Learn More
A novel approach to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous(More)
The pattern deformational model proposed by Tsai and Fu [11] is extended so that numerical attributes and probability or density distributions can be introduced into primitives and relations in a nonhierarchical relational graph Conventional graph isomor-phisms are then generalized to include error-correcting capability for matching deformed patterns(More)
A graph matching approach is proposed in this paper for solving the task assignment problem encountered in distributed computing systems. A cost function defined in terms of a single unit, time, is proposed for evaluating the effectiveness of task assignment. This cost function represents the maximum time for a task to complete module execution and(More)
A ðk; nÞ-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k À 1 or fewer of them gain no information about it. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need complicated(More)
A new structural approach to shape recognition using attributed string matching with merging is proposed. After illustrating the disadvantages of conventional symbolic string matching using changes, deletions, and insertions, attributed strings are suggested for matching. Each attributed string is an ordered sequence of shape boundary primitives, each(More)
A watermarking method for copyright protection of color images against print-and-scan operations is proposed. A watermark is embedded in an input image as coefficient-value peaks that are circularly and symmetrically distributed in a middle band of the discrete Fourier transform (DFT) domain of the input image. By detecting the robust peaks in the DFT(More)