Вы находитесь на странице: 1из 9

Search for

Search...

(/)

Log in (/login/)
Registration (/register/)

IMAGE HALFTONE TECHNIQUE IN VISUAL SECRET SHARING


Bilete: Iasi - Bologna
44 Ofert Special!
Vola.ro

Cazare in
Baile
Felix
Cazare rapid
si niciun
comision!
Cel mai bun
pret
garantat.

Similar documents

SHARE

HTML

Security Architecture for


the TEAMDEC System
(/1456887-Security-

DOWNLOAD
0

Kelly Douglas (/user/11791518/)

6 months ago

Views: 2

Security Architecture for


the TEAMDEC System
Haiyuan Wang Thesis
submitted to the Faculty
of
the
Virginia
Polytechnic Institute and State
University in partial fulfillment of the
requirements for the degree

More information
(/1456887-Securityarchitecture-for-the-teamdecsystem.html)

Digital Signatures and


the Public Key
Infrastructure (/2145918Digital Signatures and
the
Public
Key
Infrastructure S.M. van
den Broek Department
of Econometrics Faculty

Comments
0 Comments

of Economics Erasmus University


Rotterdam Digital signatures and the
Public Key infrastructure

Sort by Oldest

Add a comment...

Proximity Analysis of
Social Network using
Skip Graph (/5372886-

Facebook Comments Plugin

Transcription

More information
(/2145918-Digital-signaturesand-the-public-keyinfrastructure.html)

1 IMAGE HALFTONE TECHNIQUE IN VISUAL SECRET SHARING Thesis submitted in the partial
fulfillment of the requirements for the degree of Master of Technology in Computer Technology
in The Faculty of Engineering & Technology Jadavpur University by ARNAB ACHARYYA UNIVERSITY
ROLL NO: 5434 REGISTRATION NUMBER: 6926 of 2-22 EXAMINATION ROLL NUMBER: M6TCT4-29
Under the Guidance of PROF. SHOVONLAL KUNDU Department of Computer Science &
Engineering, Jadavpur University Faculty of Engineering and Technology JADAVPUR UNIVERSITY,
Kolkata- 732 May, 24

2 FACULTY OF ENGINEERING AND TECHNOLOGY JADAVPUR UNIVERSITY To whom it may concern This is to certify that the thesis

entitled Image Halftone Technique in Visual Secret Sharing has been satisfactorily completed by Sri Arnab Acharyya under my
guidance and supervision and be accepted in partial fulfillment of the requirements of the degree of Master of Technology in
Computer Technology of Jadavpur University in the year 24... Prof. Shovonlal Kundu Department of Computer Science and
Technology Jadavpur University,Kolkata-732 Forwarded By Prof.Sivaji Bandyopadhyay HOD, Department of Computer Science and
Technology Jadavpur University, Kolkata-732 Dean, Faculty of Engineering and Technology Jadavpur University, Kolkata-732 2

3 FACULTY OF ENGINEERING AND TECHNOLOGY JADAVPUR UNIVERSITY CERTIFICATE OF APPROVAL The foregoing thesis, entitled
Image Halftone Technique in Visual Secret Sharing is hereby approved as a creditable study of an engineering subject carried out
and presented in a manner satisfactory to warrant its acceptance as prerequisite to the degree for which it has been submitted. It is
understood that by this approval the undersigned do not necessarily endorse or accept every statement made, opinion expressed or
conclusion drawn therein, but approve this thesis only for the purpose for which it has been submitted. Signature of the Examiner
Signature of the Supervisor 3
4 Acknowledgements The satisfaction that accompanies the successful completion of any task would be incomplete without
mention of the people who make it possible and whose constant guidance and encouragement crown all the efforts with success.
The acknowledgement transcends the reality of formality when I would like to express deep gratitude and respect to all those
people behind the screen who guided, inspired and helped me for the completion of my project work. I would like to express my
deepest gratitude to my project advisor Honorable Prof. Shovonlal Kundu for his valuable support in providing resources, insight
and advice during my research as well as throughout my post graduation career. He has constantly given me support and
encouragement. I must mention that without him this thesis would have never seen the light of the day. I am also grateful to the
higher authority of Technique Polytechnic Institute, my present working place. They have given me all the support to complete this
course. Without their helping hand it will not be possible for me to carry out this task. I gracefully acknowledge many helpful
comments, corrections and suggestions from my family, friends, teachers and my beloved students. Last but not the least, a word of
thanks goes to my beloved parents for their continual encouragement and blessings. Jadavpur University May,24 Arnab Acharyya 4

CONTENTS List of Figures Chapter. Introduction.. Overview of Cryptography.2. Traditional Secret Sharing.3. Different Secret
Sharing Scheme.4. Background on Visual Cryptography Chapter 2. Visual Secret Sharing 2.. Overview of Visual Secret Sharing 2.2.
Related Works in Visual Cryptography 2.3. Pixel Division 2.4. Superposition of Pixels 2.5. Visual Cryptography Schemes Chapter 3.
Image Halftone Technology 3.. Overview 3.2. Related Works in Image Halftone 3.3. Floyd-Steinberg Halftoning Algorithm Chapter 4.
Discussion on the Experiment Performed 4.. Concept Adapted 4.2. Proposed Algorithm 4.3. System Block Diagram 4.4. Experimental
Results 4.5. Advantage 4.6. Limitations 4.7. Summary Chapter 5. Appendices 5.. Appendix : Hardware and Software Requirements
5.2. Appendix 2: Program Listings Bibliography 5 6 8 8 2 6 2 2 23 27 28 29 37 37 39 45 48 48 5 5 52 53 53 54 56 56 58
5

6 List of Figures... Cryptography 2... Human Visual System 2..2. Example of Visual Cryptography 2.3.. Different types of pixels 2.4..
Superposition of two pixels 2.5.. Pixel Pattern for (2,2) VCS 2.5.2. (2,2) VCS with Consistent Image Size 2.5.3. (3,6) VCS 3.2.. Dithering
Method 3.2.2. Example of Threshold values in Dither Cell 3.2.3. Direct Binary Search 3.2.3. Error Diffusion Image Result 3.3.. FloydSteinberg Error Diffusion Image Result 4.3.. Proposed system block diagram 4.3.. Original Image for Experiment 4.3.2. Generated
Halftone Share of Original Image 4.3.3. Reconstructed Image 6 9 2 22 27 28 29 32 35 4 4 43 44 46 5 52 52 52
7 CHAPTER INTRODUCTION.. Overview of Cryptography Cryptography is derived from Greek word 'Krypto' which means hidden

and 'Grafo', which means written. It is the study and implementation of techniques to hide information, or simply to protect a
message or text from being read. The information that is protected can be written text, electronic signals, e-mail messages or data
transmissions. The process of making the information unreadable is encryption or enciphering and the result of encryption is a
ciphertext or cryptogram. Reversing this process and retrieving the original readable information is called decryption or deciphering.
To encrypt or decrypt information, an algorithm or so called cipher is used. 8
8 Figure... Cryptography Ever since mankind has existed, people have had secrets, and other people have wanted to know these
secrets. The earliest forms of cryptography were performed by pencil and paper, and were available only to those who had access to
proper education. Today our lives are completely digitized and cryptography has become an integral part of nearly everyone's daily
life, and it's used to protect confidential information from hackers. Nearly all our private information is stored in one of the many
databases room the government, banks and health care services and so on. Cryptography protects the right to privacy and the right
to communicate confidentially. Secure communications can protect one's intimate private life, business relations, and social or
political activities. 9

