• 沒有找到結果。

Secret Image Sharing with Reversible Steganography

N/A
N/A
Protected

Academic year: 2022

Share "Secret Image Sharing with Reversible Steganography"

Copied!
2
0
0

加載中.... (立即查看全文)

全文

(1)

Accession number:20094512430497

Title: Secret image sharing with reversible steganography

Authors: Chang, Chin-Chen (1); Lin, Pei-Yu (2); Chan, Chi-Shiang (3) Author affiliation:(1) Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan; (2) Department of Computer Science and Information Engineering, National Chung Cheng University, 160 San- Hsing, Min-Hsiung, Chiayi 621, China; (3) Department of Information Science and Applications, Asia University, No. 500, Lioufeng Rd., Wufeng, Taichung 41354, Taiwan

Corresponding author:Chang, C.-C.

(ccc@cs.ccu.edu.tw)

Source title: Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009 Abbreviated source title:Proc. Int. Conf Comput. Int. Nat. Comput., CINC

Issue:2

Monograph title:Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009 Issue date:2009

Publication year:2009 Pages:253-256

Article number:5230993 Language:English

ISBN-13:9780769536453

Document type:Conference article (CA)

Conference name:2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009

Conference date:June 6, 2009 - June 7, 2009 Conference location:Wuhan, China

Conference code:78020

Sponsor:Wuhan University of Science and Technology; Zhongnan Branch; Huazhong Normal University; Wuhan Institute of

Technology; Intell. Inf. Technol. Appl. Res. Assoc., IITA Assoc.

Publisher:IEEE Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States

Abstract:The significant essential of secret image sharing

(2)

approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system.

Then, the information data used to reconstruct original pixels from camouflaged pixels are calculated. The information data and

transformed secret data are shared using the (t, n)-threshold sharing scheme. In this way, we can retrieve the lossless secret image and reverse the stego image to the original image. According to the experiments, the shadows can be successfully camouflaged in the cover image, and the stego images have satisfactory quality.

Moreover, our scheme allows for a large capacity of embedded secret data. © 2009 IEEE.

Number of references:16 Main heading:Pixels

Controlled terms: Artificial intelligence - Computer science - Cryptography

Uncontrolled terms: Distortion-free - Modulo operator - Reversible - Secret sharing - Steganography

Classification code:723.5 Computer Applications - 723.4 Artificial Intelligence - 723 Computer Software, Data Handling and

Applications - 722.2 Computer Peripheral Equipment - 742.2

Photographic Equipment - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line

Communications - 717 Optical Communication - 716

Telecommunication; Radar, Radio and Television - 721 Computer Circuits and Logic Elements

DOI:10.1109/CINC.2009.249 Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

參考文獻

相關文件

Mehrotra, “Content-based image retrieval with relevance feedback in MARS,” In Proceedings of IEEE International Conference on Image Processing ’97. Chakrabarti, “Query

in Proceedings of the 20th International Conference on Very Large Data

(1999), "Mining Association Rules with Multiple Minimum Supports," Proceedings of ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego,

Shih and W.-C.Wang “A 3D Model Retrieval Approach based on The Principal Plane Descriptor” , Proceedings of The 10 Second International Conference on Innovative

D.Wilcox, “A hidden Markov model framework for video segmentation using audio and image features,” in Proceedings of the 1998 IEEE Internation Conference on Acoustics, Speech,

Wells, “Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns,” Proceedings of the sixth conference on Australasian computing education, pp. Line, “Age

Harma, “Automatic identification of bird species based on sinusoidal modeling of syllables,” in Proceedings of IEEE International Conference on Acoustics, Speech,

Li, The application of Bayesian optimization and classifier systems in nurse scheduling, in: Proceedings of the 8th International Conference on Parallel Problem Solving