• 沒有找到結果。

An Efficient Probability-based t out of n Secret Image Sharing Scheme

N/A
N/A
Protected

Academic year: 2022

Share "An Efficient Probability-based t out of n Secret Image Sharing Scheme"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: An Efficient Probability-based t out of n Secret Image Sharing Scheme 作者: Chang, C. C.;Wang, Y. Z.;Chan, C. S.

日期: 2009-03

上傳時間: 2009-12-17T06:57:27Z 出版者: Asia University

摘要: Noar and Shamir presented the concept of visual cryptography. Many researches following it go down the same track: to expand the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes worse. In order to prevent the pixels from expanding, Yang has proposed his probability-based visual secret sharing scheme, where the concept of probability is employed to pick out pixels from the black or white sets. In this paper, we shall propose a new scheme that is a modified version of Yang?s scheme. Our experimental results show that we can

obtain better recovered image quality with high contrast.

參考文獻

相關文件

Prize-presentation Ceremony cum Sharing Sessions of the Junior Secondary History e-Reading Award Scheme 2019 and Highlights of learning & teaching strategies in History

Prize-presentation Ceremony cum Sharing Sessions of the Junior Secondary History e-Reading Award Scheme 2019 and Highlights of learning & teaching strategies in History

Light rays start from pixels B(s, t) in the background image, interact with the foreground object and finally reach pixel C(x, y) in the recorded image plane. The goal of environment

As n increases, not only does the fixed locality bound of five become increasingly negligible relative to the size of the search space, but the probability that a random

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

Therefore, this research paper tries to apply the perspective of knowledge sharing to construct the application model for the decision making method in order to share the

In order to serve the fore-mentioned purpose, this research is based on a related questionnaire that extracts 525 high school students as the object for the study, and carries out

Based on the insertion of redundant wires and the analysis of the clock skew in a clock tree, an efficient OPE-aware algorithm is proposed to repair the zero-skew