Proximity Analysis of
Social Network using
Skip
Graph
Thesis
submitted in partial
fulfillment
of
the
requirements for the award of
degree of Master of Engineering in
Software Engineering Submitted By
Amritpal

More information
(/5372886-Proximity-analysisof-social-network-using-skipgraph.html)

CLoud Computing is the


long dreamed vision of
(/189894-Cloud-

1 Enabling Secure and


Efficient
Ranked
Keyword Search over
Outsourced Cloud Data
Cong Wang, Student
Member, IEEE, Ning Cao, Student
Member, IEEE, Kui Ren, Senior
Member, IEEE, Wenjing Lou, Senior
Member,

More information
(/189894Cloud-computing-is-the-longdreamed-vision-of.html)

Automated Train Ticket


System (/4504298Automated-train-ticket-

(MobiTiki) By Athukorala
A.U.B. Dissanayake C.P.
Kumara
M.G.C.P.
Priyadarshana
G.V.J.
This report is submitted
in
partial
fulfillment
of
the
requirements for the award of the
degree of Bachelor of Science

More information
(/4504298-Automated-trainticket-system.html)

Digital Forensic Trends


and Future (/678471Digital-forensic-trendsDigital Forensic Trends
and Future Farhood
Norouzizadeh Dezfoli,
Ali
Dehghantanha,
Ramlan Mahmoud, Nor
Fazlida Binti Mohd Sani,

Farid

9 .2. Traditional Secret Sharing Handling secret has been an issue of prominence from the time human beings started to live
together. Important things and messages have been always there to be preserved and protected from possible misuse or loss. Some
time secret is thought to be secure in a single hand and at other times it is thought to be secure when shared in many hands. Some
of the formulae of vital combinations of medicinal plants or roots or leaves, in Ayurveda were known to a single person in a family.
When he becomes old enough, he would rather share the secret formula to a chosen person from the family, or from among his
disciples. There were times when the person with the secret dies before he could share the secret. Probably, similar incidents might
have made the genius of those era to think of sharing the secrets with more than one person so that in the event of death of the
present custodian, there will be at least one other person who knows the secret. Secret sharing in other forms were prevailing in the
past, for other reasons also. Secrets were divided into number of pieces and given to the same number of people. To ensure unity
among the participating people, the head of the family would share the information with respect to wealth
10 among his children and insist that after his death, they all should join together to inherit the wealth. To test the valor of the

youth of a nation, a king, would hide treasure in some place in his kingdom and information about it would be placed in pieces at
different places of varying grades of difficulty to reach. Only the brave and the intelligent would reach the treasure. Military and
defense secrets have been the subject matter for secret sharing in the past as well as in the modern days. Secret sharing is a very
hot area of research in Computer Science in the recent past. Digital media has replaced almost all forms of communication and
information preservation and processing. Security[2],[29] in digital media has been a matter of serious concern. This has resulted in
the development of encryption and cryptography. Uniform secret sharing schemes form a part of this large study. When important
secret information is managed by individuals, secrets may leak. Suppose there is a vault that must be opened every day in a bank.
Although the bank employs three senior tellers, management may not trust any individual teller. Therefore, it is necessary too and a
possible solution to design a system whereby any two of the three senior tellers can gain access

11 to the vault, but no individual teller can do so. This problem can be easily solved using a secret sharing scheme. In a more
general situation one may need to specify exactly which subsets of participants should be able to determine the key and which
should not. Secret sharing schemes are useful in many situations that require the concurrence of several chosen people as in
launching a missile or entering an area of restricted access (e.g., a bank vault)..3. Different Secret Sharing Scheme A Secret sharing
scheme is a method of dividing secret information into two or more pieces, with or without medications, and retrieving the
information by combining all or predefined sub collection of pieces. The pieces of information are called shares and the process
responsible for the division is called dealer. A predefined sub- collection of shares which contains the whole secret in some form is
called an allowed coalition. The process responsible for the recovery of the secret information from an allowed coalition is called a
combiner. A share contains, logically, a part of the information, but will be of no use. Thus no single share is of any threat to the
confidentiality of the secret 2
12 information. It is also envisaged that after the dealer process is over, the original information can be destroyed forever. This
would mean that even the person responsible for the dealer process will not be a threat, thereafter. The secret information is
recovered from any allowed coalition using the recovery process called combiner. The combiner would be able to recover the secret
information, only if, all shares in the allowed coalition is present and not with any fewer number of shares. Thus, in an allowed
coalition, each member share is equally important such that without anyone of them, the secret information cannot be accessed.
Allowed coalition is also referred in the literature by other names too, such as, authentic collection, qualified collection or authorized
set. We, in our work, preferred to call the sub collection of shares as allowed coalition. The set of all allowed 2 coalitions of
participants is called the access structure and is usually denoted by. Secret Sharing[],[5],[7],[8],[5] is an important tool in Security and
Cryptography. In many cases there is a single master key that provides the access to important secret information. Therefore, it
would be desirable to keep the master key in a safe place to avoid accidental and malicious exposure. This scheme is unreliable: if
master key is lost or destroyed, then all information accessed by the master key is no longer available. A possible 3
13 solution would be that of storing copies of the key in different safe places or giving copies to trusted people. In such a case the

system becomes more vulnerable to security[2],[29] breaches or betrayal. A better solution would be, breaking the master key into
pieces in such a way that only the concurrence of certain predefined trusted people can recover it. This has proven to be an
important tool in management of cryptographic keys and multi-party secure protocols. As a solution to this problem, a secret
sharing scheme divides (sharing) a secret key K among a finite set of n participants in such a way that only certain specified subsets
(qualified subsets) of participants can compute the secret key K by gathering their information. It was discovered independently by
G.R. Blakley and Adi Shamir[5]. Shamir's secret sharing scheme is an interpolating scheme based on polynomial interpolation while
Blakley's secret sharing scheme is geometric in nature. Both of the schemes are k-out-of n schemes but they represent two different
ways of constructing such schemes, based on which more advanced secret sharing schemes can be designed. The biggest
motivation for secret sharing is secure key management. In particular situations, there will be only one secret key that provides
access to many important les. If such a key is lost, then all the important les become inaccessible. 4

