| 研究生: |
蔡宗甫 Tzung-Fu Tsai |
|---|---|
| 論文名稱: |
基於多層次誤差擴散之數位半色調資訊共享機制 A Secret Sharing Scheme in Halftone Images Based on Multi-Scale Error Diffusion |
| 指導教授: |
蘇柏齊
Po-Chyi Su |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2015 |
| 畢業學年度: | 103 |
| 語文別: | 中文 |
| 論文頁數: | 56 |
| 中文關鍵詞: | 資訊共享 、資料隱藏 、數位半色調 、多層次誤差擴散 |
| 外文關鍵詞: | Halftoning, Multi-Scale Error Diffusion, Information Hiding, Secret Sharing |
| 相關次數: | 點閱:24 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文提出一個利用數位半色調影像做為機密資訊傳遞的共享機制。多張數位影像被當做載體並轉換為數位半色調影像,影像在轉換的過程中,我們利用半色調影像的特性,將相同大小的機密半色調影像嵌入於載體中,達成秘密通訊及資料共享的目標。此機制的數位半色調轉換基於多層次誤差擴散演算法,每次選擇適當的影像與位置放置白點,並根據機密半色調影像的內容讓同位置的白點個數滿足隱藏條件,研究的主要目標在於嵌入秘密影像的同時亦保持載體半色調影像的畫質。此外,我們提出數位半色調影像的互嵌機制,在不指定欲嵌入機密影像的情況下,能夠在參與共享的M 張影像中,利用任何M-1 張影像擷取剩餘的一張半色調影像。為了從資料庫中選擇適當的影像作為資料載體,我們提供選圖機制做為實作參考。實驗結果顯示所有數位半色調影像能夠維持良好的畫質,能夠成功地將機密半色調影像被嵌入與擷取,達到秘密通訊與資訊共享之目的。
This research presents a secret sharing scheme in halftone images. Some gray-level images of the same resolution are selected and transferred to halftone ones, which are responsible for carrying a secret halftone image. Given the pixels of secret image as the constraint, the host images are generated using Multi-scale Error Diffusion (MED). The original pixels of host images are examined and the modified MED ensures that the resulting pixels of the host images should satisfy the required conditions. After grouping all the processed halftone images, the secret image can be successfully revealed. The research objective is maintaining the quality of all the halftone images in this secret sharing scenario. Another proposed method is termed "mutual embedding," in which a halftone share can be decoded using all the other shares by modifying the initial setting in this secret sharing scheme. Besides, the approach of selecting host images is proposed so that suitable images can be chosen from an image database to ensure the quality of resulting halftone images. The experimental results and discussions demonstrate the interesting characteristics of the proposed scheme.
[1] M. Naor and A. Shamir. Visual cryptography. In Advances in Cryptograhy:
EUROCRYPT, LNCS, volume 950, pages 1–12, 1995.
[2] R. Ulichney. Digital Halftoning. Cambridge, MA, USA: MIT Press,
1987.
[3] R. A. Ulichney. The void-and-cluster method for dither array generation.
In Proc. SPIE, Human Vis. Visual Process., Digit. Displays
IV, volume 1913, pages 332–343, Feb. 1993.
[4] D. E. Knuth. Digital halftones by dot diffusion. In ACM Trans.
Graph., volume 6, pages 245–273, Oct. 1987.
[5] C. N. Judice J. F. Jarvis and W. H. Ninke. A survey of techniques
for the display of continuous-tone pictures on bilevel displays. In
Comput. Graph. Image Process, volume 5, pages 13–40, 1976.
[6] Ioannis Katsavounidis and C.-C. Jay Kuo. A Multiscale Error Diffusion
Technique for Digital Halftoning. In IEEE Tronsmfiom on
Image Processing, volume 6, pages 483–490, 1997.
[7] M. Analoui and Bernice E. Rogowitz J. P. Allebach. Model based
halftoning using direct binary search. In Human Vision, Visual Processing,
and Digital Display III, volume 1666, pages 96–108, 1992.
[8] P. W. Wong. Adaptive error diffusion and its application in multiresolution
rendering. In IEEE Trans. Image Process., volume 5, pages
1184–1196, 1996.
[9] P. W. Wong. Multi-resolution binary image embedding. In Proc.
SPIE, volume 5020, pages 423–429, 2003.
[10] Y. H. Fung and Y. H. Chan. Embedding Halftones of Different Resolutions
in a Full-Scale Halftone. In IEEE Signal Process. Lett.,
volume 13, pages 153–156, Mar. 2006.
[11] J. M. Guo and J. J. Tsai. Data Hiding in Halftone Images Using
Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up
Table. In IEEE International Symposium on Circuits and Systems,
volume 1, pages 201–204, Aug. 2009.
[12] J. M. Guo and J. H. Huang. Data Hiding in Halftone Images with
Secret-Shared Dot Diffusion. In IEEE International Symposium on
Circuits and Systems, pages 1133–1136, 2010.
[13] G. R. Arce Z. Zhou and G. Di Crescenzo. Halftone visual cryptography.
In IEEE Trans. Image Process., volume 15, pages 2441–2453,
Aug. 2006.
[14] Z. Wang and G. R. Arce. Halftone visual cryptography by iterative
halftoning. In IEEE Int. Conf. Acoustics, Speech and Signal
Processing, pages 1822–1825, 2010.
[15] Vinay Rishiwal K. V. Arya and Arun Kumar Yadav. An Efficient
Halftone Visual Secret Sharing Scheme. In IEEE Industrial and Information
Systems, pages 1–5, 2014.
[16] AnujTiwari K. V. Arya and Lovelesh Saxena. A novel technique for
biometric based on user identification using watermarking and visual
cryptography. In proc. of International Conference on Computer
Apli-cation and Network Security, pages 283–287, 2011.
[17] Nitty Sarah Alex and L. Jani Anbarasi. Enhanced image secret sharing
via error diffusion in halftone visual cryptography. In IEEE Advanced
Computing and Communication Technologies, pages 393–397,
2011.
[18] Aman Kamboj and D.K.Gupta. An improved Halftone Visual Secret
Sharing Scheme for gray-level images based on error diffusion in
forward and backward direction. In IEEE Advanced Computing and
Communication Technologies, pages 125–130, 2015.
[19] J. M. Guo and Y. F. Liu. Joint compression/watermarking scheme
using majority-parity guidance and halftone-based block truncation
coding. In IEEE Trans. Image Process., volume 19, pages 2056–2069,
Aug. 2010.