Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wu, Chia-Hua | en_US |
dc.contributor.author | Lee, Suiang-Shyan | en_US |
dc.contributor.author | Lin, Ja-Chen | en_US |
dc.date.accessioned | 2019-04-03T06:43:21Z | - |
dc.date.available | 2019-04-03T06:43:21Z | - |
dc.date.issued | 2017-06-01 | en_US |
dc.identifier.issn | 0091-3286 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1117/1.OE.56.6.063106 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/145816 | - |
dc.description.abstract | This all-in-one hiding method creates two transparencies that have several decoding options: visual decoding with or without translation flipping and computer decoding. In visual decoding, two less-important (or fake) binary secret images S1 and S2 can be revealed. S1 is viewed by the direct stacking of two transparencies. S2 is viewed by flipping one transparency and translating the other to a specified coordinate before stacking. Finally, important/true secret files can be decrypted by a computer using the information extracted from transparencies. The encoding process to hide this information includes the translated-flip visual cryptography, block types, the ways to use polynomial-style sharing, and linear congruential generator. If a thief obtained both transparencies, which are stored in distinct places, he still needs to find the values of keys used in computer decoding to break through after viewing S1 and/or S2 by stacking. However, the thief might just try every other kind of stacking and finally quit finding more secrets; for computer decoding is totally different from stacking decoding. Unlike traditional image hiding that uses images as host media, our method hides fine gray-level images in binary transparencies. Thus, our host media are transparencies. Comparisons and analysis are provided. (C) 2017 Society of Photo-Optical Instrumentation Engineers (SPIE) | en_US |
dc.language.iso | en_US | en_US |
dc.subject | multiple decoding options | en_US |
dc.subject | multiple secrets | en_US |
dc.subject | visual cryptography | en_US |
dc.subject | polynomial-style sharing | en_US |
dc.title | All-in-one visual and computer decoding of multiple secrets: translated-flip VC with polynomial-style sharing | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1117/1.OE.56.6.063106 | en_US |
dc.identifier.journal | OPTICAL ENGINEERING | en_US |
dc.citation.volume | 56 | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 0 | en_US |
dc.citation.epage | 0 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000406007500006 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.