資料載入處理中...
臺灣人文及社會科學引文索引資料庫系統
:::
網站導覽
國圖首頁
聯絡我們
操作說明
English
行動版
(18.217.92.209)
登入
字型:
**字體大小變更功能,需開啟瀏覽器的JAVASCRIPT,如您的瀏覽器不支援,
IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,
如為IE7以上、Firefoxy或Chrome瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
來源文獻查詢
引文查詢
瀏覽查詢
作者權威檔
引用/點閱統計
我的研究室
資料庫說明
相關網站
來源文獻查詢
/
簡易查詢
/
查詢結果列表
/
詳目列表
:::
詳目顯示
第 1 筆 / 總合 1 筆
/1
頁
來源文獻資料
引文資料
題名:
Share a Secret Image with Invertible and Lossy Characteristics
書刊名:
International Journal of Electronic Commerce Studies
作者:
Chen, Chien-chang
/
Liu, Chong-an
/
Lin, Yu-jing
出版日期:
2016
卷期:
7:2
頁次:
頁135-154
主題關鍵詞:
Secret image sharing
;
Different expansion
;
Lossy recovery
原始連結:
連回原系統網址
相關次數:
被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
排除自我引用:0
共同引用:0
點閱:87
期刊論文
1.
Fang, W. P.(2008)。Friendly progressive visual secret sharing。Pattern Recognition,41(4),1410-1414。
2.
Lin, C. C.、Tsai, W. H.(2004)。Secret Image Sharing with Steganography and Authentication。Journal of Systems and Software,73(3),405-414。
3.
Thien, C. C.、Lin, J. C.(2002)。Secret Image Sharing。Computers & Graphics,26(5),765-770。
4.
Tian, J.(2003)。Reversible Data Embedding Using a Difference Expansion。IEEE Transactions on Circuits and Systems for Video Technology,13(8),890-896。
5.
Chang, C. C.、Hsieh, Y. P.、Lin, C. H.(2008)。Sharing secrets in stego images with authentication。Pattern Recognition,41(10),3130-3137。
6.
Chen, C. C.、Wu, W. J.(2014)。A secure Boolean-based multi-secret image sharing scheme。The Journal of Systems and Software,92(1),107-114。
7.
Chen, C. C.、Liu, C. A.(2013)。Tamper-proof secret image sharing scheme for identifying cheated secret keys and shared images。Journal of Electronic Imaging,22(1),013008。
8.
Huang, C. P.、Hsieh, C. H.、Huang, P. S.(2010)。Progressive sharing for a secret image。Journal of Systems and Software,83(3),517-527。
9.
Lin, S. J.、Chen, L. S.、Lin, J. C.(2009)。Fast-weighted secret image sharing。Optical Engineering,48(7),077008。
10.
Yang, C. N.、Ciou, C. B.(2010)。Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability。Image and Vision Computing,28(10),1600-1610。
11.
Ulutas, G.、Ulutas, M.、Nabiyev, V.(2013)。Secret image sharing scheme with adaptive authentication strength。Pattern Recognition Letters,34(3),283-291。
12.
Wang, R. Z.、Su, C. H.(2006)。Secret image sharing with smaller shadow images。Pattern Recognition Letters,27(6),551-555。
13.
Lin, P. Y.、Lee, J. S.、Chang, C. C.(2009)。Distortion-free secret image sharing mechanism using modulus operator。Pattern Recognition,42(5),886-895。
14.
Lin, P. Y.、Chan, C. S.(2010)。Invertible secret image sharing with steganography。Pattern Recognition Letters,31(13),1887-1893。
15.
Wu, X.、Lou, D.、Liang, Q.、Sun, W.(2012)。A user-friendly secret image sharing scheme with reversible steganography based on cellular automata。The Journal of Systems and Software,85(8),1852-1863。
16.
Chen, T. H.、Wu, C. S.(2011)。Efficient multi-secret image sharing based on Boolean operations。Signal Processing,91(1),90-97。
17.
Yang, C. N.、Chen, C. H.、Cai, S. R.(2016)。Enhanced Boolean-based multi secret image sharing scheme。The Journal of Systems and Software,116(1),22-34。
會議論文
1.
Liu, C. L.、Lou, D. C.、Lee, C. C.(2007)。Reversible data embedding using reduced difference expansion。The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing。Kaohsiung, Taiwan:IEEE Press。430-436。
2.
Hu, Yi、Song, Wei、Hou, Jianjun(2009)。Improved reduced difference expansion based reversible data hiding scheme for digital images。The 9th International Conference on Electronic Measurement & Instruments。Beijing:IEEE Press。(4)315-(4)318。
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
引用網址
當script無法執行時可按︰
引用網址
引用嵌入語法
當script無法執行時可按︰
引用嵌入語法
轉寄
當script無法執行時可按︰
轉寄
top
:::
相關期刊
相關論文
相關專書
相關著作
熱門點閱
無相關期刊論文
無相關博士論文
無相關書籍
無相關著作
1.
Design of a Mobile E-Learning Forecasting System Based on a Case Study Using Multiple Intelligence Analysis
2.
The Effect of Website Quality Features and Cognitive Absorption on Social Network Site Usage: A Cross-National Study
3.
Interaction Commerce, a Technological Architecture Focused on Recommender System
4.
A Classification of Internet Pornographic Images
5.
Social Sensor: An Analysis Tool for Social Media
6.
Campus Paperless Conference System--A Case Study of a National University in Central Taiwan
7.
How to Create Social Support on Facebook
8.
The Role of Strategic Flexibility in The Associations between Management Control System Characteristics and Strategic Change
9.
Born Global Firm Internationalisation: The Influence of Industry Factors
10.
Linking Perceived Organizational Support to Organizational Identification: Role of Organization Based Self-Esteem
11.
Customer Perception of Green Advertising in The Context of Eco-Friendly FMCGs
12.
A Comparison of the Influence of Personal and Cultural Values on the Consumption of Luxury Goods across Arab Regions: Levant versus Gulf
13.
On Two Priority Multi-Server Queues with Impatient Customers
14.
A Parametric Approach to Solve Bounded-Variable LFP by Converting into LP
15.
A Fuzzy Goal Programming Approach for Channel Allocation Problem Using Linear and Non-Linear Membership Functions
QR Code