完整後設資料紀錄
DC 欄位語言
dc.contributor.author李, 正吉 Jr
dc.contributor.author陳, 國瑋 Jr
dc.contributor.author劉, 泓廷 Jr
dc.contributor.author蔡, 垂雄 Jr
dc.date.accessioned2011-03-24T23:41:12Z
dc.date.accessioned2020-05-18T03:24:53Z-
dc.date.available2011-03-24T23:41:12Z
dc.date.available2020-05-18T03:24:53Z-
dc.date.issued2011-03-24T23:41:12Z
dc.date.submitted2009-11-28
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/30123-
dc.description.abstractThe main functions of visual cryptography and secret sharing are distributing the secret image to several recognizable sharing images and reconstructing the secret image by overlapping the sharing images. This paper provides two methods to encrypt the secret image and authenticate whether the secret image and the sharing images are correct. Both methods of encryption decide the composition of sharing images by computing with polynomial function. And both methods of authentication use the traditional method that checks the secret image with eyes and also check the information which are hidden in the sharing images and are computed with polynomial function additionally. If the data after checked are all correct, we can identify the sharing images are valid.
dc.description.sponsorshipNational Taipei University,Taipei
dc.format.extent11p.
dc.relation.ispartofseriesNCS 2009
dc.subjectVisual encryption
dc.subjectsecret sharing
dc.subjectpolynomial computing
dc.subjectimage
dc.subject.otherWorkshop on Cryptography and Information Security
dc.title具驗證能力之視覺機密分享技術
分類:2009年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
CI0403.pdf1.44 MBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。