期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Watermarking Scheme Based on Wavelet Transformation and Visual Cryptography
1
作者 Young-Chang Hou Shih-Chieh Wei +1 位作者 Hsin-Ju Liu A-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2014年第1期101-106,共6页
Based on the principles of the visual cryptography and the law of large numbers, the unexpanded shares are generated during the processes of embedding and verifying the hidden watermark. The watermark embedding is don... Based on the principles of the visual cryptography and the law of large numbers, the unexpanded shares are generated during the processes of embedding and verifying the hidden watermark. The watermark embedding is done in the frequency domain, which can be decoded by the human visual system (HVS) without the necessity of any complicated computation and the help of the original image. Experimental results indicated that our method had a good robustness on darkening, lightening, blurring, sharpening, noise, distorting, jitter, joint photographic experts group (JPEG) compression, and crop attacks. 展开更多
关键词 Copyright protection digitalwatermarking law of large numbers visualcryptography wavelet transformation.
在线阅读 下载PDF
Authentication Mechanism for Secret Sharing Using Boolean Operation
2
作者 Yi-Hui Chen Pei-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2012年第3期195-198,共4页
A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the re... A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether the shadows are authentic before reconstructing the secret image. The proposed scheme delivers much more effective performance than Chen and Wu's scheme. 展开更多
关键词 Authentication mechanism visualcryptography visual secret sharing.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部