• Title/Summary/Keyword: visual sharing

Search Result 142, Processing Time 0.028 seconds

Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection

  • Fan, Tzuo-Yau;Chao, Her-Chang;Chieu, Bin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6177-6200
    • /
    • 2018
  • In order to achieve the goal of protecting medical images, some existing watermark techniques for medical image protection mainly focus on improving the invisibility and robustness properties of the method, in order to prevent unnecessary medical disputes. This paper proposes a novel copyright method for medical image protection based on visual secret sharing (VSS) and cellular automata transform (CAT). This method uses the protected medical image feature as well as VSS and a watermark to produce the ownership share image (OSI). The OSI is used for medical image verification and must be registered to a certified authority. In the watermark extraction process, the suspected medical image is used to generate a master share image (MSI). The watermark can be extracted by combining the MSI and the OSI. Different from other traditional methods, the proposed method does not need to modify the medical image in order to protect the copyright of the image. Moreover, the registered OSI used to verify the ownership and its appearance display meaningful information, facilitating image management. Finally, the results of the final experiment can prove the effectiveness of our method.

Improved Visual Cryptography Using Cover Images (커버영상을 이용한 개선된 시각암호)

  • Jang, Si-Hwan;Choi, Yong Soo;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.531-538
    • /
    • 2012
  • Visual cryptography is a scheme that recovers secret image through human vision by overlapping distributed share images without cryptographic operations. Distribution methods are still being developed for improving quality of shared images keeping size of images invariant and enhancing robustness against resize of images. Since visual cryptography only uses shared images, this fact is exploited to attack. From this fact, a scheme safe for sharing distributed images is needed. In this paper, a new visual cryptographic scheme using cover image is proposed. This scheme reduces the chance of detection against steganalysis and increases security. In addition, this paper shows that the proposed scheme can completely decrypt secret image without creating noise.

An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

  • Kumar, N. Rajesh;Krishnan, R. Bala;Manikandan, G.;Raajan, N.R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2862-2878
    • /
    • 2020
  • Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* - 1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.

Biometrical Information Security by Using Optical Visual Cryptography (광시각암호를 이용한 생체정보보호)

  • 이상이;류충상;이승현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.760-763
    • /
    • 2004
  • We propose a biometrical information security method based on Optical Visual Cryptography in that a fingerprint data is processed by Secret Sharing method taking into account the Optical Visual Cryptography and a part of shared data transmitted through an open network. Whenever necessary the owner or the fingerprint can be authenticated by submitting his fingerprint with the other shared information.

  • PDF

Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography

  • Yang, Ching-Nung;Wu, Chih-Cheng;Lin, Yi-Chin;Kim, Cheonshik
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.979-989
    • /
    • 2015
  • Recently, Hou and others introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS) in which image blocks can be gradually recovered step by step. In Hou and others' (2, n)-BPVCS, a secret image is subdivided into n non-overlapping image blocks. When t ($2{\leq}t{\leq} n$) participants stack their shadow images, all the image blocks associated with these t participants will be recovered. However, Hou and others' scheme is only a simple 2-out-of-n case. In this paper, we discuss a general (k, n)-BPVCS for any k and n. Our main contribution is to give two constructions (Construction 1 and Construction 2) of this general (k, n)-BPVCS. Also, we theoretically prove that both constructions satisfy a threshold property and progressive recovery of the proposed (k, n)-BPVCS. For k = 2, Construction 1 is reduced to Hou and others' (2, n)-BPVCS.

Human Visual Intelligence and the New Territory of Educational Technology Research

  • RHA, Ilju
    • Educational Technology International
    • /
    • v.8 no.1
    • /
    • pp.1-16
    • /
    • 2007
  • The general aim of this article is to explicate what can be researched in our field based on the new understanding on the ability of human visual intelligence. To follow this aim, three key discussions were followed. The first is to explain why the human visual intelligence research is so important in our field and how it was neglected. The basic orientations of the research questions used in its framing and in answering are reviewed. After reviewing traditional research orientations, as the second discussion, alternative, more useful perspective for thinking about human visual intelligence is suggested. And the possibility of contribution for the future research in general is discussed. In doing so, human visual intelligence was defined in rather practically oriented ways rather than theoretically oriented ones. More practical perspectives were suggested. The third discussion is to show how to use the alternative perspectives of human visual intelligence in the areas of educational technology research. It was hoped that the article lays out conceptual groundwork for generation of educational technology research frameworks which can be used for the research conduct, reproduction and sharing by adopting practically oriented views on human visual intelligence as a new territory of educational technology research.

