首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
On the parameters for CT-CDMA communication systems based on complete complementary codes 基于完全互补码的CT-CDMA通信系统参数研究
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895533
T. Kojima, Masaki Aono
A convoluted-time and code division multiple access (CT-CDMA) communication system based on complete complementary codes has been proposed. There are some variations in setting some parameters for this communication system. In this study, we generalize the parameter settings for this communication system, and evaluate the constraints where the information data can be transmitted without any errors under the multipath environment.
提出了一种基于完全互补码的卷积时码分多址(CT-CDMA)通信系统。在设置该通信系统的某些参数时存在一些变化。在本研究中,我们推广了该通信系统的参数设置,并评估了在多径环境下信息数据可以无差错传输的约束条件。
{"title":"On the parameters for CT-CDMA communication systems based on complete complementary codes","authors":"T. Kojima, Masaki Aono","doi":"10.1109/ISITA.2008.4895533","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895533","url":null,"abstract":"A convoluted-time and code division multiple access (CT-CDMA) communication system based on complete complementary codes has been proposed. There are some variations in setting some parameters for this communication system. In this study, we generalize the parameter settings for this communication system, and evaluate the constraints where the information data can be transmitted without any errors under the multipath environment.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation of zeta functions counting pseudo-codewords of linear codes 计算线性码伪码字的zeta函数
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895507
S. Matsuda, S. Saito, T. Hiramatsu
It is described in this document how to compute zeta functions counting unscaled pseudo-codewords of general binary linear codes. This zeta functions are introduced in [2] for cycle codes and extended in [3] for general linear codes. Especially, we show that the zeta functions of codes are computed by using a 1/2 size determinants compared to those of [3] for non-cycle codes.
本文描述了如何计算一般二进制线性码的未标度伪码字的zeta函数。这个zeta函数在[2]中被引入到循环码中,在[3]中被扩展到一般线性码中。特别地,我们证明了码的zeta函数是通过使用1/2大小的行列式来计算的,而非循环码的zeta函数是用[3]的行列式来计算的。
{"title":"Computation of zeta functions counting pseudo-codewords of linear codes","authors":"S. Matsuda, S. Saito, T. Hiramatsu","doi":"10.1109/ISITA.2008.4895507","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895507","url":null,"abstract":"It is described in this document how to compute zeta functions counting unscaled pseudo-codewords of general binary linear codes. This zeta functions are introduced in [2] for cycle codes and extended in [3] for general linear codes. Especially, we show that the zeta functions of codes are computed by using a 1/2 size determinants compared to those of [3] for non-cycle codes.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new framework for opportunistic scheduling in wireless networks 一种新的无线网络机会调度框架
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895411
Jang-Won Lee, Jeong-Ahn Kwon
In this paper, we propose a new framework for opportunistic scheduling in wireless systems. We consider a TDMA type of multiple access scheme, in which only one user can be scheduled in each time-slot. For opportunistic scheduling for such a system, a nice framework has been developed in. However, in this paper, we consider a more general system that has a probabilistic scheduling policy and more general fairness constraints. Moreover, in addition to this generalization, we develop a new framework for opportunistic scheduling based on the duality theory. The duality theory is a well-defined theory in the mathematical optimization area. Hence, by using the framework developed in this paper, we can analyze the developed algorithm more rigorously and systematically.
本文提出了一种新的无线系统机会调度框架。我们考虑了一种TDMA类型的多址方案,其中每个时隙只能安排一个用户。针对这类系统的机会调度问题,本文开发了一个很好的框架。然而,在本文中,我们考虑了一个更一般的系统,它具有概率调度策略和更一般的公平性约束。在此基础上,我们建立了一个基于对偶理论的机会调度框架。对偶理论是数学优化领域中一个定义良好的理论。因此,使用本文开发的框架,我们可以更严格、更系统地分析所开发的算法。
{"title":"A new framework for opportunistic scheduling in wireless networks","authors":"Jang-Won Lee, Jeong-Ahn Kwon","doi":"10.1109/ISITA.2008.4895411","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895411","url":null,"abstract":"In this paper, we propose a new framework for opportunistic scheduling in wireless systems. We consider a TDMA type of multiple access scheme, in which only one user can be scheduled in each time-slot. For opportunistic scheduling for such a system, a nice framework has been developed in. However, in this paper, we consider a more general system that has a probabilistic scheduling policy and more general fairness constraints. Moreover, in addition to this generalization, we develop a new framework for opportunistic scheduling based on the duality theory. The duality theory is a well-defined theory in the mathematical optimization area. Hence, by using the framework developed in this paper, we can analyze the developed algorithm more rigorously and systematically.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of CSK spread spectrum Boomerang system CSK扩频回飞镖系统性能评价
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895473
T. Sugimoto, T. Arai, H. Inai
In this paper, the spread-spectrum (SS) Boomerang system using code-shift-keying (CSK) is proposed. CSK is one of the orthogonal modulation systems which transmit an orthogonal code sequence according to information bits. The conventional SS-Boomerang system which used direct-sequence spread-spectrum (DS/SS) technique applies the spreading sequence to every information bits. However, since the proposed SS-Boomerang system uses CSK, it can transmit more than one information with one spreading sequence. It is able to improve information transmission rate. Moreover, it is shown that the bit error rate and distance ranging performance of the proposed system is superior to that of the conventional system.
