Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Shin-Shang Lin"'
Autor:
Shin-Shang Lin, 林欣尚
107
Data hiding (DH) is widely used in information security area. Embedding capacity and visual quality of stego-image are two major evaluations for DH. In 2006, Zhang and Wang first proposed the notion of Exploiting Modification Direction (EMD)
Data hiding (DH) is widely used in information security area. Embedding capacity and visual quality of stego-image are two major evaluations for DH. In 2006, Zhang and Wang first proposed the notion of Exploiting Modification Direction (EMD)
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/5s592a
Publikováno v:
2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB).
A well-known $(k,\,n)$ secret image sharing (SIS) scheme is the threshold scheme to share a secret image into $n$ shadow images, and the secret image can be recovered from any $k$ shadow images. And, fewer than shadow images get nothing on the secret
Publikováno v:
2018 IEEE 18th International Conference on Communication Technology (ICCT).
In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem. Recently, Bechkit et