首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
无线电   2篇
自动化技术   2篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2005年   1篇
排序方式: 共有4条查询结果,搜索用时 140 毫秒
1
1.
All the various data hiding methods can be simply divided into two types: (1) the extracted important data are lossy, (2) the extracted important data are lossless. The proposed method belongs to the second type. In this paper, a module-based substitution method with lossless secret data compression function is used for concealing smoother area of secret image by modifying fewer pixels in the generated stego-image. Compared with the previous data hiding methods that extract lossless data, the generated stego-image by the proposed method is always with better quality, unless the hidden image is with very strong randomness.  相似文献   
2.
This paper proposes a flip visual cryptography (FVC) scheme with perfect security, conditionally optimal contrast, and no expansion of size. The proposed FVC scheme encodes two secret images into two dual-purpose transparencies. Stacking the two transparencies can reveal one secret image. Flipping one of the two transparencies and then stacking with the other transparency can reveal the second secret image. The proposed scheme is proved to have conditionally optimal contrast: its contrast is optimal if the double-secrets non-expanded FVC scheme is required to have perfect security. The perfect security is also proved.  相似文献   
3.
Based on generalized random grids, this paper proposes two visual cryptography methods denoted as (2, n) GRG and (2, infinity) GRG. The (2, n) GRG is suitable for the pre-decided number of shares, and the (2, infinity) method is suitable for the adjustable number of shares. The proposed (2, n) GRG achieves better contrast on the stacking result, and the proposed (2, infinity) GRG enables extending the number of shares anytime. Based on the definition of contrast in Shyu’s work in 2007, we also demonstrate that the stacking result of (2, n) GRG is close to the theoretical bound of the contrast, and the stacking result of (2, infinity) GRG achieves the theoretical bound of the contrast.  相似文献   
4.
Shang-Kuan  Ja-Chen   《Pattern recognition》2005,38(12):2466-2471
A fault-tolerant progressive image transmission method is proposed. The advantages include the following: (1) Unlike most progressive methods, the image is divided into n parts with equal importance to avoid worrying about which part is lost or transmitted first. (2) If the image is a secret image, then the transmission can use n distinct channels (one shared result per channel), and intercepting up to r1-1 channels by the enemy (r1rkn are all pre-set constants) will not reveal any secret. Meanwhile, the disconnection up to n-rk channels will not affect the lossless recovery of the secret image.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号