Hongliang Cai

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization and recovery is proposed. The image is divided into Region of Interest (ROI) and Region of Non Interest (RONI). Considering the ROI-based self-embedding problem as a special erasure channel, fountain code is applied in our method to deal with the reference(More)
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea that there is close connection between secret sharing and coding theory, coding method on GF(2<sup>m</sup>) is applied in our scheme instead of the classical Lagrange's interpolation method in order to deal with the fidelity loss problem in the recovery. All(More)
Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (<i>t</i>, <i>n</i>) high-security threshold structure. The scheme can encode secret images into <i>n</i> shadow images in such a way that all the shadow images are in a(More)
Image secret sharing is an important research topic in the field of information security. Compared to a lot of digital information, images are favored in the network due to having a vivid, visual characteristics. However, most image secret sharing schemes without considering the characteristics of the image just regard the image as a series of general data(More)
In this paper we propose a new method for content reconstruction using self-embedding technology. As the content reconstruction problem can be regarded as a special kind of erasure channel, we use fountain code which has good performance in erasure channel to generate reference symbols for reconstruction. Theoretical analysis of success bound about maximal(More)
  • 1