14 The basic model for secret sharing is called a k-out-of-n scheme (or sometimes referred as (k, n) threshold scheme). In this
scheme, there is a sender and n participants. The secret information is divided into n parts by the sender, and gives each participant
one part so that any k parts can be put together to recover the secret, but any k - parts reveal no information about the secret. The
pieces are usually called shares or shadows. Different choices for the values of k and n reflect the tradeoff between security[2],[29]
and reliability. A secret sharing scheme is perfect if any group of at most k - participant (insiders) has no advantage in guessing the
secret over the outsiders. An important issue in the implementation of secret sharing scheme is the size of the shares distributed to
the participants, since the security of a system degrades as the amount of the information that must be kept secret increases. So the
size of the shares given to the participants is a key point in the design of secret sharing[23],[24] schemes. Therefore, one of the main
parameters in secret sharing[25],[28] is, the average information rate; of the scheme, which is defined as the ratio between the
average length (in bits) of the shares given to the participants and the length of the secret. Unfortunately, in all secret sharing[3],[32]
schemes the size of the shares cannot be less than the size of the secret, and so the information rate cannot 5
15 be less than one. Moreover, there are accesses structures, for which, any corresponding secret sharing[33] scheme must give to
some participant a share of size strictly bigger than the secret size. Secret sharing schemes with information rate equal to one are
called ideal. A secret sharing scheme is called efficient if the total length of the n shares is polynomial in n..4. Background on Visual
Cryptography Cryptography has a long and fascinating history and it is one of the most important fields within the security
profession. Visual cryptography uses the characteristics of human vision to decrypt encrypted images and in it the secret image is
split into two or more separate random images called shares. To decrypt the encrypted information, the shares are stacked one on
top of the other, and the hidden secret image appears. Due to its simplicity, anyone can physically manipulate the elements of the
system, and visually see the decryption process in action without any knowledge of cryptography and without performing any
cryptographic computations. With the near universal use of the Internet in every field, the need to share important documents from
one office to other via this medium becomes increasingly more necessary. With the coming era of the electronic 6
16 commerce, there is an immediate need to solve the problem of ensuring information safety in today's increasingly open
network environment. To protect the security of information, various encrypting technologies of traditional cryptography are usually
used. With such technologies, the data can become disordered after being encrypted and later it can be recovered by a correct key.
Without the correct key, the encrypted source content can hardly be detected even though unauthorized persons steal the data. The

Daryabar Faculty of Computer


Science and Information Technology
University

More information
(/678471Digital-forensic-trends-andfuture.html)

Searching the Web.


Abstract (/2771526Searching-the-web-

Searching
the
Web
Arvind Arasu Junghoo
Cho
Hector
GarciaMolina
Andreas
Paepcke
Sriram
Raghavan
Computer
Science
Department, Stanford University
{arvinda,cho,hector,paepcke,rsram}
@cs.stanford.edu Abstract

More information
(/2771526-Searching-the-webabstract.html)

Blocking SQL injection in


Database Stored
Procedures (/2925889-

Blocking SQL injection


in Database Stored
Procedures
Thesis
submitted in partial
fulfillment
of
the
requirements for the degree of
Bachelor of Technology In Computer
science and engineering By Shrinivas

More information
(/2925889-Blocking-sqlinjection-in-database-storedprocedures.html)

Secure Data Storage on


the Cloud using
Homomorphic

Secure Data Storage on


the
Cloud
using
Homomorphic
Encryption
Manoj
Kumar
Mohanty
Department of Computer Science
and Engineering National Institute of
Technology Rourkela Rourkela 769
008, India Secure

More information
(/3132668-Secure-data-storageon-the-cloud-usinghomomorphic-encryption.html)

Link Analysis. Chapter 5.


5.1 PageRank (/5326895Link-analysis-chapter-5-

Chapter 5 Link Analysis


One of the biggest
changes in our lives in
the decade following
the turn of the century
was the availability of efficient and
accurate Web search, through search
engines such as

following question was asked by Kafri and Keren.Is it possible to create a secret sharing scheme in which the secret image I that can
be reconstructed visually by superimposing random grids? Each grid would consist of a transparency, made up of black and white
pixels. Later Naor[34] and Shamir introduced a specific implementation that was named visual secret sharing (VSS). This method can
securely share image information (printed text, handwritten notes, pictures etc.), and it is possible to decode shared secrets by the
human visual system. Based on the secret message (the original image) the VSS scheme generates n images (known as shares)
which can be printed on n transparencies. In a k-out-of-n scheme, there would be n transparencies, and if any k or more than k
transparencies are superimposed, the original secret image I should appear, but no information 7
17 about the original image can be gained if fewer than the threshold[9] number of k transparencies are stacked (k - shares). The
main difference between a traditional threshold scheme and a visual threshold scheme is how the secret is recovered. A traditional
threshold scheme typically involves computations in a finite field; in a visual threshold scheme, the computation is performed by the
human visual system. In both types of schemes the security conditions is the same. 8
18 CHAPTER 2 VISUAL SECRET SHARING 2.. Overview of Visual Secret Sharing Visual cryptography[2],[22] is a cryptographic
technique which allows visual information (Image, text, etc) to be encrypted in such a way that the decryption can be performed by
the human visual system without the aid of computers. Image is a multimedia component sensed by human. The smallest element
of a digital image is pixel. In a 32 bit digital image each pixel consists of 32 bits, which is divided into four parts, namely Alpha, Red,
Green and Blue; each with 8 bits. Alpha part represents degree of transparency. If all bits of Alpha part are '', then the image is fully
transparent. Human visual system acts as an OR function. If two transparent objects are stacked together, the final stack of objects
will be transparent. But if any of them is non-transparent, then the final stack of objects will be nontransparent. Like OR, 2

OR =, considering as transparent and OR =, OR =, OR =, considering as non-transparent. SHARE- SHARE-2 FINAL = = = =


Transparent () Non-Transparent () Figure 2... Human Visual System Visual cryptography[26],[27] scheme (VCS) is basically a secretsharing scheme which means the generation of share images of secret images that are transmitted over the channel. The only
beauty of such scheme is that, the decryption of the secret image requires neither the prior knowledge about cryptography nor
requires any complex computation. The secret image can be obtained only by stacking certain number of shares on to each other. In
the case of black and white images, the original secret image is represented as a pattern of black and white pixels. Each of these
pixels is divided into sub-pixels which themselves are encoded as black and white to produce the share images. The 2
19

20 recovered secret image is also a pattern of black and white sub-pixels which should visually reveal the original secret image if a

qualified set of share images is stacked. It can encrypt a black-and-white secret image into n shares, which are transmitted over the
channel. Depending on the type of threshold scheme certain numbers of shares out of n number are stacked together to get back
the secret image. For example, in a k-out-of-n VSS scheme, the secret is visible only when at least k or more shares are stacked
together. In order to provide perfect secrecy and the maximum clarity of the recovered secret images, most researchers use the
concept of pixel expansion, which was SHARE- ORIGINAL IMAGE RECOVERED IMAGE SHARE-2 Figure 2..2. Example of Visual
Cryptography first introduced by Naor[34] and Shamir to design their visual cryptography[3],[35],[36] schemes. That is, each pixel of
the binary secret image is encoded into m sub22
21 pixels on each share, where m is called the parameter of pixel expansion of the scheme. By analyzing any block of m sub-pixels
of the forbidden set of shares, one cannot distinguish which color was used in the secret pixel. But when the shares of the qualified
set are stacked up, the block of any m sub-pixels corresponding to a black secret pixel will provide more black sub-pixels than a
block of sub-pixel corresponding to a white secret pixel. Thus, the blocks corresponding to black secret pixels will have more
blackness and those blocks corresponding to white secret pixels will have less blackness. This property makes it possible for
someone to distinguish black and white blocks, and hence the secret image can reveal the stacked image by losing some contrast of
the original secret image. 2.2. Related Works in Visual Cryptography In 995, Naor and Shamir introduced a very interesting and
simple cryptographic method called visual cryptography[2],[36] to protect secrets. Basically, visual cryptography has two important
features. The first feature is its perfect secrecy and the second is its decryption method which requires neither complex decryption
algorithms nor the aid of computers. It uses only human visual system to identify the secret from the stacked image of some
authorized set of shares. Therefore, visual cryptography is a very convenient way to protect secrets 23
22 when computers or other decryption devices are not available. The simple decryption method is the reason that attracts many

researchers to make further detailed enquiries in this research area. Nowadays, many related methods concerning the theory and
the applications of visual cryptography are proposed. An extended visual cryptography scheme (EVCS) was proposed by Ateniese et
al.. Extended[9],[] visual cryptography[],[2] schemes permits the construction of visual secret sharing schemes within which the
shares are meaningful as opposed to having random noise on the shares. After the sets of shares are superimposed, this
meaningful information disappears and the secret is recovered. This is the basis for the extended form of visual cryptography. The
image size invariant visual cryptography[3],[4] was proposed by Ito et al. The traditional visual cryptography schemes employ pixel
expansion. In pixel expansion, each share is m times the size of the secret image. Thus, it can lead to the difficulty in carrying these
shares and consumption of more storage space. Ito's scheme removes the need for this pixel expansion. That is, the reconstructed
image is identical to the original image. There are also some other studies which focus on the methods without pixel expansion. In
996, Naor and Shamir proposed an alternative VCS model for improving the contrast. In 999, Blundo et al. analyzed the contrast of
the reconstructed image in k-out-of-n VCS schemes. Blundo[5] et al. gave a complete 24
23 characterization of 2-out-of-n VCS schemes having optimal contrast and minimum pixel expansion in terms of certain balanced
incomplete block designs. Blundo et al.'s research results are valuable for the researchers who are interested in the area of visual
cryptography[6],[7]. Viet and Kurosawa proposed a VCS with reversing, in which the participants are also allowed to reverse their
transparencies. But in this scheme there is a loss of resolution, since the number of pixels in the reconstructed image is greater than
that in the original secret image. The concept of recursive hiding[29] of secrets in visual cryptography was proposed by
Gnanaguruparan and Kak. This provides a method of hiding secrets recursively in the shares of threshold schemes, which permits
an efficient utilization of data. In recursive hiding[29] of secrets, several additional messages can be hidden in one of the shares of
the original secret image. By using recursive threshold visual cryptography in network application, network load can be reduced.
Recently, visual cryptography schemes were also proposed to deal with gray-level images. The use of halftoning[2] techniques make
it possible that the readymade schemes designed for binary secret images can be directly applied to gray-level images. The different
gray-level visual cryptography schemes are studied by researchers. 25
24 Applying visual cryptography techniques to colour images is a very important area of research because it allows the use of
natural colour images. Color images are also highly popular and have a wider range of uses when compared to other image types. In
997, Verheul and Van Tilborg proposed a colored visual cryptography scheme. In 2, Yang and Laih proposed a different construction
mechanism for the colored visual cryptography scheme. They argued that their method can be easily implemented and can get
much better block length than Verheul and Van Tilborg's scheme. A major common disadvantage of the above reviewed colored VCS
schemes is that the number of colors and the number of sub-pixels determine the resolution of the revealed secret image. If many
colors are used, the sub-pixels require a large matrix to represent it. Also, the contrast of the revealed secret image will go down
drastically. Consequently, how to correctly stack these shared transparencies and recognize the revealed secret image are the major

More information
(/5326895-Link-analysischapter-5-5-1-pagerank.html)

Automating Operational
Business Decisions Using
Artificial Intelligence: an

Automating Operational
Business
Decisions
Using
Artificial
Intelligence:
an
Industrial Case Study
Master
s
thesis
in
Software
Engineering and Technology PIER
JANSSEN
MACIEJ
WICHROWSKI
Department of Computer

More information
(/3712881-Automatingoperational-business-decisionsusing-artificial-intelligence-anindustrial-case-study.html)

Mobile application
development to enhance
higher education

MSc
Thesis
Mobile
application
development
to
enhance
higher
education
lectures
Konstantinos Semertzidis Submitted
in partial fulfilment for the degree of
MSc in Computing Supervisor: Dr.
George Despotou

More information
(/4923613-Mobile-applicationdevelopment-to-enhancehigher-education-lectures.html)

Exploratory Visualization
of Data with Variable
Quality (/5858712-

Exploratory
Visualization of Data
with Variable Quality by
Shiping Huang A Thesis
Submitted
to
the
Faculty
of
the
WORCESTER
POLYTECHNIC INSTITUTE In partial
fulfillment of the requirements for
the Degree

More information
(/5858712-Exploratoryvisualization-of-data-withvariable-quality.html)

Chapter 1. Introduction
MULTIMEDIA SIGNAL
PROCESSING 2005 D.

Chapter 1 MULTIMEDIA
SIGNAL
PROCESSING
Introduction 2005 D.
BARBA 1 Introduction
Digital image & video
processing : a new domain and
technology
Mathematics
of
information - Signal processing Electronic

issues. Almost all color visual cryptography schemes proposed required few computations. Recently, more and more applications of
visual cryptography, such as authentication, human identification, copyright protection, watermarking, mobile ticket validation,
visual signature checking etc. are introduced. 26
25 The print and scan application of VCS can be found in. In this application, scan the shares into a computer system and then
digitally superimpose their corresponding shares. This would make possible secure verification of e-tickets or other documents. 2.3.
Pixel Division In this section, we shall review the basic visual cryptography scheme proposed by Naor[34] and Shamir. Here a secret
black and white image is divided into two grey images. In order to share a secret black and white image, the concept of their scheme
is to transform one pixel into two sub-pixels and divide each subpixel two color regions. The sub-pixels are half white and half black.
(a) (b) (c) (d) (a) Black () (b) White () (c) Left Black () (d) Right Black () Figure 2.3.. Different types of pixels 27
26 For example, this figure represents four different types of pixels. The first is a white pixel, the next is a black pixel, and the last
two are grey pixels. Note that in the grey pixels, the black and white portions are different. Let us call these pixels as RB and LB
pixels respectively. We represent a white pixel by, black by, LB-pixel by and RB-pixel by. They can be thought of as modified version
of pixels to be used in shares. 2.4. Superposition of Pixels If we stack two LB pixels (or two RB pixels) we get nothing new, whereas, if
we stack an LB pixel and an RB pixel, we get a black pixel. This can be shown as in the following figure. We can see that by the
representation used for pixels, the superposition of two pixels can be thought of as if a binary "OR" operation. = V= = V= = V= = V=
Figure 2.4.. Superposition of two pixels 28
27 2.5. Visual Cryptography Schemes The visual cryptography schemes (VCS) describe the way in which an image is encrypted and
decrypted. There are different types of visual cryptography schemes. For example, there is the k-out-of-n scheme that says n shares
will be produced to encrypt an image, and k shares must be stacked to decrypt the image. If the number of shares stacked is less
than k, the original image is not revealed. The other schemes are 2-out-of-n and n-out-of-n VCS. The most of the constructions of
visual cryptography schemes are realized using two n X m matrices, S and S, called basis matrices. 2.5.. The Construction of 2-outof-2 VCS. ORIGINAL IMAGE SHARE- FINAL IMAGE SHARE-2 = = = = Figure 2.5.. Pixel Pattern for (2,2) VCS 29
28 Let us consider a binary secret image S containing exactly m pixels. The dealer creates two shares (binary images), S and S2,
consisting of exactly two pixels for each pixel in the secret image as shown in the following figure. If the pixel in S is white, the dealer
randomly chooses one row from the first two rows of the table. Similarly, if the pixel in S is black, the dealer randomly chooses one
row from the last two rows of the table. To analyze the security[2],[29] of the 2-out-of-2 VCS, the dealer randomly chooses one of the
two pixel patterns (black or white) from the table for the shares S and S2. The pixel selection is random so that the shares S and S2
consist of equal number of black and white pixels. Therefore, by inspecting a single share, one cannot identify the secret pixel as
black or white. This method provides perfect security. The two participants can recover the secret pixel by superimposing the two
shared sub-pixels. If the superimposition results in two black sub-pixels, the original pixel was black; if the superimposition creates
one black and one white sub-pixel, it indicates that the original pixel was white. In visual cryptography, the white pixel is
representing by and the black pixel by. For the 2-out-of-2 VCS, the basis matrices, S and S are designed as follows: S S 3
29 There are two collections of matrices, C for encoding white pixels and C for encoding black pixels. Let C and C be the following
two collections of matrices: = { ( )} = { ( )} Where (s) and (s) represents the collection of all matrices obtained by permuting the
columns of matrices S and S respectively. That is, C { C {, } and, } To share a white pixel, the dealer randomly selects one of the
matrices in C, and to share a black pixel, the dealer randomly selects one of the matrices in C. The first row of the chosen matrix is
used for share and the second row for share2. 3
30 ORIGINAL IMAGE ADDING NOISE TO IMAGE SHARE- SHARE-2 RECOVERED IMAGE Figure 2.5.2. (2,2) VCS with Consistent Image
Size The problem that arises with this scheme is that for every pixel encoded from the original image into two sub-pixels and placed
on each share in a horizontal or vertical fashion (here horizontal), the shares have a size of s x 2s if the secret image is of size s x s.
Hence there is distortion. 32
31 2.5.2. The Construction of k-out-of-n VCS The general k out of n visual cryptography[7],[8] schemes were introduced by Naor[34]

