English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 50995586      Online Users : 753
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/115204


    Title: 新的機密高動態範圍影像分享技術
    A Novel Secret High Dynamic Range Image Sharing
    Authors: 王宗銘
    鄭友銘
    曾宇田
    陶嘉瑋
    廖彥凱
    Keywords: 高動態範圍影像;機密影像分享;資訊隱藏;認證
    high dynamic range image;secret image sharing;steganography;authentication
    Date: 2006
    Issue Date: 2017-12-18 17:38:54 (UTC+8)
    Abstract: 近年來廣受討論之高動態範圍影像包含高範圍的色彩顯示能力,相較於傳統低動態範圍影像更能有效地呈現自然世界的真實色彩。鑒於高動態範圍影像之趨勢,本文首創機密高動態範圍影像分享演算法,將機密資訊分享為n筆影子資訊,並藉由其中任意r筆影子資訊(r<=n)恢復完整之機密高動態範圍影像。我們根據高動態範圍影像的特性,重新調整影像並以自適應模型的算數編碼方法壓縮,有效縮減影子資訊。為了進一步增進影子資訊在網際網路傳遞的隱密性及完整性,我們更提出植基於邊緣吻合的認證型高動態範圍影像資訊隱藏演算法,以雜湊函數對偽裝影像進行認證,產生不易為人們察覺有異的偽裝高動態範圍影像。實驗結果顯示:我們的技術首開先例,成功提供機密資訊更為隱密、認證、可靠又安全的分享方式。
    High dynamic range (HDR) images which have received much discussion in recent years present real world colors more effectively than conventional low dynamic range (LDR) images. We propose a novel secret high dynamic range image sharing algorithm based on the tendency of HDR image. It shares a secret HDR image into n shadow data, and any r shadow data (r<=n) can be used to restore the whole secret HDR image. We make an adjustment in each channel value with respect to the characteristics of HDR image and then compress it by the adaptive arithmetic code. We also propose a HDR image data hiding method with authentication for security and integrality during the transmission on the Internet. It is based on the modified side match scheme and the hash function. Our method makes it hard for the stego HDR image to perceive differences. Experimental results demonstrate that our algorithm provides a way for the secret information to be shared in a private, authentic, reliable and secure way.
    Relation: TANET 2006 台灣網際網路研討會論文集
    資通安全、不當資訊防治
    Data Type: conference
    Appears in Collections:[TANET 台灣網際網路研討會] 會議論文

    Files in This Item:

    File Description SizeFormat
    661.pdf1208KbAdobe PDF2149View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback