The search functionality is under construction.

Author Search Result

[Author] Ching-Nung YANG(5hit)

1-5hit
  • A Systematic Construction of Inner Codes in Generalized Concatenated Codes for Correcting Unidirectional Byte Errors

    Ching-Nung YANG  Chi-Sung LAIH  

     
    LETTER-Information Theory and Coding Theory

      Vol:
    E81-A No:2
      Page(s):
    351-354

    In [1] a generalized concatenated code was used to construct the t-fold unidirectional b-bit-byte error-correcting/d(dt)-fold unidirectional b-bit-byte error-detecting (t-UbEC/d(t)-UbED) codes. The concatenated code is to choose an inner code satisfying some disjoint sets and each set is a binary b-tuples unordered code. However, [1] gave five methods including trial and error to construct the optimal inner codes. Here, we present a systematic method for constructing the inner codes. It is shown that we can improve the coding efficiency for t-UbEC/d(t)-UbED) codes in some cases by using our inner codes.

  • New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size

    Ching-Nung YANG  Tse-Shih CHEN  

     
    LETTER-Information Security

      Vol:
    E89-A No:2
      Page(s):
    620-625

    The Visual Secret Sharing (VSS) scheme proposed by Naor and Shamir is a perfectly secure scheme to share a secret image. By using m sub pixels to represent one pixel, we encrypt the secret image into several noise-like shadow images. The value of m is known as the pixel expansion. More pixel expansion increases the shadow size and makes VSS schemes impractical for real application. In this paper, we propose new size-reduced VSS schemes and dramatically decrease the pixel expansion by a half.

  • Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation

    Zhili ZHOU  Ching-Nung YANG  Beijing CHEN  Xingming SUN  Qi LIU  Q.M. Jonathan WU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/03/07
      Vol:
    E99-D No:6
      Page(s):
    1531-1540

    For detecting the image copies of a given original image generated by arbitrary rotation, the existing image copy detection methods can not simultaneously achieve desirable performances in the aspects of both accuracy and efficiency. To address this challenge, a novel effective and efficient image copy detection method is proposed based on two global features extracted from rotation invariant partitions. Firstly, candidate images are preprocessed by an averaging operation to suppress noise. Secondly, the rotation invariant partitions of the preprocessed images are constructed based on pixel intensity orders. Thirdly, two global features are extracted from these partitions by utilizing image gradient magnitudes and orientations, respectively. Finally, the extracted features of images are compared to implement copy detection. Promising experimental results demonstrate our proposed method can effectively and efficiently resist rotations with arbitrary degrees. Furthermore, the performances of the proposed method are also desirable for resisting other typical copy attacks, such as flipping, rescaling, illumination and contrast change, as well as Gaussian noising.

  • Size-Adjustable Visual Secret Sharing Schemes

    Ching-Nung YANG  Tse-Shih CHEN  

     
    LETTER-Information Security

      Vol:
    E88-A No:9
      Page(s):
    2471-2474

    Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image by breaking it into shadows. Unlike other secret sharing schemes, the VSS scheme can be easily decoded by the human visual sight when staking the shadows. We replace a pixel in the secret image by m sub pixels in the shadow image and the value m is called as pixel expansion. In general, most papers are dedicated to find the minimum m for a VSS scheme, i.e. a smaller shadow size. However, it seems that no one studies how to trade the shadow size for the contrast. In this paper, we take the lead in studying size-adjustable VSS schemes such that one can choose appropriate shadow size and the recovered image contrast for practical use.

  • Generating Functions for Asymmetric/Unidirectional Error Correcting and Detecting Codes

    Ching-Nung YANG  Chi-Sung LAIH  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E80-A No:6
      Page(s):
    1135-1142

    Constantin and Rao have given a method for constructing single asymmetric error correcting (SAEC) codes based on the theory of the Abelian group, This paper uses the method of generating function in combinatorics to solve the implementation problems of the SAEC group theoretic codes. The encoding and decoding algorithms of the coding scheme perform simple arithmetic operations recursively. The idea of generating function can also be applied to t symmetric errors and simultaneously detect all unidirectional errors (t-syEC/AUED) codes for 1t3.