• 沒有找到結果。

[PDF] Top 20 An image-sharing method with user-friendly shadow images

Has 10000 "An image-sharing method with user-friendly shadow images" found on our website. Below are the top 20 most common "An image-sharing method with user-friendly shadow images".

An image-sharing method with user-friendly shadow images

An image-sharing method with user-friendly shadow images

... LIN: AN IMAGE-SHARING METHOD WITH USER-FRIENDLY SHADOW IMAGES 1169 among all branches helps to prevent nonrecoverable damage, and reduces the amount of ... See full document

9

User-friendly sharing of images: progressive approach based on modulus operations

User-friendly sharing of images: progressive approach based on modulus operations

... Abstract. Image sharing is a popular technology to secure impor- tant images against ...transforms an important image to produce several other images called shadows or ... See full document

9

Progressive sharing of an image

Progressive sharing of an image

... secret sharing was introduced indepen- dently by Shamir 3 and ...proposed an 共r, n兲 sharing scheme particularly for se- cret ...secret image was shared among n partici- pants, and each ... See full document

14

Sharing and hiding secret images with size constraint

Sharing and hiding secret images with size constraint

... stego image was 2=t or 4=t of that of the secret ...new method in which the size of the stego image (which contains the hidden shadow) is still about 1=t of that of the secret ...of ... See full document

9

Secret Multimedia Sharing with Steganographic Effects via PNG Images

Secret Multimedia Sharing with Steganographic Effects via PNG Images

... new method by secret sharing with steganographic effects for sharing secret images by PNG images is ...The sharing secret scheme is based on solving a set of simultaneous ... See full document

12

Progressive sharing of multiple images with sensitivity-controlled decoding

Progressive sharing of multiple images with sensitivity-controlled decoding

... on sharing. Among the exist- ing image sharing approaches, the secret being shared is often assumed to be a single image, rather than mul- tiple ...single-image sharing ... See full document

19

An EM based multiple instance learning method for image classification

An EM based multiple instance learning method for image classification

... propose an EM based Multiple- Instance learning algorithm and implement a user friendly video search engine (IMIPS) over ...propose an EM based learning algorithm, which provides a compre- ... See full document

5

Sharing an Image with Variable-size Shadows

Sharing an Image with Variable-size Shadows

... secret image sharing schemes produce shadows with an equal size including the well know Shamir’s and Thien-Lin’s approaches that are based upon polynomial ...secret image scheme which ... See full document

6

User-friendly design method for fuzzy logic controller

User-friendly design method for fuzzy logic controller

... The method allows a novice to construct a set of membership functions, called shrinking-span membership functions (SSMFs), for a specific linguistic variable systematical[r] ... See full document

9

A Data Hiding Method Based on Information Sharing  via PNG Images for Applications of Color Image

A Data Hiding Method Based on Information Sharing via PNG Images for Applications of Color Image

... hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is ...Shamir’s method are taken as carriers to carry given ...PNG image. Undesired white noise ... See full document

36

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... original image data is that the data to be embedded in the carrier are often large ...here with the alpha channel as the carrier, this is not a problem because the cover image that we deal ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... the method later by using an edge line similarity measure to select flippable pixels for the purpose of reducing the ...a method for authentication of document im- ages with an ... See full document

11

Image-based traffic monitoring with shadow suppression

Image-based traffic monitoring with shadow suppression

... in image analysis due to misclassification of shadows and moving ...vehicles. An effective shadow suppres- sion method is thus required to improve the accuracy of image analysis and ... See full document

14

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

... of images for use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting stego-image and stronger ...PNG ... See full document

16

Sharing Secrets in Stego Images with Authentication

Sharing Secrets in Stego Images with Authentication

... secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego ... See full document

1

A modified user-friendly remote authentication scheme with smart cards

A modified user-friendly remote authentication scheme with smart cards

... modified user-friendly remote authentication scheme with smart cards Yi-Hwa Chen 1 , Jinn-Ke Jan 2 1 Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan 402 2 ... See full document

3

Secret Image Sharing with Reversible Steganography

Secret Image Sharing with Reversible Steganography

... approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we ... See full document

2

Secret image sharing with reversible steganography

Secret image sharing with reversible steganography

... Secret image sharing with reversible steganography 作者: Chang, Chin-Chen;Lin, Pei-Yu;Chan, Chi-Shiang 貢獻者: Department of Information Science and Applications 關鍵詞: Artificial intelligence;Computer ... See full document

1

A New Steganographic Method Based on Information Sharing via PNG Images

A New Steganographic Method Based on Information Sharing via PNG Images

... However, it should be noted that the larger the value of t is chosen to be, the lower the visual quality of the stego-image will become. The reason is that a larger value of t, according to Step 2 of Algorithm 1, ... See full document

5

Shadow generation from stereo images

Shadow generation from stereo images

... Unlike existing shadow algorithms which require 3D object models, the proposed approach works with stereo images of polyhedral objects placed on a base plane from [r] ... See full document

3

Show all 10000 documents...