and Shamir. However, their constructions were quite inefficient, since a large number of sub-pixels were needed to encode a given
pixel. A much more efficient construction mechanism was introduced by Ateniese et al. This construction significantly reduces the
number of subpixels needed for encoding. Consider a starting n x l matrix SM (n, l, k) whose entries are elements of a ground set {,,.,
}, with the SM(n, l, k), then there exists a k-out-of- n VCS with pixel expansion m = l X 2k-. The n x m basis matrices S and S are
constructed by respectively replacing the symbols {,,., } with the st,2nd,, kth rows of the corresponding basis matrices of the k-outof-k VCS. 2.5.2.. The Basis Matrices for k-out-of-n VCS. The k-out-of-n visual cryptography can be illustrated by a 3-out-of- 6VCS case.
The starting matrix SM designed as: a a a SM 2 a2 a3 a3 33 a2 a3 a a3 a a2 a3 a2 a3 a a2 a
32 Substituting the rows of the basis matrix S of 3-out-of-3 VCS for a, a2, a3 in SM to obtain the basis matrix S in 3-out-of-6 VCS.
That is: S Similarly the basis matrix S is obtained by replacing a, a2, a3 of SM by the rows of the basis matrix S of 3-out-of-3 VCS: S
The basis matrices S and S are met the three conditions. The matrices C and C can be designed as: C { ( S )} { (,,,,,,,,,,, )} 34
33 C { ( S )} { (,,,,,,,,,,, )} The following figures depict 3-out-of-6 VCS using the above matrices C and C. ORIGINAL IMAGE SHARE-4
SHARE- SHARE-2 SHARE-5 SHARE-6 Figure 2.5.3. (3,6) VCS 35 SHARE-3 RECOVERED IMAGE
34 CHAPTER 3 IMAGE HALFTONE TECHNOLOGY 3.. Overview The perceived quality of a printed image depends on the halftone
algorithm and the printing process. The focus of this study was theoretical and experimental research on topics in the fields of half
toning, image processing and compression, and image quality. Several commonly used dither algorithms, including clustereddot
dither and dispersed-dot dither, are evaluated. Next, images halftoned with the dither algorithms and the Floyd-Steinberg[],[4] error
diffusion algorithm are compared in the frequency domain. Finally, a perception-based halftone image distortion measure is
proposed. The halftone[2] algorithms are ranked according to the proposed distortion measure. The effects of using human visual
models with different peak sensitivity frequencies are examined. A new class of dithering algorithms for black and white (B/W)
images is presented. The basic idea behind the technique is to divide the image into small 37
35 blocks and minimize the distortion between the original continuous-tone image and its low-pass-filtered halftone. This
corresponds to a quadratic programming problem with linear constraints, which is solved via standard optimization techniques.
Examples of B/W halftone[2] images obtained by this technique are compared to halftones obtained via existing dithering algorithm
and error diffusion algorithm. This paper proposes a deterministic importance sampling[3] algorithm for complex integrands. The
idea is based on the recognition that halftoning algorithms are equivalent to importance sampling if the gray-scale image and a
resulting white pixel are considered as the target importance function and the sampling position, respectively. We adopt the FloydSteinberg[],[4] halftoning algorithm, extend it to higher dimensions, and rephrase it as a sampling method. As the Floyd-Steinberg[],
[4] halftoning places a sample also considering where other samples are located, our sampling[3] algorithm distributes samples in a
stratified way. Halftone[2] image data hiding can be divided into two classes. One class embeds digital data into halftone image such
that the data is invisible but can be read by applying some extraction process on the halftone image. 38

More information
(/3734060-Chapter-1introduction-multimedia-signalprocessing-2005-dbarba-1.html)

JCR or RDBMS why,


when, how? (/41087-Jcror-rdbms-why-when-

JCR or RDBMS why,


when,
how?
Bertil
Chapuis
12/31/2008
Creative
Commons
Attribution
2.5
Switzerland License This paper
compares java content repositories
(JCR)
and
relational
database
management systems

More information
(/41087Jcr-or-rdbms-why-whenhow.html)

Universiteit Leiden. ICT in


Business (/2785202Universiteit-leiden-ict-in-

Universiteit Leiden ICT


in Business Data Quality
Management
A
Solvency II Perspective
Name Student-no : S.S.
Altinay Soyer : s1077260 Date : 1st
supervisor : Peter van der Putten 2nd
supervisor: Emiel

More information
(/2785202-Universiteit-leidenict-in-business.html)

INFORMATION
FORAGING THEORY AND
APPLICATION TO

INFORMATION
FORAGING
THEORY
AND APPLICATION TO
COMPUTER FORENSICS
Yusra
Shams
B.S.,
National University of Computer &
Emerging Sciences, Pakistan, 2006
PROJECT
Submitted
in
partial
satisfaction of the

More information
(/2378816-Informationforaging-theory-andapplication-to-computerforensics.html)

Data Hiding: Current


Status and Key Issues
(/4145680-Data-hiding-

International Journal of
Network Security, Vol.4,
No.1, PP.1 9, Jan. 2007 1
Data Hiding: Current
Status and Key Issues
Nan-I Wu 1 and Min-Shiang Hwang 2
(Corresponding author: Min-Shiang
Hwang) Institute

