Writing a Good Technical Paper

Slides:



Advertisements
Similar presentations
A Robust Pedestrian Detection Approach Based on Shapelet Feature and Haar Detector Ensembles Wentao Yao, Zhidong Deng TSINGHUA SCIENCE AND TECHNOLOGY ISSNl.
Advertisements

Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
Video Segmentation Based on Image Change Detection for Surveillance Systems Tung-Chien Chen EE 264: Image Processing and Reconstruction.
Packet Classification Using Multi-Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: COMPSACW, 2013 IEEE 37th Annual (Computer.
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
研究方向 Abstract This study proposes Ka-band and W-band harmonic multiplying gyro-TWTs, using distributed wall losses and attenuating severs, to improve the.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013,
RESULTS AND DISCUSSION
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A New Classification Mechanism for Retinal Images
Seunghui Cha1, Wookhyun Kim1
The Recent Developments in Visual Cryptography
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
إعداد د/زينب عبد الحافظ أستاذ مساعد بقسم الاقتصاد المنزلي
A. P. Shah Institute of Technology
خشنه اتره اهورهه مزدا شيوۀ ارائه مقاله 17/10/1388.
Recent Developments on Multimedia and Secure Networking Technologies
First Name SURNAME, First Name SURNAME
First Name SURNAME, First Name SURNAME
Chair Professor Chin-Chen Chang Feng Chia University
TITLE OF THE PAPER Your Institute/ Organization logo AUTHOR’S NAME
Analysis of the RSA Encryption Algorithm
Writing a Good Technical Paper
Poster Presentations – Paper number ID 000
Participant Institute logo
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
University/ Institute Logo
چگونه بنویسیم و کجا چاپ کنیم؟
References: Acknowledgement:
A Restricted Region-based Data-hiding Scheme
University/ Institute Logo
Abstract (Maximum 500 words)
Partial Proposal for n: ITRI Preamble Specification
The New Developments in Visual Cryptography
Poster Title Author(s) name
A. P. Shah Institute of Technology
08-11th May 2018, Djerba Island, Tunisia Web: Your Institution LOGO
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
A New String Matching Algorithm Based on Logical Indexing
Reversible Data Hiding
8° International Conference on :
A. P. Shah Institute of Technology
Poster Title: Background and Introduction Methods and Results
POSTER TEMPLATE of ISLAC’18
Color Image Retrieval based on Primitives of Color Moments
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Research Article Title
Poster Presentations – Paper number ID 000
Recent Developments on Multimedia and Secure Networking Technologies
2019/5/5 A Flexible Wildcard-Pattern Matching Accelerator via Simultaneous Discrete Finite Automata Author: Hsiang-Jen Tsai, Chien-Chih Chen, Yin-Chi Peng,
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Paper Title should be 96pt font Authors/Affiliations 66pt font
<Add authors and affiliation>
Poster Presentations – Paper number ID 000
Secret Image Sharing Based on Encrypted Pixels
Title of The Study Authors & Affiliations
An Iterative Method for Lossless Data Embedding in BMP Images
A. Author1, B. Author2 and C. Author3
Authors name, Affiliation, Logos of your organisation funding body
ISASTECH PAPER TITLE ABSTRACT
Affiliation/ City/Country/
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Color Image Retrieval based on Primitives of Color Moments
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Writing a Good Technical Paper Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan cchen@cs.nthu.edu.tw

Components of A Paper Title – Image Sharing and Recovering Based on Chinese Remainder Theorem Authors – Ting-Wei Chuang, Chaur-Chin Chen, Betty Chien Affiliation – Institute, Address, E-mail, Phone number, Fax number, … Abstract Keywords − 3~6 keywords Main body of the paper

Main Body of A Technical Paper 1. Introduction 2. Background Review (Related Work) 3. Proposed Method 4. Experiments (Experimental Results) 5. Conclusion (and/or Future Work) 6. References

Image Sharing and Recovering Based on Chinese Remainder Theorem Ting-Wei Chuang, Chaur-Chin Chen*, Betty Chien Institute of Information Systems & Applications National Tsing Hua University, Hsinchu 30013, Taiwan E-mail: cchen@cs.nthu.edu.tw Abstract−Due to the rapid growth of information acquisition in the era of the Internet of Things (IoT) and Cloud Computing, …… Index Terms−Blakley, Chinese Remainder Theorem (CRT), Image Sharing, Shamir.

V. DISCUSSION AND CONCLUSION This paper reviews and discusses commonly used (k, n) threshold methods including Shamir [5, 8], Blakley [2, 3], and CRT-Based methods [1,10,11] for image sharing. Generally speaking, a pixel value falls in [0,255] which should be taken into account in the design for image sharing, based on which, we proposed a simple CRT-based method to implement an image sharing and recovering processes. An experiment for (3,5)−threshold demonstration shows that our method [12] is feasible. Pursuing a sharing algorithm to generate shadow images whose pixel values randomly spread in [0,255] merits further studies.

References [1] C. Asmuth and J. Bloom, ”A Modular Approach to Key Guarding,” IEEE Trans. on Information Theory, vol. 29, no. 2, 208-210, 1983. [2] G.R. Blakley, ”Safeguarding cryptographic keys,”Proceedings of the National Computer Conference, American Federation of Information Proceeding Societies, New York, vol. 48, 313-317, 1979. [3] C. Chen, W.Y. Fu, and C.C. Chen, ”A Geometry-Based Image Sharing Approach,” Proceedings of Image and Vision Computing, Dunedin, Otago, New Zealand, 428-431, 2005. - - - - - - - - - - - - - - - - - - - - - - ~ ~ ~ [11] https://en.wikipedia.org/wiki/Secret_sharing_using_the_Chinese_ remainder_theorem, last access on March 24, 2016. [12] http://www.cs.nthu.edu.tw/.WWW/CRT2016, last access on March 24, 2016.