Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.

Slides:



Advertisements
Similar presentations
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Advisor : Dr. Hsu Presenter : Yu Cheng Chen Author: Hichem.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Discovering Leaders from Community Actions Presenter : Wu, Jia-Hao Authors : Amit Goyal, Francesco Bonchi,
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Fast exact k nearest neighbors search using an orthogonal search tree Presenter : Chun-Ping Wu Authors.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Text classification based on multi-word with support vector.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Adaptive nonlinear manifolds and their applications to pattern.
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Chien-Ming Hsiao Author : Bing Liu Yiyuan Xia Philp S. Yu 國立雲林科技大學 National Yunlin University.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. An IPC-based vector space model for patent retrieval Presenter: Jun-Yi Wu Authors: Yen-Liang Chen, Yu-Ting.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology A k-mean clustering algorithm for mixed numeric and categorical.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
國立雲林科技大學 National Yunlin University of Science and Technology Self-organizing map learning nonlinearly embedded manifoldsmanifolds Author :Timo Simila.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Utilizing Marginal Net Utility for Recommendation in E-commerce.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Multiclass boosting with repartitioning Graduate : Chen,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology O( ㏒ 2 M) Self-Organizing Map Algorithm Without Learning.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Region-based image retrieval using integrated color, shape,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 A personal route prediction system base on trajectory.
Visual Cryptography for Gray-Level Images by Dithering Techniques
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Direct mining of discriminative patterns for classifying.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Self Organizing Maps and Bit Signature: a study applied.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Hierarchical model-based clustering of large datasets.
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Yu Cheng Chen Author : Yongqiang Cao Jianhong Wu 國立雲林科技大學 National Yunlin University of Science.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Discovering Interesting Usage Patterns in Text Collections:
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Visualizing social network concepts Presenter : Chun-Ping Wu Authors :Bin Zhu, Stephanie Watts, Hsinchun.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Palette Partition Based Data Hiding for Color Images
Digital information encrypted in an image using binary encoding
A Secret Information Hiding Scheme Based on Switching Tree Coding
Efficient Time-Bound Hierarchical Key Assignment Scheme
Image camouflage by reversible image transformation
Source: IEEE Transactions on Information Forensics and Security, Vol
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
QR Code Authentication with Embedded Message Authentication Code
Efficient QR Code Beautification With High Quality Visual Content
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
The Recent Developments in Visual Secret Sharing
Source: arXiv preprint arXiv:  (2018)
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
A Novel Latin Square-based Secret Sharing for M2M Communications
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Improved joint reversible data hiding in encrypted images
Dynamic embedding strategy of VQ-based information hiding approach
Reporter :Liang, Min-Chen Date :2003/05/06
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
A new chaotic algorithm for image encryption
Steganography in halftone images: conjugate error diffusion
Data hiding method using image interpolation
Source: Signal Processing: Image Communication 16 (2001) pp
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Secret image sharing with steganography and authentication
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Color two-dimensional barcode patterns for extra encrypting sinusoidal-function scrambled data Source: Optical Engineering, Vol. 55, No. 6, pp. 063104- 063104, 2016. Authors: Yeh Sheng Lih, Lin Kuang Tsan, Lin Shyh-Tsong Speaker: Huang Peng-Cheng Date: 11/22/2018 Lunghwa University of Science and Technology, Department of Mechanical Engineering,龍華科技大學 St. John’s University, Department of Mechanical and Computer Aided Engineering,聖約翰科技大學 National Taipei University of Technology, Department of Electro-Optical Engineering國立臺北科技大學

Outline Proposed scheme Discussions Conclusions Comments

Proposed scheme(1/6) --notations color high resolution barcode pattern (CHRBP) original binary barcode pattern (OBBP) secret extra picture (SEP) encryption key parameters (EKPs) sinusoidal-function image scrambling algorithm (SFISA)

Proposed scheme(2/6) -- an example 9 × 9 Proposed scheme(2/6) -- an example

Introduction(3/6) -- an example

Proposed scheme(4/6) --Forming a CHRBP from an OBBP

Proposed scheme(5/6) Image Scrambling by Using the Sinusoidal Function both t and d are the specified integers a rectangular image or a data matrix with the dimension of M × N

Proposed scheme(6/6) --Encrypting an SEP into a CHRBP 2-graylevel (1 bit∕pixel for a binary image), 256-graylevel (8 bits∕pixel for a gray image), 4096-graylevel (12 bits∕pixel for a gray image), 3-set 256-graylevel (24 bits∕pixel for a color image) the form of the original image

Discussions(1/4) --the performance of an image scrambling method The bigger the value of δ is, the more different g1(i,j) and g2(i,j) are. the image scrambling degree percentage δp is defined as

Discussions(2/4) --the performance of an image scrambling method Fig. 12 Images after (a) one, (b) two, (c) and three times of image scrambling for the SEP 2.

Discussions(3/4) --the performance of an image scrambling method Fig. 14 Images after (a) one, (b) two, (c) and three times of image scrambling for the SEP 3.

Discussions(4/4) --the performance of an image scrambling method

Conclusions QR code hides secret image. High security.

Comments Inappropriate example Lack of analysis for the success rate of CHRBP decoding.