36 3.2. Related Works in Image Halftone A plenty number of work has been done on image dithering algorithm. An image dithering
algorithm first published in 976 by Robert W. Floyd and Louis Steinberg[],[4], which is known as Floyd Steinberg[],[4] dithering. 3.2..
Idea About Halftone Halftone[2] is the reprographic technique that simulates continuous tone[6] imagery through the use of dots,
varying either in size, in shape or in spacing. Halftone" can also be used to refer specifically to the image that is produced by this
process. Halftoning[2] is a technique to render gray-scale images on a black and white display. The idea is to put more white points
at brighter areas and less points at darker parts. The spatial density of white points in a region around a pixel is expected to be
proportional to the gray level of that particular pixel. If we consider the gray level of the original image to be a scalar importance
function and the white pixels of the resulting image to be sample locations, then we can realize that halftoning is equivalent to a
deterministic importance sampling[3] algorithm. This holds for an arbitrary halftoning 39
37 algorithm, including the random and ordered halftoning methods that add random noise or a periodic pattern to the original
image before quantization, or, for example, the Floyd-Steinberg[],[4] algorithm. 3.2.2. Halftoning Methods The following halfoning
methods are very popular. 3.2.2.. Dithering Dither is an intentionally applied form of noise used to randomize quantization error,
preventing large-scale patterns such as color banding in images. Figure 3.2.. Dithering Method 4
38 n Cell Dither 5 4 9 6 5 4 8 7 2 2 3 3 n gray values 255 2 n equally spaced threshold values Figure 3.2.2. Threshold values in Dither
Cell Figure 3.2.2. Example of Threshold values in Dither Cell 4
39 3.2.2.2. Direct Binary Search Direct binary search is an iterative method to refine a halftone to improve visual quality. Direct
binary search toggles pixels and swaps pixels among neighboring pixels to minimize a distortion measure, such as a weighted mean
square error, between the halftone and the original image. The weighting is generally based on a linear spatially-invariant model of
the human visual system. Given an error metric: d(i(x,y),b(x,y)) example: d(i,b) = ((I(x,y)-b(x,y))2) Initialize binary image b(x,y)
Randomly chose a pixel (x,y) in b(x,y) ~ ~ if d(i, b ) < d(i,b) then assign b = b ~ ~ where b is b except for b (x,y) =-b(x,y) Repeat last step
until d(i,b) - d(i,b) is small. Error metric can be smart for example based on Human Visual System. 42
40 Figure 3.2.3. Direct Binary Search 3.2.2.2. Error Diffusion Error diffusion was introduced in 976 by Floyd and Steinberg[],[4].
Error diffusion produces halftones of much higher quality than classical screening, with the trade-off of requiring more computation
and memory. Screening amounts to pixel-based thresholding, whereas error diffusion requires a neighborhood operation and
thresholding. The neighbourhood operation distributes the quantization error due to thresholding to the unhalftoned neighbours of
the current pixel. The term "error diffusion" refers to the process of diffusing the quantization error along the path of the image
scan. In the case of a raster scan, the quantization error diffuses across and down the image. "Qualitatively speaking, error diffusion
43
41 accurately reproduces the gray level in a local region by driving the average error to zero through the use of feedback" The
generalized Error Diffusion Algorithm. Choose an enumeration of the pixels. 2. At each pixel location, add to the input I(i) a weighted
average of the previous errors in some neighborhood to obtain the modified input M(i). 3. Choose O(i) an element of V closest to M
(i). 4. Define the error e(i) as M(i)-O(i). Algorithm is not necessarily deterministic. ORIGINAL IMAGE HALFTONED IMAGE Figure 3.2.3.
Error Diffusion Image Result 44
42 3.3. Floyd-Steinberg Halftoning Algorithm The Floyd-Steinberg[],[4] halftoning provides better results than random or ordered
halftoning, because it makes not only local decisions, but the gathered information is also distributed in neighbouring pixels. It
means that it takes other samples into account as well, so the sample positions are stratified, making the resulting image smoother
and reducing the noise compared to random or dithered approaches. The Floyd-Steinberg[],[4] Error Diffusion Pseudo code is as
follows: for each y from top to bottom for each x from left to right oldpixel := pixel[x][y] newpixel := find_closest_palette_color
(oldpixel) pixel[x][y] := newpixel quant_error := oldpixel - newpixel pixel[x+][y] := pixel[x+][y] + 7/6 * quant_error pixel[x-][y+] := pixel
[x-][y+] + 3/6 * quant_error pixel[x][y+] := pixel[x][y+] + 5/6 * quant_error pixel[x+][y+] := pixel[x+][y+] + /6 * quant_error Due to its
good properties and automatic stratification, we developed our sampler based on the Floyd-Steinberg [],[4] method. Random
dithering, which is similar to importance resampling, was implemented for 45
43 comparison. We expected the same improvement in importance sampling[3] as provided by the Floyd-Steinberg[],[4] halftoning
over random dithering. As stated in the introduction, there are several image halftoning techniques or approaches. Among these
methods Error Diffusion and Dot Diffusion display pretty good performance. In Error Diffusion halftoning, the quantization error at
each pixel is filtered and fed back to the input in order to diffuse the error among neighbouring grayscale pixels. Here I used FloydSteinberg Error diffusion technique to diffuse the error to neighbouring pixels. The Floyd-Steinberg error diffusion filter is shown in
figure, where X denotes the current pixel. The error diffusion algorithm transforms a gray scale image, I, with pixel values in the
interval [.,.], to a black-and-white image. ORIGINAL IMAGE HALFTONED IMAGE Figure 3.3.. Floyd-Steinberg Error Diffusion Image
Result 46
44 CHAPTER 4 DISCUSSION ON THE EXPERIMENT PERFORMED 4.. Concept Adapted 4... Extension of k,n Visual Cryptography
Scheme In visual secret sharing, the message bit consists of a collection of black and white pixels i.e. it is assumed to be a binary
image and each pixel is handled separately. Each original pixel appears in n modified versions (called shares) of the image, one for
each transparency. Each share consists of m black and white sub-pixels. Each share of the sub-pixels is printed on the transparency
in close proximity (to best aid the human perception, they are typically arranged together to form a square with m selected as a
number). The resulting structure can be described by a [n x m] (n = number of shares, m = pixel expansion) Boolean matrix S = (Sij)
nXm where Sij = if and only if the jth sub-pixel in the ith share (transparency) is black and Sij = 48
45 if and only if the jth sub-pixel in the ith share (transparency) is white. When transparencies i, i2,, ir are stacked together in a way
which properly aligns the sub-pixels, we see a combined share whose black sub-pixels are represented by the Boolean OR of rows i,
i2,, ir in S. The grey level of this combined share is proportional to the Hamming weight H (V) of the OR ed m-vector V. This grey level
is interpreted by the visual system of the users as white if H(V ) < d-.m and as black if H(V ) > d for some fixed threshold d m and
relative difference >. Now, (k,n) Extended Visual Cryptography[7] scheme allows the construction of visual secret sharing scheme
within which the shares are meaningful as opposed to having random noise on the shares. After the sets of shares are
superimposed, this meaningful information disappears and the secret is recovered. 49
46 4.2. Proposed Algorithm In this experiment two techniques halftone and k, n VCS have been merged to obtain a better result.
The steps of the proposed algorithm are as follows: Step: K, Input the threshold value for the no. of share required to reconstruct
the image. Step2: N, Input the maximum no. of share. Step3: Input the index of share to reconstruct original image. Step4: Input
Image Step5: Read the Image data Step6: Making halftone of the original image Step7: Creating the maximum N no of share of the
halftone image. Step8: Calculating the required image for reconstruction of original image. Step9: Recovering the original image. 5
47 4.3. System Block Diagram ORIGINAL IMAGE SHARED IMAGE Applying image halftone technique Applying (k,n) VCS
reconstruction algorithm SHARED IMAGE 2 HALFTONE IMAGE SHARED IMAGE 3 Applying (k,n) VCS Sharing Algorithm SHARED IMAGE
4 SHARED IMAGE N Figure 4.3.. Proposed system block diagram 5 RECOVERED IMAGE

