English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52359/87459 (60%)
Visitors : 9146536      Online Users : 293
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/106223

    Title: An Expandable Essential Secret Image Sharing Structure
    Authors: 陳建彰;蔡耀弘;Chien-Chang Chen;Yao-Hong Tsai
    Keywords: (s, t, n) secret image sharing structure, Essential shared image, Non- essential shared image.
    Date: 2016-01-21
    Issue Date: 2016-04-22 13:42:16 (UTC+8)
    Abstract: This study presents an expandable essential secret image sharing structure
    showing that some important shared images, named essential ones, are necessary when re-
    covering the secret image and the proposed structure must incorporate other secret image
    sharing scheme to expand to a new secret image sharing scheme with multiple functions.
    An (s, t, n) essential secret image sharing structure shares a secret image with two kinds
    of shared images, essential and non-essential ones, and the total number of shared im-
    ages is n. Two criteria must be met to recover the secret image. Firstly, the number
    of essential images must be at least s. Secondly, the number of collected shared images,
    including essential and non-essential ones, must be at least t. An essential participant
    holds his secret key as a conventional secret key concatenated by a shared essential key.
    The shared image for a non-essential participant is the XOR result of a correct shared
    image and a disturbed image generated from the essential key. Experimental results re-
    veal that the proposed method distinguishes essential and non-essential shared images,
    and keeps the threshold on essential shared images in recovering the secret image.
    Relation: Journal of Information Hiding and Multimedia Signal Processing 7(1), pp.135-144
    Appears in Collections:[資訊工程學系暨研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback