从秘密分享到图像秘密分享

2016.11.17

投稿:吴进部门:通信与信息工程学院浏览次数:

活动信息

时间: 2016年11月21日 09:00

地点: 校本部东区翔英大楼516室

行健讲坛学术讲座
第254期

时间:2016年11月21日(周一)上午09:00地点:宝山校区翔英大楼516室讲座:从秘密分享到图像秘密分享演讲者: National Dong Hwa University 杨庆隆教授
演讲者简介:Ching-Nung Yang, he received the B.S. degree and the M.S. degree, both from Department of Telecommunication Engineering at National Chiao Tung University. He received Ph.D. degree in Electrical Engineering from National Cheng Kung University. He is presently a professor in the Department of Computer Science and Information Engineering at National Dong Hwa University, and is also an IEEE senior member. He has published a number of 2 journal and conference papers in the areas of information security, multimedia security and coding theory. He is the guest editor of a special issue on "Visual Cryptography Scheme" for Communication of CCISA, and a coauthor of a series of articles on "Image Secret Sharing" for the Encyclopedia of Multimedia. He is the coeditor of two books "Visual Cryptography and Secret Image Sharing" published by CRC Press/Taylor & Francis, and "Steganography and Watermarking" published by Nova Science Publishers, Inc. He serves as a technical reviewer for over 30 major scientific journals in the areas of his expertise, and serves as editorial boards of some journals. Also, has served member of program committees of various international conferences. He is the recipient of the 2000, 2006, 2010, 2012, and 2014 Fine Advising Award in the Thesis of Master/PhD of Science awarded by Institute of Information & Computer Machinery. His current research interests include coding theory, information security, and cryptography.

讲座摘要:
Audiences will learn how to secure multimedia (e.g., digital images) by secret sharing. Secure digital imaging is an important research area combining methods and techniques coming from cryptography and image processing. Secret image sharing and visual cryptography enable distributing sensitive visual materials to involved participants through public communication channels, as the generated secure images do not reveal any information if they are not combined in the prescribed way. There are high similarities and tight relations between SIS Scheme and VCS. In fact, these two models are only different ways of looking at the same problem. Thus, the same research issues can be studied by using these two approaches, respectively, and still have contributions. Moreover, both approaches can be properly combined to develop their specialties and simultaneously avoid the disadvantages. This lecture covers the latest techniques, algorithms, solutions and application for secret image sharing.
欢迎广大教师和学生参加!