English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64191/96979 (66%)
Visitors : 8488196      Online Users : 7884
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/90434


    Title: An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares
    Authors: Hsu, Ching-Sheng;Tu, Shu-Fen;Hou, Young-chang
    Contributors: 淡江大學資訊管理學系
    Keywords: Access Structure;Secret Image;Secret Information;Black Pixel;White Pixel
    Date: 2006-09
    Issue Date: 2013-06-19 16:24:25 (UTC+8)
    Publisher: Berlin: Springer-Verlag
    Abstract: The method of visual cryptography is to encrypt a secret image into N shares so that any qualified set of participants can recover the hidden secret by their eyes; whereas any forbidden set of participants cannot obtain any secret information. In the study of visual cryptography, pixel expansion and contrast are two important issues. Most visual cryptographic methods are based on the technique of pixel expansion, and the result is that the size of each share is larger than that of the secret image. Pixel expansion not only results in distortion of the shares, but also consumes more storage space. In this paper, we proposed a new method to cope with the problems of pixel expansion. We used the concept of probability and considered the security issue on the forbidden set and the contrast issue on the qualified set to construct an optimization model for general access structures. Finally, we analyzed the contrast and blackness of black pixels of our experimental result, and we found that our method is better than Ateniese et al.’s.
    Relation: Proceedings of the 16th international conference on Foundations of Intelligent Systems, pp.58-67
    DOI: 10.1007/11875604_8
    Appears in Collections:[資訊管理學系暨研究所] 專書之單篇

    Files in This Item:

    There are no files associated with this item.

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback