconstruct the original secret audio losslessly. The Chinese Remainder Theorem is adopted in the proposed scheme to share coefficients acquired from 1-D integer wavelet transform with different thresholds. First, the maximum wavelet level number needed in 1-D integer wavelet transform is determined from thresholds s and t. Then, the proposed scheme applies the secret audio to 1-D integer wavelet transform for acquiring coefficients under different levels. At last, all wavelet coefficients are partitioned to (t-s+1) groups and share each group with different thresholds under inverse wavelet transform. Experimental results demonstrate that the proposed scheme can share secret audios efficiently and progressively.
Tang, Cheng-Kai, and 湯鎮愷. "Design of a Secret Image Protection Scheme with Steganography and Secret Sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/84254747024551445582.
Full text中國文化大學
資訊管理研究所
96
This paper proposed a digital image protection scheme with steganography and se-cret sharing. The secret image is split into multi-shares, where each share is embedded into the frequency domain of a meaningful gray-level image. Unlike other studies, we do not need to design different encryption rules for different kinds of secret images. Since each share of the secret image is embedded into the frequency domain of a cover image, human eyes are difficult for receiving the secret from the stego-image. Besides, any single stego-image can not leak out information of the secret. Therefore, our scheme can satisfy the requirements of security and imperceptibility.
Liu, Yu-Chen, and 劉昱辰. "Android System Development on Progressive Secret Image Sharing Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13829734937488762374.
Full text淡江大學
資訊工程學系碩士班
101
This study presents an (s, t, n) progressive method for sharing a secret image. In which n shared images are generated from the secret image, collecting s shared images acquires coarse resolution of secret image, and collecting t or more shared images losslessly recovers the secret image. The proposed method employs the Chinese Remainder Theorem to share subimages acquired from integer wavelet transform with different thresholds for satisfying the progressive property. First, the proposed scheme applies the secret image to integer wavelet subimages. The maximum subimage number needed in wavelet transform is obtained from threshold s and t. Then, all subimages are partitioned to (t-s+1) groups and share each group with different thresholds to reconstruct the secret image progressively. Experimental results demonstrate that the proposed scheme based on Chinese Remainder Theorem preserves efficiency and progressive properties.
Sun, Rui-Hong, and 孫瑞鴻. "Graphic Password Authentication Scheme based on Visual Secret Sharing." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/95530133041603597388.
Full text國立雲林科技大學
資訊工程系
102
The dissertation proposes a remote authentication scheme that can recognize the login user being a human not a computer program. Our scheme improves the drawback of CAPTCHA which generates an image containing digits or characters, and then the login user knows the content as he sees the image. However, it is easy to know the content via eavesdropping on image transmission. To overcome the problem, we combine the visual secret sharing technology with the CAPTCHA method to generate two shared images from the original image to keep the content from being leaked. To provide the mutual authentication between the server and the login user, a shared image (called as Imageshare1) is generated by the server and it is kept secretly by both the user and the server. Imageshare1 can be regarded as a shared secret between the user and the server. For each remote authentication, the server generates a shared image (called as Imageshare2) based on the Imageshare1 and an image containing digits or characters. The login user can get the content only if Imageshare1 and Imageshare2 are stacked. In order to protect Imageshare1 which is stored in the user’s mobile device, our remote authentication is two-factors. At first, the user must input the correct graphic password to access Imageshare1, and then activate the mutual authentication. The proposed scheme changes the content of the image whenever the user logins, and our scheme can withstand password guessing attack, impersonation attack, replay attack and known-key attack, etc.
Li, Po-Chin, and 李保慶. "A (2, 3) Threshold Secret Sharing Scheme Using Sudoku." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/25271849825727726410.
Full text亞洲大學
資訊工程學系碩士班
99
Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve the goal of secret data delivery with the high visual quality of a stego image and good security. The concept of Sudoku was adopted in the proposed method. According to the method’s design, secret data can only be extracted when a minimum number of two shadow images are received. Furthermore, a large number of solutions of Sudoku are an advantage to increase secret data delivery security.
