English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90120/105278 (86%)
Visitors : 9218708      Online Users : 408
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊傳播學系 > 期刊論文 >  Item 310904400/4409


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/4409


    Title: Secret multimedia information sharing with data hiding capability by simple logic operations
    Authors: C. C. Lin;W. H. Tsai
    Contributors: Department of Information Communication
    Date: 2004
    Issue Date: 2009-11-25 10:31:15 (UTC+8)
    Publisher: Asia University
    Abstract: An effective scheme for secret multimedia information sharing with data-hiding capability is pro-posed. Sharing is accomplished by transforming a set of secret data into an arbitrary number of sets of prede- signed camouflage data and a corresponding set of meaningless data. Based on the characteristic of visualiza-
    tion, the scheme can be employed to share, e.g., a landscape image into several portraits and a meaningless image. The scheme can be applied to other types of multimedia data as well, such as voice, video, and so on. Thus, we can share a paragraph of words into several pleasant melodies or share a section of a cartoon movie into several sections of science fiction movies. When a set of secret data is shared, the effect of data hiding is achieved meanwhile because the shares, except the last one, can be meaningful camouflage data sets. For cases of small numbers of shares, a method for improving the scheme is proposed additionally to maintain the data hiding effect. An advantage of the proposed scheme is that only simple logic operations are used in creating the shares and recovering the secret data. Simple logic operations have the properties of fast computation and easy implementation, which make the scheme more practical for real applications. Security is also ensured. The secret data are distributed instead of being centralized. If not all shares are collected, no information about the original secret data can be gained.
    Relation: Pattern Recognition and Image Analysis 14 (4): 594-600
    Appears in Collections:[資訊傳播學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    0KbUnknown293View/Open
    310904400-4409.doc31KbMicrosoft Word320View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback