Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Ja-Chen Lin"'
Autor:
Che-Yi Chao, Ja-Chen Lin
Publikováno v:
Applied Sciences, Vol 10, Iss 11, p 3753 (2020)
In this paper, we introduce two new image-sharing types to extend the applicability of sharing. Type 1 is our so-called forbidden type. In its sharing system, any t of the n shares can recover the secret image, unless the t shares form a forbidden gr
Externí odkaz:
https://doaj.org/article/8de48df85bc44a368ad275812070c7cb
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2008 (2008)
This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability t
Externí odkaz:
https://doaj.org/article/36236e67e4f743788f4150b79c10c65c
Publikováno v:
ICIP
The conventional encryption techniques of visual cryptography are extended to web page. The key point is that Cascading Style Sheet blend modes can simulate stacking operators. The multiply blend mode can be regarded as Boolean OR operator, and the d
Publikováno v:
Multimedia Tools and Applications. 76:243-264
This paper proposes a cross recovery scheme to protect a group of 3D models. The lost or damaged models can be reconstructed using the mutual support of the survived authenticated models. In the encoding phase, we convert a group of n given models (c
Publikováno v:
International Journal of u- and e-Service, Science and Technology. 7:27-40
Portable Document Format (PDF) is a popular file format to store documents. Protection of PDF files is thus important. In this paper, we present a (t, n) PDF-sharing scheme which shares the given secret PDF file F among n stego-PDF files. Each stego-
Autor:
CHE-YI CHAO, JA-CHEN LIN
Publikováno v:
Journal of Information Science & Engineering; May2020, Vol. 36 Issue 3, p621-641, 21p
Autor:
Suiang-Shyan Lee, Ja-Chen Lin
Publikováno v:
Pattern Recognition and Image Analysis. 23:199-206
K-means clustering method has been widely used in many areas. However, it is time-consuming when data are in high dimensional space, or when there are many clusters. We try to accelerate its speed by combing our previous work with the simplest versio
Autor:
Ja Chen Lin
Publikováno v:
Computer Engineering & Information Technology. 5
Synchronizing Two Frequently-Cited High-Capacity Image Hiding Methods (Modulus-Based Vs. LSB-Based) This study briefly reviews and then connects a Modulus-based image hiding method published in 2003 and an LSB-based (Least- Significant-Bits) image hi
Autor:
Ja-Chen Lin, Suiang-Shyan Lee
Publikováno v:
Journal of Zhejiang University SCIENCE C. 13:761-768
The K-means method is a well-known clustering algorithm with an extensive range of applications, such as biological classification, disease analysis, data mining, and image compression. However, the plain K-means method is not fast when the number of
Publikováno v:
Journal of Visual Communication and Image Representation. 21:900-916
This paper proposes a flip visual cryptography (FVC) scheme with perfect security, conditionally optimal contrast, and no expansion of size. The proposed FVC scheme encodes two secret images into two dual-purpose transparencies. Stacking the two tran