More information
(/4145680-Data-hiding-currentstatus-and-key-issues.html)

Thanh-Toan DO.
prpare l unit de
recherche IRISA

THSE / UNIVERSIT DE
RENNES 1 sous le sceau
de
l
Universit
Europenne
de
Bretagne pour le grade
de DOCTEUR DE L UNIVERSIT DE
RENNES 1 Mention : Informatique
cole doctorale Matisse prsente
par Thanh-Toan

More information
(/4945525-Thanh-toan-dopreparee-a-l-unite-derecherche-irisa-umr6074institut-de-recherche-eninformatique-et-systemesaleatoires.html)

A Security Architecture
for Mobile Agent System
(/1456308-A-security-

A Security Architecture
for
Mobile
Agent
System by PENG FU
B.Eng.,
Tsinghua
University China, 1999 A
THESIS SUBMITTED IN PARTIAL
FULFILMENT OF THE REQUIREMENTS
FOR THE DEGREE OF MASTER OF
SCIENCE in THE

More information
(/1456308-A-securityarchitecture-for-mobile-agentsystem.html)

C3P: Context-Aware
Crowdsourced Cloud
Privacy (/779011-C3p-

C3P:
Context-Aware
Crowdsourced
Cloud
Privacy Hamza Harkous,
Rameez Rahman, and
Karl
Aberer
cole
Polytechnique Fdrale de Lausanne
(EPFL)
hamza.harkous@epfl.ch,
rrameez@gmail.com,
karl.aberer@epfl.ch

More information
(/779011C3p-context-awarecrowdsourced-cloudprivacy.html)

1 NOT ALL ANSWERS


ARE EQUALLY (/5646961-not-all-answers-are-

1 NOT ALL ANSWERS


ARE EQUALLY GOOD:
ESTIMATING
THE
QUALITY OF DATABASE
ANSWERS
Amihai
Motro, Igor Rakov Department of

48 4.4. Experimental Results K=4, N=8 Figure 4.4.. Original Image for Experiment SHARE- SHARE-2 SHARE-3 SHARE-4 SHARE-5
SHARE-6 SHARE-7 SHARE-8 Figure 4.4.2. Generated Halftone Share of Original Image Figure 4.4.3. Reconstructed Image 52
49 4.5. Advantages. Simple to implement 2. No Decryption algorithm required as Human Visual System used. 3. Lower
computational cost. 4. As each share is a halftone share, fewer details will be transmitted per share. 4.6. Limitations. The image
quality is not maintained. 2. Perfect alignment of the encrypted shares are troublesome. 3. This proposed system is restricted only
to grayscale images. For colored images, additional computations have to be done. 4. This scheme is applicable for only grayscale
(with.bin extensions) images. 53
50 4.7. Summary Visual cryptography provides a secure way to transfer images. The advantage of visual cryptography is that it
exploits human eyes to decrypt secret images with no computation required.. Visual Cryptography allows easy decoding of the
secret image by a simple stacking of the printed share transparencies. However, there are some practical issues that need careful
consideration. The transparencies should be precisely aligned in order to obtain a clear reconstruction of the secret image. There is
also some unavoidable noise introduced during the printing process. Furthermore, the stacking method can only simulate the OR
operation which always leads to a loss in contrast. The loss of contrast can be rectified by further processing. As visual cryptography
schemes operate at the pixel levels, each pixel on one share must be matched correctly with the corresponding pixel on the other
share. Superimposing the shares with even a slight change in the alignment may results in a drastic degradation in the quality of the
reconstructed image. The thesis described Embedded Extended (k,n) VCS for black and white images. In this scheme the original
image is converted to halftone image and then it is divided into equal dimension of shares. This scheme can reconstruct the secret
image precisely and has low computational complexity. The probability of reconstruction of the image from individual shares is very
less so this method ensures satisfactory results in the field of security. The drawback of this scheme is that it works with only
grayscale images. So this scheme can be extended to work with other image formats. Also emerging technique like, color visual
secret sharing scheme can be used along with this algorithm. The concept of general access structure can also be used with this
scheme. Also we can use key based approach for secret share. 54
51 CHAPTER 5 APPENDICES 5.. Appendix : Hardware and Software Requirements Processor Dual Core, 2.4GHz Hard Disk 5 GB RAM

