Hongliang Cai

Learn More
Image sharing is an attractive research subject in computer image techniques and in the information security field. This article presents a novel scheme of image sharing with a (<i>t</i>, <i>n</i>) high-security threshold structure. The scheme can encode secret images into <i>n</i> shadow images in such a way that all the shadow images are in a(More)
In this paper we propose a new method for content reconstruction using self-embedding technology. As the content reconstruction problem can be regarded as a special kind of erasure channel, we use fountain code which has good performance in erasure channel to generate reference symbols for reconstruction. Theoretical analysis of success bound about maximal(More)
  • 1