期刊文献+

(t,n)门限图像隐藏技术的实施与改进

Practice and improvement of image hiding based on(t,n) threshold
在线阅读 下载PDF
导出
摘要 在前人研究的基础上,对基于Shamir的(t,n)门限的图像隐藏算法提出了新的改进,并且引入了奇偶校验,这样就可以分辨被损坏的图像,从而使隐藏算法具有更强的鲁棒性。 Based on the previous studies, this paper has proposed new improvements on image hiding algorithm according to Shamir's (t, n) threshold. In addtion,with the introduction of odd-even checking, which can identify the damaged images,the hiding algorithm therafore becomes more robust.
作者 梅杨
出处 《微型机与应用》 2011年第6期35-36,40,共3页 Microcomputer & Its Applications
关键词 隐藏 门限 奇偶校验 hiding threshold odd-even checking
  • 相关文献

参考文献7

  • 1BOURBAKITS N, ALEXOPOULOUS C. Picture data eneryption using scan patterns[J]. Pattern Recognition ,1992,25 (6):567-581.
  • 2CHANG C C, HWANG M S, CHEN T S. A new encryption algorithm for image cryptosystems[J]. Journal of Syst- ems and Software,2001,58:83-91.
  • 3KUO C J. Novel image encryption techniques and its applications in progressive transmission[J].Journal of ElectronicImaging, 1993,2(4):345-351.
  • 4Chen Changchin, CHANG Liniuon. A new (t3n) threshold image hiding schemd for sharing a secret color image[C]. Proceedings of ICCT'2003 [C]. Beijing :Press of BJUlYF, 2003.
  • 5陈继超,谢柯.基于(t,n)门限的可防欺骗的图像隐藏方案[J].计算机技术与发展,2006,16(9):208-209. 被引量:1
  • 6BLAKLEY G R. Safeguarding cryptographic keys[C]. Pro ceedings of the National Computer Conference. US:American Federation of Information Procession Societies,1979: 242-268.
  • 7SHAMIR A. How to share a secret[J]. Communication of ACM, 1979,22:612-613.

二级参考文献6

  • 1Bourbakits N,Alexopoulous C.Picture Data Encryption Using Scan Patterns[J].Pattern Recognition,1992,25 (6):567-581.
  • 2Chang C C,Hwang M S,Chen T S.A new Encryption Algorithm for Image Cryptosystems[J].Journal of Systems and Software,2001,58:83-91.
  • 3Kuo C J.Novel Image Encryption Techniques and its Applications in Progressive Transmission[J].Journal of Electronic Imaging,1993,2 (4):345-351.
  • 4Blakley G R.Safeguarding Cryptographic Keys[A].Proceedings of the National Computer Conference[C].US:American Federation of Information Procession Societies,1979.242 -268.
  • 5Shamir A.How to Share a Secret[J].Communication of ACM,1979,22:612-613.
  • 6Chang Chin-Chen,Lin Iuon-Chang.Anew (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image[A].Proceedings of ICCT2003[C].Beijing:Press of BJUPT,2003.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部