• 沒有找到結果。

Secret image sharing with capability of share data reduction

N/A
N/A
Protected

Academic year: 2022

Share "Secret image sharing with capability of share data reduction"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Secret image sharing with capability of share data reduction 作者: C. C. Lin;W. H. Tsai

貢獻者: Department of Information Communication 日期: 2003-07

上傳時間: 2009-11-25T02:31:14Z 出版者: Asia University

摘要: A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capability of share data reduction is proposed. A secret image is first transformed into the frequency domain using the discrete cosine transform (DCT), which is applied in most compression schemes. Then all the DCT coefficients except the first 10 lower frequency ones are discarded. And the values of the 2nd through the 10th coefficients are disarranged in such a way that they cannot be recovered without the first coefficient and that the inverse DCT of them cannot reveal the details of the original image. Finally, the first coefficient is encoded into a number of shares for a group of secret-sharing participants and the remaining nine manipulated coefficients are allowed to be accessible to the public. The overall effect of this scheme is achievement of effective secret sharing with good reduction of share data. The scheme is thus suitable for certain application environments, such as the uses of mobile or handheld devices, where only a small amount of network traffic for shared transmission and a small amount of space for data storage are allowed. Good experimental results proving the feasibility of the proposed approach are also included.

參考文獻

相關文件

In this paper, we have studied a neural network approach for solving general nonlinear convex programs with second-order cone constraints.. The proposed neural network is based on

(It is also acceptable to have either just an image region or just a text region.) The layout and ordering of the slides is specified in a language called SMIL.. SMIL is covered in

Following the supply by the school of a copy of personal data in compliance with a data access request, the requestor is entitled to ask for correction of the personal data

It is interesting that almost every numbers share a same value in terms of the geometric mean of the coefficients of the continued fraction expansion, and that K 0 itself is

The remaining positions contain //the rest of the original array elements //the rest of the original array elements.

contributions to the nearby pixels and writes the final floating point image to a file on disk the final floating-point image to a file on disk. • Tone mapping operations can be

Since the sink is aware of the location of the interested area, simple greedy geographic routing scheme is used to send a data request (in the form of

In this thesis, we propose a novel image-based facial expression recognition method called “expression transition” to identify six kinds of facial expressions (anger, fear,