淡江大學機構典藏:Item 987654321/79651
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62830/95882 (66%)
造访人次 : 4031086      在线人数 : 1018
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/79651


    题名: 植基於區塊漸進還原之非擴展式視覺機密分享
    作者: 侯永昌;官振宇;蔡志豐
    贡献者: 淡江大學資訊管理學系
    关键词: 視覺機密分享;漸進式視覺機密分享;機密影像區塊;藏密學技術;Visual Secret Sharing;Progressive Visual Secret Sharing;Secret Block;Steganography
    日期: 2012-12-01
    上传时间: 2013-01-07 19:13:12 (UTC+8)
    出版者: 桃園縣:中華企業資源規劃學會
    摘要: In the related works of progressive visual secret sharing (PVSS), Wang et al. (2007) and Wang (2009) all have the following drawbacks: (1) The design of the dispatching matrices is not regular. (2) Shares are m-times larger than the original secret image. (3) Restored image's quality is poor. (4) Their schemes are not suitable to apply in grayscale and color secret images. In order to solve the above limitations, we propose a non-expanded PVSS approach, in which the recovery method is based on secret blocks, namely Block-based Progressive Visual Secret Sharing (BPVSS). We divide a secret image into n non-overlapped image blocks, and an additional portion of secret will be restored after superimposing one more transparency. When superimposing any t shares, there have t (2≤t≤n) secret blocks being restored. Compared with other related works, BPVSS has several advantages: (1) The concept of this model is concise, easy to implement, and the number of participants will not be restricted. (2) In the situation of noise-like shares, the contrast of the restored image is 50%, which means that the hidden message can be clearly recognized by the naked eyes. (3) When transparencies are shifted from noise-like into meaningful, the contrast of the stego-image and the restored image will be 25% which is still superior to other related studies. (4) Our scheme is more suitable for grayscale and color secret images than previous related studies. (5) The size of transparencies is the same as the size of secret image.
    關聯: Journal of e-business=電子商務學報 14(4), pp. 575-596
    DOI: 10.6188/JEB.2012.14(4).01
    显示于类别:[資訊管理學系暨研究所] 期刊論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML297检视/开启
    JEB2012-024.pdf3350KbAdobe PDF368检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