4GB Keyboard & Mouse Logitech Table : Hardware Used Operating System Windows XP SP2 IDE Matlab 22 Table 2: Software Used 5..
Appendix 2: Program List %% Main Function function ImageSharing clear; close all; Height = 256; Width =256; t = 4; w = 8; Users =
[5,6,7,8]; base = 257; Sub_width = Width/t^(.5); Sub_height = Height/t^(.5); 56
52 if(length(users)<t) error('invalid length of Users'); end; if(mod(sub_height,) ~= ) error('invalid length of Sub height'); end;
Im_Name = 'lena.bin'; [Im_linear, Im_Square] = ReadImage(Im_Name,Height,Width); P_Im = GetPreparedIm(Im_linear,t);
Shadow_Image
=
GetShadow_Image(P_Im,w,base);
a
=
find(shadow_image>256);
ShowShadowImage
(Shadow_Image,Sub_width,Sub_height);
RequiredShadowImage
=
GetRequiredShadowImage(Shadow_Image,Users);
RecoveredImage = RecoverImage(RequiredShadowImage,Users,Height,Width,base); figure; rec_im=uint8(recoveredimage); imshow
(rec_im); imwrite(rec_im,'recovered_im.bmp','bmp'); title('recovered Image'); 57
53 BIBLIOGRAPHY [] R. Floyd and L. Steinberg, An adaptive algorithm for spatial greyscale. Journal of the Society for Information
Display. pp. 36-37, 976. [2] M. Mese and P. P. Vaidyanathan, Optimized Halftoning Using Dot Diffusion and Methods for Inverse
Halftoning. IEEE Trans. On image processing. Vol. 9, No. 4, pp. 69-79, 2. [3] [ARBJ3]S. Agarwal, R. Ramamoorthi, S. Belongie, and H.
W.Jensen. Structured importance sampling of environment maps. ACM Trans. Graph., 22(3):65 62, 23. [4] R. Floyd and L. Steinberg,
An adaptive algorithm for spatial greyscale. Journal of the Society for Information Display. pp. 36-37, 976. [5] Moni Naor and Adi
Shamir. Visual cryptography. In Proceedings of Advances in Cryptology {EUROCRYPT 94, LNCS Vol. 95, pages {2. Springer-Verlag, 994.
[6] B. E. Bayer, An optimum method for two level rendition of continuous tone pictures.proc. Int. Conf. on Communications. New
York, pp. 26- - 26-5, 973. [7] A. Shamir, How to Share a Secret, Communications of the ACM, vol.22, no., pp. 62-63, 979. [8] M. Naor
and A. Shamir, Visual Cryptography, Advances in Cryptology-Eurocrypt'94, LNCS 95,pp. -2, 995. [9] Ateniese, G., Blundo, C., De Santis,
A., Stinson, D.R.: Extended schemes for visual cryptography. Theoretical Computer Science 25,pp. -6,996. [] G. Ateniese, C. Blundo, A.
D. Santis, and D. Stinson, Constructions and bounds for visual cryptography, Proceeding of the 23 rd International Colloquium on
Automata, Languages and Programming (ICALP '96), pp.46 428, 996. [] G. Ateniese, C. Blundo, A. D. Santis, and D. Stinson. Visual
cryptography for general access structures, Information and Computation, 29(2):866, 996. [2] C. Blundo, Alfredo De Santis and
Douglas R. Stinson, On the contrast in visual cryptography schemes, Journal of Cryptology, 2, pp. 26-289,999. [3] C. Blundo, A. D.
Bonis, and A. De Santis. Improved schemes for visual cryptography, Designs, Codes and Cryptography, 24(3), pp.255-278, 2. 59
54 [4] C. Blundo, P. D'arco, A. De Santis, and D. R. Stinson, Contrast optimal threshold visual cryptography, SIAM Journal of Discrete
Math.6(2), pp. 22426, 23. [5] C. Blundo, A. De Santis, and M. Naor. Visual cryptography for gray-level images, Information Processing
Letters, 75 (6), pp. 255259, 2. [6] Alfredo De Santis, On Visual Cryptography Schemes, Proc. of the IEEE ITW 998, pp. 54-55, 998. [7] M.
Nakajima and Y. Yamaguchi, Extended visual cryptography for natural images, Journal of WSCG, pp. 33 3, 22. [8] D.R.Stinson, Visual
Cryptography or Seeing is Believing, www.cacr.math.uwaterloo.ca/~dstinson.index.html, 22. [9] Doug Stinson, Visual cryptography
and threshold schemes, Dr. Dobb's Journal, pp. 36-43, April 998. [2] W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual
Cryptography to Financial Documents, technical report TR, Florida State University (2) [2] D Chaum, Secret-ballot receipts: True votervariable elections, IEEE Security and Privacy, 24, 38-47. [22] F. van der Heijden, Image Based measurement Systems, John Wiley &
Sons, Chichester (994). [22] Ito, R., Kuwakado, H., Tanaka, H, Image size invariant visual cryptography. IEICE Transactions E82-A(),pp.
272 277 999. [23] Yang, C.N., Chen, T.S., Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern
Recognition Letters 26(2), pp. 93_26, 25. [24] T. Hofmeister, M. Krause, and H. U. Simmon, Contrastoptimal k out of n secret sharing
schemes in visual cryptology, Theoretical Computer Science, pp. 47_485, 2. [25] Ching-Nung Yang and Tse-Shih Chen, Visual Secret
Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions, ICIAR 26, LNCS 44, pp. 468 479, 26.
[26] Duong, Q.V., Kurosawa, K.: Almost Ideal Contrast Visual Cryptography with Reversing, CT-RSA 24, LNCS 2964, pp. 353 365, 24.
[27] M. Gnanaguruparan and Subhash Kak, Recursive hiding of secrets in visual cryptography, Cryptologia, vol. 26 (), pp. 68-76, 22. 6

View more

Information and Software Systems


Engineering
George
Mason
University Fairfax, VA 22030-4444

More information
(/5646961-not-all-answers-areequally.html)

Encryption and Secure


Computer Networks
(/1274219-Encryption-

Encryption and Secure


Computer
Networks
GERALD J. POPEK AND
CHARLES
S.
KLINE
Unwerstty of Cahfornta
at Los Angeles, Los Angeles,
Caltfornta 90024 There is increasing
growth in the number of computer
networks

More information
(/1274219-Encryption-andsecure-computernetworks.html)

A SYSTEMATIC
FRAMEWORK TO
IMPROVE KNOWLEDGE

A
SYSTEMATIC
FRAMEWORK
TO
IMPROVE KNOWLEDGE
MANAGEMENT
THROUGH
INFORMATION
TECHNOLOGY
A
Thesis presented to the Faculty of the
Graduate School University of
Missouri-Columbia
In
Partial
Fulfillment Of

More information
(/1964313-A-systematicframework-to-improveknowledge-managementthrough-informationtechnology-university-ofmissouri-columbia-in-partialfulfillment.html)

Efficient Query
Optimization for
Distributed Join in

Efficient
Query
Optimization
for
Distributed
Join
in
Database Federation by
Di Wang A Thesis
Submitted to the Faculty of the
Worcester Polytechnic Institute In
partial
fulfillment
of
the
requirements for

More information
(/3411682-Efficient-queryoptimization-for-distributedjoin-in-databasefederation.html)

Large-scale Image
Processing Using
MapReduce (/1953217-

TARTU
UNIVERSITY
Faculty of Mathematics
and Computer Science
Institute of Computer
Science
Computer
Science Karl Potisepp Large-scale
Image Processing Using MapReduce
M.Sc. Thesis (30 ECTS) Supervisor:

More information
(/1953217-Large-scale-imageprocessing-usingmapreduce.html)

Application Performance
Monitoring of a scalable
distributed Java web-

FAKULTT
FR
INFORMATIK
DER
TECHNISCHEN
UNIVERSITT
MNCHEN
Bachelorarbeit
in
Informatik
Application Performance Monitoring
of a scalable distributed Java webapplication in a cloud infrastructure
Michael

More information
(/4966785-Applicationperformance-monitoring-of-ascalable-distributed-java-webapplication-in-a-cloudinfrastructure.html)

Graphical User Interface


for Intrusion Detection in
Telecommunications

Aalto University School


of
Science
Degree
Programme
of
Computer Science and
Engineering Alexander
Zahariev Graphical User Interface for
Intrusion
Detection
in
Telecommunications
Networks
Master s Thesis

More information
(/4961982-Graphical-userinterface-for-intrusiondetection-intelecommunicationsnetworks.html)

Role Based Access


Control: Adoption and
Implementation in the

Role
Based
Access
Control: Adoption and
Implementation in the
Developing World By
Loy
A.K.
Muhwezi
Master s Thesis in Computer Science
Thesis number: Supervised By Dr.
Martijn Oostdijk Radboud University

More information
(/4739144-Role-based-accesscontrol-adoption-andimplementation-in-thedeveloping-world.html)

Complexity Reduction for


Large Image Processing
(/5198507-Complexity-

598
IEEE
TRANSACTIONS
ON
SYSTEMS, MAN, AND
CYBERNETICS PART B:
CYBERNETICS, VOL. 32,
NO. 5, OCTOBER 2002 Complexity
Reduction
for
Large
Image
Processing Nikhil R. Pal, Senior
Member, IEEE, and James C.

More information
(/5198507-Complexityreduction-for-large-imageprocessing.html)

2016 DocPlayer.net Privacy Policy (/support/privacy-policy/) | Terms of Service (/support/terms-of-service/) | Feedback


(/support/feedback/)

Вам также может понравиться