提出了一种基于码移键控(CSK)的扩频回飞镖系统。CSK是一种按信息位传输正交码序列的正交调制系统。传统的SS-回飞镖系统采用直接序列扩频(DS/SS)技术,对每个信息位进行扩频。然而,由于所提出的SS-Boomerang系统使用了CSK,它可以用一个扩展序列传输多个信息。它能够提高信息的传输速率。实验结果表明,该系统的误码率和测距性能均优于传统系统。
{"title":"Performance evaluation of CSK spread spectrum Boomerang system","authors":"T. Sugimoto, T. Arai, H. Inai","doi":"10.1109/ISITA.2008.4895473","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895473","url":null,"abstract":"In this paper, the spread-spectrum (SS) Boomerang system using code-shift-keying (CSK) is proposed. CSK is one of the orthogonal modulation systems which transmit an orthogonal code sequence according to information bits. The conventional SS-Boomerang system which used direct-sequence spread-spectrum (DS/SS) technique applies the spreading sequence to every information bits. However, since the proposed SS-Boomerang system uses CSK, it can transmit more than one information with one spreading sequence. It is able to improve information transmission rate. Moreover, it is shown that the bit error rate and distance ranging performance of the proposed system is superior to that of the conventional system.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bounds on error probability of block codes with bounded-angle maximum-likelihood incomplete decoding 有界角最大似然不完全译码分组码的错误概率界
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895487
S. Dolinar, K. Andrews, F. Pollara, D. Divsalar
Recently, Dolinar et al. obtained extremely tight bounds on the probabilities of decoding error and undetected error for block codes using bounded-angle maximum-likelihood (BA-ML) incomplete decoding. Unfortunately, these bounds are complex and difficult to compute for large block sizes. In this paper we obtain simple exponential upper bounds on both the word error probability and the undetected error probability of block codes using BA-ML decoding.
最近,Dolinar等人利用有界角最大似然(BA-ML)不完全译码获得了分组码的译码错误和未检测错误概率的极紧界。不幸的是,这些边界是复杂的,很难计算大块大小。本文利用BA-ML译码,得到了分组码的单词错误概率和未检测到的错误概率的简单指数上界。
{"title":"Bounds on error probability of block codes with bounded-angle maximum-likelihood incomplete decoding","authors":"S. Dolinar, K. Andrews, F. Pollara, D. Divsalar","doi":"10.1109/ISITA.2008.4895487","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895487","url":null,"abstract":"Recently, Dolinar et al. obtained extremely tight bounds on the probabilities of decoding error and undetected error for block codes using bounded-angle maximum-likelihood (BA-ML) incomplete decoding. Unfortunately, these bounds are complex and difficult to compute for large block sizes. In this paper we obtain simple exponential upper bounds on both the word error probability and the undetected error probability of block codes using BA-ML decoding.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114341756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive reversible data hiding for JPEG images 自适应可逆数据隐藏的JPEG图像
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895529
H. Sakai, M. Kuribayashi, M. Morii
This paper presents an improved method of the reversible data hiding for JPEG images proposed by Xuan, et al. The conventional method embeds data into the JPEG quantized 8 times 8 block DCT coefficients. In this method, we found that the blocks, located in the noisy part of the image, are not suitable for embedding data. The proposed method can judge whether a block consisted of 8 times 8 DCT coefficients is located in smooth part of image by using the DC coefficient of neighboring blocks. Our method can avoid the noisy part for embedding. It results in a better performance in terms of capacity-distortion behavior.