Enhancing the Security of Credit Card Transaction based on Visual DSC

  • Wei, Kuo-Jui;Lee, Jung-San;Chen, Shin-Jen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1231-1245
    • /
    • 2015
  • People have transferred their business model from traditional commerce to e-commerce in recent decades. Both shopping and payment can be completed through the Internet and bring convenience to consumers and business opportunities to industry. These trade techniques are mostly set up based on the Secure Sockets Layer (SSL). SSL provides the security for transaction information and is easy to set up, which makes it is widely accepted by individuals. Although attackers cannot obtain the real content even when the transferred information is intercepted, still there is risk for online trade. For example, it is impossible to prevent credit card information from being stolen by virtual merchant. Therefore, we propose a new mechanism to solve such security problem. We make use of the disposable dynamic security code (DSC) to replace traditional card security code. So even attackers get DSC for that round of transaction, they cannot use it for the next time. Besides, we apply visual secret sharing techniques to transfer the DSC, so that interceptors cannot retrieve the real DSC even for one round of trade. This way, we can improve security of credit card transaction and reliability of online business. The experiments results validate the applicability and efficiency of the proposed mechanism.

Web Image Classification using Semantically Related Tags and Image Content (의미적 연관태그와 이미지 내용정보를 이용한 웹 이미지 분류)

  • Cho, Soo-Sun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.15-24
    • /
    • 2010
  • In this paper, we propose an image classification which combines semantic relations of tags with contents of images to improve the satisfaction of image retrieval on application domains as huge image sharing sites. To make good use of image retrieval or classification algorithms on huge image sharing sites as Flickr, they are applicable to real tagged Web images. To classify the Web images by 'bag of visual word' based image content, our algorithm includes training the category model by utilizing the preliminary retrieved images with semantically related tags as training data and classifying the test images based on PLSA. In the experimental results on the Flickr Web images, the proposed method produced the better precision and recall rates than those from the existing method using tag information.

A Systematic Review of the Effects of Visual Perception Interventions for Children With Cerebral Palsy (뇌성마비 아동에게 시지각 중재가 미치는 효과에 대한 체계적 고찰)

  • Ha, Yae-Na;Chae, Song-Eun;Jeong, Mi-Yeon;Yoo, Eun-Young
    • Therapeutic Science for Rehabilitation
    • /
    • v.12 no.2
    • /
    • pp.55-68
    • /
    • 2023
  • Objective : This study aims to analyze the effects of visual perception intervention by systematically reviewing the studies that applied visual perception intervention to children with cerebral palsy. Methods : The databases used were PubMed, EMbase, Science Direct, ProQuest, Koreanstudies Information Service System (KISS), Research Information Sharing Service (RISS), and the National Assembly Library. The keywords used were cerebral palsy, CP, and visual perception. According to the PRISMA flowchart, 10 studies were selected from among studies published from January 1, 2012 to March 30, 2022. The quality level of the selected studies, the demographic characteristics of study participants, the effectiveness of interventions, area and strategies of intervention, assessment tools to measure the effectiveness of interventions, and risk of bias were analyzed. Results : All selected studies confirmed that visual perception intervention was effective in improving visual perception function. In addition, positive results were shown in upper extremity function, activities of daily living, posture control, goal achievement, and psychosocial areas as well as visual perception function. The eye-hand coordination area was intervened in all studies. Conclusion : In visual perception intervention, It is necessary to evaluate the visual perception function by area, and apply systematically graded customized interventions for each individual.

A Study on the Characteristics and Direction of Spatial Composition of Shared Culture in European City Square (유럽 도시 광장에서 나타나는 공유문화기반의 공간적 구성 특성 및 방향 연구)

  • Hwang, Mee-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.4
    • /
    • pp.75-83
    • /
    • 2017
  • The cultural tendency based on sharing and cooperation, which has recently been a hot issue, accelerates throughout the world. This study began with a perception that a sharing culture is inherent in urban public spaces. This study aims to conduct a theoretical study of the sharing culture and to analyze the characteristics of the design composition of public spaces. This study selected squares in 16 European cities as cases for analysis. The results are summarized as follows:1)To analyze the design characteristics of public spaces in which a sharing culture is inherent, this study drew the shape and type of planes and sharing elements such as accessibility, symbolism and activity with the squares in the cases. 2)The shape of planes in the squares in the cases has been formed in close relations with the historic meaning and events of the area and the process of the construction of buildings surrounding the square. The squares in the cases were classified into seven plane types, and these squares have developmentally contributed to the formation of a sharing culture as a place for free participation and communication concerning social issues. 3)In the squares in the cases, the weight of road-centered access appears high, and in terms of the construction of human-friendly / environment-friendly infrastructure in the city or judging from the trend of the recent increase of pedestrian-centered plans for public space, it is judged that approaches with a high utilization rate of sidewalk or public transportation would be desirable. 4)Symbolic elements of the square become a device by which citizens can share the historic symbolism, along with artistic inspiration. In addition, by serving as an observatory from which people can take a view of the landscape of the city, it allows visual sharing of the entire city as well as the square. 5)A square is common pool resources in the community, and it is necessary to vitalize that in a direction of increasing the possibility of sharing, through the characteristics and methods of the composition of public design.