跳到主要內容

簡易檢索 / 詳目顯示

研究生: 蔡宗甫
Tzung-Fu Tsai
論文名稱: 基於多層次誤差擴散之數位半色調資訊共享機制
A Secret Sharing Scheme in Halftone Images Based on Multi-Scale Error Diffusion
指導教授: 蘇柏齊
Po-Chyi Su
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2015
畢業學年度: 103
語文別: 中文
論文頁數: 56
中文關鍵詞: 資訊共享資料隱藏數位半色調多層次誤差擴散
外文關鍵詞: Halftoning, Multi-Scale Error Diffusion, Information Hiding, Secret Sharing
相關次數: 點閱:24下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文提出一個利用數位半色調影像做為機密資訊傳遞的共享機制。多張數位影像被當做載體並轉換為數位半色調影像,影像在轉換的過程中,我們利用半色調影像的特性,將相同大小的機密半色調影像嵌入於載體中,達成秘密通訊及資料共享的目標。此機制的數位半色調轉換基於多層次誤差擴散演算法,每次選擇適當的影像與位置放置白點,並根據機密半色調影像的內容讓同位置的白點個數滿足隱藏條件,研究的主要目標在於嵌入秘密影像的同時亦保持載體半色調影像的畫質。此外,我們提出數位半色調影像的互嵌機制,在不指定欲嵌入機密影像的情況下,能夠在參與共享的M 張影像中,利用任何M-1 張影像擷取剩餘的一張半色調影像。為了從資料庫中選擇適當的影像作為資料載體,我們提供選圖機制做為實作參考。實驗結果顯示所有數位半色調影像能夠維持良好的畫質,能夠成功地將機密半色調影像被嵌入與擷取,達到秘密通訊與資訊共享之目的。


    This research presents a secret sharing scheme in halftone images. Some gray-level images of the same resolution are selected and transferred to halftone ones, which are responsible for carrying a secret halftone image. Given the pixels of secret image as the constraint, the host images are generated using Multi-scale Error Diffusion (MED). The original pixels of host images are examined and the modified MED ensures that the resulting pixels of the host images should satisfy the required conditions. After grouping all the processed halftone images, the secret image can be successfully revealed. The research objective is maintaining the quality of all the halftone images in this secret sharing scenario. Another proposed method is termed "mutual embedding," in which a halftone share can be decoded using all the other shares by modifying the initial setting in this secret sharing scheme. Besides, the approach of selecting host images is proposed so that suitable images can be chosen from an image database to ensure the quality of resulting halftone images. The experimental results and discussions demonstrate the interesting characteristics of the proposed scheme.

    1 Introduction 1 1.1 Significance of the Research . . . . . . . . . . . . . . . . . 1 1.2 Contribution of Research . . . . . . . . . . . . . . . . . . . 4 1.3 The Organization of Thesis . . . . . . . . . . . . . . . . . 4 2 Preliminaries 6 2.1 Review of the MED Algorithm . . . . . . . . . . . . . . . 6 2.2 Review of the Related Work . . . . . . . . . . . . . . . . . 8 3 The Secret Sharing Scheme with MED 11 3.1 Initial Host Halftone Images . . . . . . . . . . . . . . . . . 12 3.2 ”Painting” on Dirty Papers . . . . . . . . . . . . . . . . . 13 3.3 Generating the Final Host Halftone Images . . . . . . . . . 16 3.4 Extracting the Secret Halftone Image . . . . . . . . . . . . 16 3.5 Mutual embedding of halftone images . . . . . . . . . . . . 17 3.6 The Image Quality Evaluation of Halftoning . . . . . . . . 18 3.7 The Method of Selecting Images . . . . . . . . . . . . . . . 18 3.7.1 Avoid the Image with Larger Dark Areas . . . . . . 18 3.7.2 Selecting the Images with Balanced Intensity . . . 20 4 Experimental Results 25 4.1 Test Conditions . . . . . . . . . . . . . . . . . . . . . . . . 25 4.2 Different Numbers of Host Halftone Images . . . . . . . . 27 4.2.1 The Intuitive Method . . . . . . . . . . . . . . . . 27 4.2.2 The Influence from the Number of Host Images . . 27 4.3 The Appropriate Host Halftone Images . . . . . . . . . . . 34 4.4 Encrypting the Secret Halftone Image . . . . . . . . . . . 37 4.5 The Influence of Secret Image Generating Methods . . . . 38 4.6 Mutual Embedding . . . . . . . . . . . . . . . . . . . . . . 39 5 Conclusion and Future Work 41 Reference 42