Chen, Shih-Chang, and 陳世璋. "A Study of Optimally Essential Secret Image Sharing Scheme." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/76369497838752072366.
Full text淡江大學
資訊工程學系資訊網路與多媒體碩士班
104
This paper presents a two-layered structure for optimally sharing a secret image among s essential and n-s non-essential shared shadows using the (t,s,k,n) essential thresholds, that t essential shared shadows and totally k shared shadows are needed to recover the secret image. The presented two-layered structure includes one user-defined parameter m to determine different kinds of optimal results. m=1 leads to minimum size of total shared shadows (ST) and size of an essential shared shadow is close to size of a non-essential shared shadow. On the other hand, m=t leads to size of an essential shared shadow being twice of size of a non-essential shared shadow to signify the importance of an essential shared shadow. Moreover, the proposed structure overcomes the threshold fulfillment problem in Chen’s scheme [13]. Theoretical analyses and experimental results show that the proposed scheme exhibits secure with optimal sharing ratios among related works.
Chen, Yung-Chang, and 陳永昌. "Shift-Tolerant Visual Secret Sharing Scheme without Pixel Expansion." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/52555593990319395082.
Full text國立暨南國際大學
資訊工程學系
104
Visual secret sharing(VSS) is a technology of image encryption, which does not requir any calculation at the time of decryption, just alone with the human visual system then the secret can be recovered. The concept of VSS is encrypting a secret image into two meaningless shares. We can only decrypt the secret image by stacking these shares together. Random grid, which is a skill for making a visual secret sharing scheme, the advantage is that it does not need the codebooks, and the size of each share will be the same size as the secret image. It is a simple and useful technique to share secret image. However, there would be problems in alignment when these two shares are staked by hand in practical. Therefore, this thesis presents the fault-tolerant schemes when stacking two shares that are acquired from secret image encryption without pixel expansion. When two shares are stacked, even without been perfectly stacked, we can restore the image to achieve fault-tolerant. Both theoretical analysis and simulation results demonstrate the effectiveness and practicality of the proposed schemes.
Hsu, Chih-Wei, and 許志偉. "An Image Hiding Technique Based on Secret Sharing Scheme." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/86827445234600752763.
Full text明新科技大學
資訊管理研究所
96
Original visual cryptography is a secret sharing method that encrypts a secret image into n shares, and decrypts the image by overlaying k or more shares over each other without any computation. However, by inspecting less than k shares, one cannot gain any information on the secret image. The original visual cryptography have two weaknesses which are pixel expansion and noise-like shares. A lecture review has showed that encrypts a secret image into input images and decrypts the image by applying simple arithmetic operations, which is difference from original visual cryptography. Although, it cannot decrypt by human visual system, it has improved pixel expansion and noise-like shares. In this study. An image hiding technique based on secret sharing scheme has been proposed. The proposed method divides a gray value of the secret image into two separated parts: unit, hundreds and tens. After the gray value separated, one of the n input images was selected for unit encryption and the other input images for hundreds and tens. The experimental result has showed that all shared images similar to the origin input images with high PSNR. The gray value change of the share image if hardly identify by human visual system. Additionally, the decryption of secret image require only simply arithmetic operations to each share.
Liu, Chong-An, and 劉崇安. "Reversible secret image sharing scheme based on difference expansion." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/70706736802400503065.
Full text淡江大學
資訊工程學系資訊網路與通訊碩士班
100
Conventional (t, n) secret image sharing scheme shares a secret image to shared images and secret keys. Collecting t shared images corresponding with their secret keys recovers the secret image. However, noise-like shared images always attract attackers attention. Therefore, embedding shared images to meaningful cover images to form stego images can efficiently reduce attackers attention. This paper presents a different-expansion based reversible secret image sharing technique to let participants restore the secret image and cover image in recovering procedure. The proposed scheme can further raise the embedded capacity when the cover image does not need to be perfectly reconstructed. Experimental results show each stego image have good image quality and high embedded capacity.