• 沒有找到結果。

Secret Image Hiding and Sharing Based on the (t, n)-Threshold

N/A
N/A
Protected

Academic year: 2022

Share "Secret Image Hiding and Sharing Based on the (t, n)-Threshold"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Secret Image Hiding and Sharing Based on the (t, n)-Threshold 作者: Chang, C. C.;Lin, C. Y.;Tseng, C. S.

關鍵詞: Secret image sharing;steganography;image quantization;(t,n)-threshold secret sharing

日期: 2007-04

上傳時間: 2009-12-17T06:58:06Z 出版者: Asia University

摘要: This study proposes a new secret image sharing method based on the (t,n)-threshold. The sharing method is completed through three main steps: (1) quantizing the secret image, (2) generating n shadows from

(2)

the quantized image, and (3) sharing the n shadows among n cover images. Our goal is both to attain good stego-image and secret image quality preservation effects and to limit the size of each shadow image down to 1/t of that of the secret image for convenient transmission and storage. In the first step, the secret image is divided into non-

overlapping 4 ? 4 blocks that are quantized according to the results of block testing. Each block, after the block testing procedure, is judged to be either a smooth block or a non-smooth one. Smooth blocks can be neatly restored after being hidden into the cover image, while non- smooth blocks can be somewhat lossy, but such modification is perceptually invisible. The second step is to apply Shamir's (t,n)-

threshold, which uses a (t?1)-degree polynomial to generate n shadows so that the secret image can be restored from any t out of n shadows.

The last step involves a modulo operation to hide the n shadows in n cover images. According to our experimental results, the PSNR values of the reconstructed secret images by our method center around 39 dB, outperforming other recent methods.

參考文獻

相關文件

( tongjiao). This represents the earliest stratum of Diamond Sutra comme ntary.. 2)Explanation of the Diamond Sutra (Jin'gangjing jieyi) and Secret Oral T eachings on theDiamond

Light rays start from pixels B(s, t) in the background image, interact with the foreground object and finally reach pixel C(x, y) in the recorded image plane. The goal of environment

contributions to the nearby pixels and writes the final floating point image to a file on disk the final floating-point image to a file on disk. • Tone mapping operations can be

For example, both Illumination Cone and Quotient Image require several face images of different lighting directions in order to train their database; all of

In this study, the impact of corporate social responsibility to corporate image, service quality, perceived value, customer satisfaction and customer loyalty was explored

The regression analysis results indicated that after the corporate image, service quality, satisfaction, perceived value and loyalty between each dimension and is

If the resulting image is a blank image, it means that the test image is free of defects; otherwise, any thing left in the image is regarded as a defect.. In the research, we

The files of the JPEG2000 format of the images from the camera are transmitted to the remote user; therefore the remote control and remote image store are obtained.. Key Word :