    [1] M. Naor and A. Shamir. Visual cryptography. In Advances in Cryptograhy:
    EUROCRYPT, LNCS, volume 950, pages 1–12, 1995.
    [2] R. Ulichney. Digital Halftoning. Cambridge, MA, USA: MIT Press,
    1987.
    [3] R. A. Ulichney. The void-and-cluster method for dither array generation.
    In Proc. SPIE, Human Vis. Visual Process., Digit. Displays
    IV, volume 1913, pages 332–343, Feb. 1993.
    [4] D. E. Knuth. Digital halftones by dot diffusion. In ACM Trans.
    Graph., volume 6, pages 245–273, Oct. 1987.
    [5] C. N. Judice J. F. Jarvis and W. H. Ninke. A survey of techniques
    for the display of continuous-tone pictures on bilevel displays. In
    Comput. Graph. Image Process, volume 5, pages 13–40, 1976.
    [6] Ioannis Katsavounidis and C.-C. Jay Kuo. A Multiscale Error Diffusion
    Technique for Digital Halftoning. In IEEE Tronsmfiom on
    Image Processing, volume 6, pages 483–490, 1997.
    [7] M. Analoui and Bernice E. Rogowitz J. P. Allebach. Model based
    halftoning using direct binary search. In Human Vision, Visual Processing,
    and Digital Display III, volume 1666, pages 96–108, 1992.
    [8] P. W. Wong. Adaptive error diffusion and its application in multiresolution
    rendering. In IEEE Trans. Image Process., volume 5, pages
    1184–1196, 1996.
    [9] P. W. Wong. Multi-resolution binary image embedding. In Proc.
    SPIE, volume 5020, pages 423–429, 2003.
    [10] Y. H. Fung and Y. H. Chan. Embedding Halftones of Different Resolutions
    in a Full-Scale Halftone. In IEEE Signal Process. Lett.,
    volume 13, pages 153–156, Mar. 2006.
    [11] J. M. Guo and J. J. Tsai. Data Hiding in Halftone Images Using
    Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up
    Table. In IEEE International Symposium on Circuits and Systems,
    volume 1, pages 201–204, Aug. 2009.
    [12] J. M. Guo and J. H. Huang. Data Hiding in Halftone Images with
    Secret-Shared Dot Diffusion. In IEEE International Symposium on
    Circuits and Systems, pages 1133–1136, 2010.
    [13] G. R. Arce Z. Zhou and G. Di Crescenzo. Halftone visual cryptography.
    In IEEE Trans. Image Process., volume 15, pages 2441–2453,
    Aug. 2006.
    [14] Z. Wang and G. R. Arce. Halftone visual cryptography by iterative
    halftoning. In IEEE Int. Conf. Acoustics, Speech and Signal
    Processing, pages 1822–1825, 2010.
    [15] Vinay Rishiwal K. V. Arya and Arun Kumar Yadav. An Efficient
    Halftone Visual Secret Sharing Scheme. In IEEE Industrial and Information
    Systems, pages 1–5, 2014.
    [16] AnujTiwari K. V. Arya and Lovelesh Saxena. A novel technique for
    biometric based on user identification using watermarking and visual
    cryptography. In proc. of International Conference on Computer
    Apli-cation and Network Security, pages 283–287, 2011.
    [17] Nitty Sarah Alex and L. Jani Anbarasi. Enhanced image secret sharing
    via error diffusion in halftone visual cryptography. In IEEE Advanced
    Computing and Communication Technologies, pages 393–397,
    2011.
    [18] Aman Kamboj and D.K.Gupta. An improved Halftone Visual Secret
    Sharing Scheme for gray-level images based on error diffusion in
    forward and backward direction. In IEEE Advanced Computing and
    Communication Technologies, pages 125–130, 2015.
    [19] J. M. Guo and Y. F. Liu. Joint compression/watermarking scheme
    using majority-parity guidance and halftone-based block truncation
    coding. In IEEE Trans. Image Process., volume 19, pages 2056–2069,
    Aug. 2010.

    QR CODE
    :::