scispace - formally typeset
Search or ask a question

Showing papers by "Tzung-Her Chen published in 2018"


Journal ArticleDOI
TL;DR: The security of an image authentication scheme based on Block-Truncation-Coding (BTC) compression proposed by Li et al. is analyzed and the false alarm of their scheme is shown unneglectable.
Abstract: With image integrity in mind, the sensitivity-of-tamper property of a new image authentication scheme is always one of main concerns. However, to claim integrity guarantee of image authentication techniques is meaningful only when the false negative probability is taken into consideration. In this paper, the security of an image authentication scheme based on Block-Truncation-Coding (BTC) compression proposed by Li et al. is analyzed. The false alarm of their scheme is shown unneglectable in this paper. Precisely, it is potentially problematic since their scheme only protects the quantization values of BTC codes, but ignores the bitmap part. The main weak design will be shown by means of conducting some counter experiments. Thanks to Li et al.’s well design to protect the two values of quantization levels of the compressed image, the improvement to remove the potential security concern is simple. The experimental results and the further analysis demonstrate that the simple and secure improvement does work.

14 citations


Journal ArticleDOI
TL;DR: This paper proposes a novel DRM scheme that both accommodates consumers’ expectations for the friendliness of personal use and preserves the providers’ revenue by maintaining a fairer balance between the interests of both content providers and consumers.
Abstract: The existing DRM systems address the interests of providers, associated with prohibitively tight protection measures, which do not take customers’ behaviors and needs into account. This paper proposes a novel DRM scheme that both accommodates consumers’ expectations for the friendliness of personal use and preserves the providers’ revenue. By maintaining a fairer balance between the interests of both content providers and consumers, the proposed DRM scheme thus benefits the digital content industry as a whole. The comparison between the related works and the proposed scheme implies the superiority of the proposed scheme while the security analyses and the further discussion demonstrate the proposed works well.

12 citations


Journal ArticleDOI
TL;DR: This paper combines PISSS and random grids-based VSS to remove all the drawbacks existing in the previous works including 1) distortion by compressing a secret image, 2) non-perfect reconstructed image, 3) distortion of pixel expansion, and 4) size-reduced halftone image.
Abstract: In an image secret sharing scheme (ISSS), two main categories are discussed. One is the polynomial-style image secret sharing scheme (PISSS), and the other is the visual secret sharing (VSS). It is interesting to combine the main properties of these two schemes. When the encoded secret images are received, we can decode them by combining these two schemes’ properties, utilizing the VSS property to seek the secret immediately by human visual system (HVS) and the PISSS property to recover the secret perfectly with a decoding machine. This paper combines PISSS and random grids-based VSS to remove all the drawbacks existing in the previous works including 1) distortion by compressing a secret image, 2) non-perfect reconstructed image, 3) distortion of pixel expansion, and 4) size-reduced halftone image. The experimental results demonstrate the proposed scheme does work well.

6 citations