本文提出了一种改进的JPEG图像可逆数据隐藏方法,该方法由Xuan等人提出。传统方法将数据嵌入到量化了8 × 8块DCT系数的JPEG中。在这种方法中,我们发现,块位于图像的噪声部分,不适合嵌入数据。该方法可以利用相邻块的DC系数判断由8 × 8个DCT系数组成的块是否位于图像的光滑部分。该方法可以避免噪声部分进行嵌入。结果表明,在容量畸变行为方面具有较好的性能。
{"title":"Adaptive reversible data hiding for JPEG images","authors":"H. Sakai, M. Kuribayashi, M. Morii","doi":"10.1109/ISITA.2008.4895529","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895529","url":null,"abstract":"This paper presents an improved method of the reversible data hiding for JPEG images proposed by Xuan, et al. The conventional method embeds data into the JPEG quantized 8 times 8 block DCT coefficients. In this method, we found that the blocks, located in the noisy part of the image, are not suitable for embedding data. The proposed method can judge whether a block consisted of 8 times 8 DCT coefficients is located in smooth part of image by using the DC coefficient of neighboring blocks. Our method can avoid the noisy part for embedding. It results in a better performance in terms of capacity-distortion behavior.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121540696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A method of randomizing a part of an FPGA configuration bitstream 随机化FPGA配置位流的一部分的方法
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895640
M. Nakanishi, Y. Murakami
FPGAs are widely used recently, and security on configuration bitstreams is of concern to both users and suppliers of configuration bitstreams (e.g., intellectual property vendors). In order to protect configuration bitstreams against the threats such as FPGA viruses, piracy and reverse engineering, configuration bitstreams need to be encrypted and authenticated before loaded into FPGAs. We previously proposed a configuration scheme that protects configuration bitstreams, which uses a part of a target circuit (i.e., a part of a configuration bitstream of a target circuit) as a secret key. Our proposed scheme has an advantage of using public-key cryptography, while other known methods can use only symmetric-key cryptography. However, ideally, the secret key should not be a part of a configuration bitstream but a random bit string. In this paper, we propose a method that randomizes a part of a configuration bitstream, so that it can be used as a one-time pad for our configuration scheme.
近年来fpga得到了广泛的应用,配置比特流的安全性是用户和配置比特流供应商(如知识产权供应商)都关心的问题。为了保护配置比特流免受FPGA病毒、盗版和逆向工程等威胁,配置比特流需要在加载到FPGA之前进行加密和认证。我们之前提出了一种保护配置比特流的配置方案,该方案使用目标电路的一部分(即目标电路的一部分配置比特流)作为密钥。我们提出的方案具有使用公钥加密的优点,而其他已知的方法只能使用对称密钥加密。但是,理想情况下,密钥不应该是配置位流的一部分,而应该是一个随机的位串。在本文中,我们提出了一种方法,随机化配置比特流的一部分,使其可以作为我们的配置方案的一次性pad。
{"title":"A method of randomizing a part of an FPGA configuration bitstream","authors":"M. Nakanishi, Y. Murakami","doi":"10.1109/ISITA.2008.4895640","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895640","url":null,"abstract":"FPGAs are widely used recently, and security on configuration bitstreams is of concern to both users and suppliers of configuration bitstreams (e.g., intellectual property vendors). In order to protect configuration bitstreams against the threats such as FPGA viruses, piracy and reverse engineering, configuration bitstreams need to be encrypted and authenticated before loaded into FPGAs. We previously proposed a configuration scheme that protects configuration bitstreams, which uses a part of a target circuit (i.e., a part of a configuration bitstream of a target circuit) as a secret key. Our proposed scheme has an advantage of using public-key cryptography, while other known methods can use only symmetric-key cryptography. However, ideally, the secret key should not be a part of a configuration bitstream but a random bit string. In this paper, we propose a method that randomizes a part of a configuration bitstream, so that it can be used as a one-time pad for our configuration scheme.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128016963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Convergence behaviors of adaptive DS-CDMA receivers 自适应DS-CDMA接收机的收敛行为
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895561
Hsuan-Fu Wang, Fang-Biau Ueng, Jui-Chi Chang, Li-Der Jeng
This paper aims to investigate the convergence and transient behaviors of the symbol-based adaptive receivers for direct sequence-code division multiple access (DS-CDMA) communication system in multipath channels. The input signal vector is characterized as a simple stochastic model to simplify the analysis of the least mean square (LMS) and the normalized least mean square (NLMS) adaptive receivers. The learning curve, which is the ensemble average of the squared estimation error is applied to analyze the convergence of adaptive receivers for DS-CDMA system in multipath channels. Computer simulations show that the analytical results of the learning curve obtained in this work are consistent with the simulation results.
