完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | 李, 正吉 Jr | |
dc.contributor.author | 陳, 國瑋 Jr | |
dc.contributor.author | 劉, 泓廷 Jr | |
dc.contributor.author | 蔡, 垂雄 Jr | |
dc.date.accessioned | 2011-03-24T23:41:12Z | |
dc.date.accessioned | 2020-05-18T03:24:53Z | - |
dc.date.available | 2011-03-24T23:41:12Z | |
dc.date.available | 2020-05-18T03:24:53Z | - |
dc.date.issued | 2011-03-24T23:41:12Z | |
dc.date.submitted | 2009-11-28 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/30123 | - |
dc.description.abstract | The main functions of visual cryptography and secret sharing are distributing the secret image to several recognizable sharing images and reconstructing the secret image by overlapping the sharing images. This paper provides two methods to encrypt the secret image and authenticate whether the secret image and the sharing images are correct. Both methods of encryption decide the composition of sharing images by computing with polynomial function. And both methods of authentication use the traditional method that checks the secret image with eyes and also check the information which are hidden in the sharing images and are computed with polynomial function additionally. If the data after checked are all correct, we can identify the sharing images are valid. | |
dc.description.sponsorship | National Taipei University,Taipei | |
dc.format.extent | 11p. | |
dc.relation.ispartofseries | NCS 2009 | |
dc.subject | Visual encryption | |
dc.subject | secret sharing | |
dc.subject | polynomial computing | |
dc.subject | image | |
dc.subject.other | Workshop on Cryptography and Information Security | |
dc.title | 具驗證能力之視覺機密分享技術 | |
分類: | 2009年 NCS 全國計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
CI0403.pdf | 1.44 MB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。