http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Image Hiding Scheme by Linking Pixels in the Circular Way
( Chi-shiang Chan ),( Yuan-yu Tsai ),( Chao-liang Liu ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.6
The proposed method in this paper is derived from Mielikainen`s hiding method. However, there exist some significant differences between two methods. In Mielikainen`s method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations
( Chi-shiang Chan ),( Yung-chen Chou ),( Yi-hui Chen ),( Yuan-yu Tsai ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.5
In 2011, Chen and Wu proposed their method of sharing n secret images to n+1 shadow images through the concept of a Boolean-based Visual Secret Sharing (VSS) method. However, the shadow images produced by this method are not equally important. If the participant who owns an important shadow image does not want to cooperate with other participants, most secret images can not be reconstructed. In the proposed method, the relationship between the shadows images and secret images are designed in a circular way mostly. Each shadow image only relates to two secret images. This means that if one participant refuses to cooperate with other participants, there are only two secret images which can not be reconstructed. Moreover, our proposed method only needs to produce n shadow images and n secret images can be shared to them.
Tzu-Chieh Lin,Shao-Chi Yu,Pei-Shiang Chen,Kai-Yuan Chi,Han-Chang Pan,Chih-Yu Chao 한국물리학회 2009 Current Applied Physics Vol.9 No.3
In this article, thermal nanoimprint lithography (thermal-NIL) has been utilized to transfer the microgroove pattern onto the plastic substrate. Without coating alignment polymer, the microgrooves on the flexible substrates can align liquid crystals (LCs) directly. The flexible LC cell is shown to maintain comparable electro-optical properties while bending. The plastic film and the alignment layer integrated into an alignment substrate could effectively prevent cracks of the additional polymer alignment layer during the bending process. This method is applicable to the roll-to-roll process to increase the production efficiency. In this article, thermal nanoimprint lithography (thermal-NIL) has been utilized to transfer the microgroove pattern onto the plastic substrate. Without coating alignment polymer, the microgrooves on the flexible substrates can align liquid crystals (LCs) directly. The flexible LC cell is shown to maintain comparable electro-optical properties while bending. The plastic film and the alignment layer integrated into an alignment substrate could effectively prevent cracks of the additional polymer alignment layer during the bending process. This method is applicable to the roll-to-roll process to increase the production efficiency.
( Yuan-yu Tsai ),( Jian-ting Chen ),( Yin-chi Kuo ),( Chi-shiang Chan ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.9
Jung and Yoo proposed the first image interpolation-based reversible data hiding algorithm. Although their algorithm achieved superior interpolation results, the embedding capacity was insufficient. Lee and Huang proposed an improved algorithm to enhance the embedding capacity and the interpolation results. However, these algorithms present limitations to magnify the original image to any resolution and pixels in the boundary region of the magnified image are poorly manipulated. Furthermore, the capacity and the image quality can be improved further. This study modifies the pixel mapping scheme and adopts a bilinear interpolation to solve boundary artifacts. The modified reference pixel determination and an optimal pixel adjustment process can effectively enhance the embedding capacity and the image quality. The experimental results show our proposed algorithm achieves a higher embedding capacity under acceptable visual distortions, and can be applied to a magnified image at any resolution. Our proposed technique is feasible in reversible data hiding.