English  |  正體中文  |  简体中文  |  Items with full text/Total items : 49258/83761 (59%)
Visitors : 7139136      Online Users : 56
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/77122


    Title: An Ownership Protection Scheme Based on Visual Cryptography and the Law of Large Numbers
    Authors: Hou, Young-chang;Huang, Pei-hsiu
    Contributors: 淡江大學資訊管理學系
    Keywords: Visual cryptography;law of large numbers;intellectual property rights protection;unexpanded share
    Date: 2012-06
    Issue Date: 2012-06-01 09:04:08 (UTC+8)
    Publisher: Kumamoto: I C I C International
    Abstract: Digital watermarking is a technique for the protection of intellectual property rights. In this study a novel ownership protection scheme based on visual cryptography and the law of large numbers is proposed, where 2 phases, namely an ownership construction phase and an ownership authentication phase, each with 3 steps, are designated to illustrate how it works. In our scheme, two pixels at a time are selected randomly from the host image, then compared with the other and the results determine the corresponding content of the shares. The law of large numbers is employed to ensure the random distribution of half-black-and-half-white shares, which satisfies the demand needed for security in visual cryptography. The proposed method enjoys several advantages over conventional methods such as it does not to alter the host image, it can identify the ownership without the help of the original host image, and it allows multiple watermarks or larger watermarks to be registered in a smaller host image. Finally, experimental results are given to illustrate the robustness of our scheme against several common attacks.
    Relation: International Journal of Innovative Computing, Information and Control 8(6), pp.4147-4156
    Appears in Collections:[資訊管理學系暨研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat
    1349-4198_8(6)p4147-4156.pdf571KbAdobe PDF95View/Open
    index.html0KbHTML108View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback