利用資訊隱藏技術在PDF 檔案上做秘密傳輸, 驗證及分享之研究

賴以晟, 蔡文祥 - 2008 - ir.lib.nycu.edu.tw
… embed authentication signals of the secret messages. For secret sharing, we use a secret
PDF … shares by hierarchical sharing with data magnitude control, steganography methods, and …

基於PNG 影像之資訊隱藏技術及其應用之研究

楊芷婷, 蔡文祥 - 2008 - ir.lib.nycu.edu.tw
authentication method and the proposed secret sharing method… hiding and authentication
method to authenticate hidden data. … to develop secret sharing techniques with steganographic

在行動裝置上作視訊及文字之資訊隱藏研究

王彝琳, 蔡文祥 - 2005 - ir.lib.nycu.edu.tw
… covert communication, secret sharing, and text authentication, on … secret sharing method
via mobile devices has been proposed. The shares are produced with a steganographic scheme

[HTML][HTML] 數位影像與文件保護機制之設計-以視覺式秘密分享和資訊隱藏為基礎

SF Tu - 2005 - ir.lib.ncu.edu.tw
scheme for digital images and documents based on visual secret sharing and steganography
Visual cryptography scheme is a secret sharing technique, which splits a binary image into …

具偽裝效果及驗證功能之文字型文件資訊分享的研究

黃貴笠, 蔡文祥 - 2003 - ir.lib.nycu.edu.tw
… And authentication is a technique for assuring the fidelity and integrity of protected digital …
study, secret sharing methods for text-type documents with steganography and authentication

在H. 264/AVC 視訊上做資訊隱藏之研究及其應用

黃冠霖, 蔡文祥 - 2007 - ir.lib.nycu.edu.tw
… a scheme for display control on specified computers is proposed. For the application of secret
sharing, we share … In this study, a technique of secret sharing with steganographic effects is …

在影像與文字檔案中進行資料隱藏的技術與應用之研究

李義溪, 蔡文祥 - 2007 - ir.lib.nycu.edu.tw
… protection, covert communication, authentication, and secret sharing. The processed file …
Special space codes are used again as authentication signals with steganographic effects. …

在XPS 文件上做資訊隱藏之新研究

何玫樺, 蔡文祥 - 2009 - ir.lib.nycu.edu.tw
… of the XPS are proposed for covert communication, text authentication, and steganography.
… , such as metadata association, secret sharing, and so on. 3. The idea of the proposed …

高容量JPEG 資訊隱藏及其在影像分享, 驗證與修復之應用

林志青 - 2009 - ir.lib.nycu.edu.tw
… This dissertation proposes three techniques for data hiding, image sharing, and image
authentication with cross recovery based on Joint Photographic Experts Group (JPEG). Data …

[HTML][HTML] 基於目標規劃與統計學的視覺密碼及其在著作權保護的應用之研究

CS Hsu - 2005 - ir.lib.ncu.edu.tw
… 摘要(英) Visual cryptography is a very secure and unique way to protect secrets. Unlike
traditional cryptographic schemes, it uses human eyes to recover the secret without any complex …