完整後設資料紀錄
DC 欄位語言
dc.contributor.authorShyu, ShyongJian
dc.contributor.authorChuang, Chun-Chieh
dc.contributor.authorChen, Ying-Ru
dc.date.accessioned2009-06-02T07:06:28Z
dc.date.accessioned2020-05-25T06:47:25Z-
dc.date.available2009-06-02T07:06:28Z
dc.date.available2020-05-25T06:47:25Z-
dc.date.issued2009-02-10T06:28:53Z
dc.date.submitted2009-02-10
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/11142-
dc.description.abstractMost secret image sharing schemes produce shadows with an equal size including the well know Shamir’s and Thien-Lin’s approaches that are based upon polynomial interpolation. In this paper we utilize Chinese remainder theorem to design a novel threshold secret image scheme which produces shadows with different sizes. To share an image secretly among n participants, our scheme determines n relative prime moduli based upon which the image is encoded into n shadows which are distributed to the n participants such that every group of r participants could recover the image by using their shadows and moduli, while any group of less than r participants cannot. Since a shadow is a collection of the remainders of its corresponding modulus in our scheme, the size of the shadow is dependent on that of the modulus. Our scheme is more flexible then those in the literature due to the reason that by choosing a proper set of relative prime moduli the dealer is able to distribute shadows with different sizes to participants with different degrees of importance.
dc.description.sponsorship淡江大學,台北縣
dc.format.extent6p.
dc.relation.ispartofseries2008 ICS會議
dc.subjectThreshold structure
dc.subjectSecret image sharing
dc.subjectSecret sharing
dc.subjectChinese remainder theorem.
dc.subject.otherInformation Security
dc.titleSharing an Image with Variable-size Shadows
分類:2008年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002008000084.pdf658.45 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。