研究了多径信道下直接顺序码分多址(DS-CDMA)通信系统中基于符号的自适应接收机的收敛性和瞬态行为。为了简化最小均方(LMS)和归一化最小均方(NLMS)自适应接收机的分析,输入信号矢量被表征为一个简单的随机模型。应用估计误差平方的集合平均学习曲线分析了多径信道下DS-CDMA系统自适应接收机的收敛性。计算机仿真结果表明,本文所得到的学习曲线解析结果与仿真结果吻合较好。
{"title":"Convergence behaviors of adaptive DS-CDMA receivers","authors":"Hsuan-Fu Wang, Fang-Biau Ueng, Jui-Chi Chang, Li-Der Jeng","doi":"10.1109/ISITA.2008.4895561","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895561","url":null,"abstract":"This paper aims to investigate the convergence and transient behaviors of the symbol-based adaptive receivers for direct sequence-code division multiple access (DS-CDMA) communication system in multipath channels. The input signal vector is characterized as a simple stochastic model to simplify the analysis of the least mean square (LMS) and the normalized least mean square (NLMS) adaptive receivers. The learning curve, which is the ensemble average of the squared estimation error is applied to analyze the convergence of adaptive receivers for DS-CDMA system in multipath channels. Computer simulations show that the analytical results of the learning curve obtained in this work are consistent with the simulation results.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Period and link length of logistic map over integers 整数逻辑映射的周期和链路长度
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895610
Takeru Miyazaki, Shunsuke Araki, S. Uehara
On the designing of a pseudo-random number generator from a sequence generated by the logistic map, period and link length of the sequence are important for good randomness. In this paper, we focus loops and links of sequences generated by the logistic map over integers. Since their periods and link lengths of them depend on an available bit. We consider the relation between the available bit and expected values of them.
在逻辑映射生成序列的伪随机数生成器设计中,序列的周期和链路长度是保证序列具有良好随机性的重要因素。本文主要讨论由整数上的逻辑映射生成的序列的环和链。因为它们的周期和链接长度取决于可用位。我们考虑了它们的可用位与期望值之间的关系。
{"title":"Period and link length of logistic map over integers","authors":"Takeru Miyazaki, Shunsuke Araki, S. Uehara","doi":"10.1109/ISITA.2008.4895610","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895610","url":null,"abstract":"On the designing of a pseudo-random number generator from a sequence generated by the logistic map, period and link length of the sequence are important for good randomness. In this paper, we focus loops and links of sequences generated by the logistic map over integers. Since their periods and link lengths of them depend on an available bit. We consider the relation between the available bit and expected values of them.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134242943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A construction of a visual secret sharing scheme for plural secret images and its basic properties 多重秘密图像的可视化秘密共享方案的构造及其基本性质
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895377
H. Koga, M. Miyata
In this paper we discuss construction of the visual secret sharing scheme for plural secret images. We first consider generation of n shares for given two secret image SI1 and SI2. For i = 1, 2, while no information of SIi is revealed from any less than n - 2 + i shares, SIi is visually recovered by the superimposition of arbitrary n - 2 + i shares. We define a new class of basis matrices used for generation of the n shares and give a simple construction of such basis matrices. In addition, a fundamental bound on the contrasts of SI1 and SI2 is established. These results are extended to the case where we have more than two secret images.
本文讨论了多重秘密图像的视觉秘密共享方案的构造。我们首先考虑对给定的两个秘密图像SI1和SI2生成n个共享。当i = 1,2时,在小于n - 2 + i股的情况下,没有SIi信息被披露,通过任意n - 2 + i股的叠加,可以直观地恢复SIi。我们定义了一类新的用于生成n个份额的基矩阵,并给出了这类基矩阵的一个简单构造。此外,建立了SI1和SI2对比的基本界。这些结果被推广到我们有两个以上的秘密图像的情况。
{"title":"A construction of a visual secret sharing scheme for plural secret images and its basic properties","authors":"H. Koga, M. Miyata","doi":"10.1109/ISITA.2008.4895377","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895377","url":null,"abstract":"In this paper we discuss construction of the visual secret sharing scheme for plural secret images. We first consider generation of n shares for given two secret image SI1 and SI2. For i = 1, 2, while no information of SIi is revealed from any less than n - 2 + i shares, SIi is visually recovered by the superimposition of arbitrary n - 2 + i shares. We define a new class of basis matrices used for generation of the n shares and give a simple construction of such basis matrices. In addition, a fundamental bound on the contrasts of SI1 and SI2 is established. These results are extended to the case where we have more than two secret images.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1