dc.contributor | 資科系 | |
dc.creator (作者) | Kim, C.;Shin, D.;Shin, D.;Tso, Ray-Lin;Yang, C.-N. | |
dc.creator (作者) | 左瑞麟 | zh_TW |
dc.date (日期) | 2014-04 | |
dc.date.accessioned | 11-六月-2015 13:37:00 (UTC+8) | - |
dc.date.available | 11-六月-2015 13:37:00 (UTC+8) | - |
dc.date.issued (上傳時間) | 11-六月-2015 13:37:00 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/75682 | - |
dc.description.abstract (摘要) | In this paper, a new method based on Block Truncation Coding (BTC) and the halftoning technique is proposed for secret sharing of lossy compressed images. BTC is a simple and efficient image compression technique. However, it yields images of undesirable quality, and significant blocking effects are seen as the block size that is used increases. A modified method known as Enhanced Block Truncation Coding (EBTC) is proposed to solve these problems. For secret sharing, we propose a (2, 2) secret sharing scheme which provides authentication using DE scheme. This scheme was developed for data hiding with grayscale images, but our proposed EBTC uses bitmap images for which the DE scheme is not appropriate. We show the solution for such a problem. Moreover, we reduce the computation complexity for secret sharing using the DE algorithm because past schemes which used polynomial or interpolation algorithms require too much time for secret sharing. In addition, we show how to authenticate a cover image. Experimental results show that our proposed scheme provides secret sharing with proper authentication and acceptable computational complexity. © 2012 Springer Science+Business Media, LLC. | |
dc.format.extent | 1691239 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.relation (關聯) | Journal of Intelligent Manufacturing, 25(2), 241-249 | |
dc.subject (關鍵詞) | Algorithms; Authentication; Steganography; Block truncation coding; DE; EBTC; Hamming code; Image compression techniques; Interpolation algorithms; Secret sharing; Secret sharing schemes; Image coding | |
dc.title (題名) | A secret sharing scheme for EBTC using steganography | |
dc.type (資料類型) | article | en |
dc.identifier.doi (DOI) | 10.1007/s10845-012-0660-7 | |
dc.doi.uri (DOI) | http://dx.doi.org/10.1007/s10845-012-0660-7 | |