
Ching-Nung Yang- PhD
- Professor (IET Fellow) at National Dong Hwa University
Ching-Nung Yang
- PhD
- Professor (IET Fellow) at National Dong Hwa University
About
287
Publications
33,152
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,547
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (287)
This paper proposes a reversible data hiding technique based on two cover images. The proposed method enhances performance by utilizing Hamming coding (HC), arithmetic coding (AC), and an improved Exploiting Modification Direction (EMD) technique. Since AC provides lossless compression for binary data, it is widely used in image compression and hel...
Passwords are widely used for authentication in Internet applications. Recently, users tend to adopt graphical passwords instead of traditional alphanumeric passwords, since it is much easier for humans to remember images than verbal representations. However, the existing graphical password authentication systems generally suffer from three main is...
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retainin...
A systematic investigation of evolving visual cryptography scheme (EVCS) is carried out in this paper. The evolving scheme, denoted as \((k,\infty)\) , differs from the \((k,n)\) threshold in that it permits an arbitrary and perhaps unlimited number of participants. More importantly, the access structure can be updated dynamically by adding new use...
Invertible secret image sharing with authentication (ISISA) distributes comprehensible stego images generated from secret images and cover images to involved participants. The secret image and cover image can be correctly recovered after authentication. However, existing ISISA schemes suffer from issues such as a single kind of image, limited embed...
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing that protects privacy is desired. Progressive Secret Image Sharing (PSIS), a multilevel privacy protection technology for images, of...
Reversible data hiding is widely utilized for secure communication and copyright protection. Recently, to improve embedding capacity and visual quality of stego-images, some Partial Reversible Data Hiding (PRDH) schemes are proposed. But these schemes are over the plaintext domain. To protect the privacy of the cover image, Reversible Data Hiding i...
Reversible data hiding in encrypted images (RDHEI) is an effective technology of protecting private data. In this paper, a high-capacity RDHEI method with asymmetric coding and bit-plane block compression is proposed. Our major contributions are twofold. (1) We propose an asymmetric coding technique for processing prediction error (PE) blocks befor...
Reversible data hiding (RDH) is one special type of data hiding, and is widely used for many intended applications. Moreover, to protect the cover image, RDH in encrypted image (RDHEI) schemes are accordingly proposed. In RDHEI, if the marked image is lost, the cover image and the secret data cannot be restored. To address the issue of losing sub m...
Copy detection is crucial for protecting image copyright. This paper proposes a robust image hashing approach via Weighted Saliency Map (WSM) and Laplacian Eigenmaps (LE) (hereafter WSM-LE approach). An important contribution is the WSM construction via the edge map and the saliency map. As the WSM can indicate the interest regions of image, hash c...
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. Thus, color image compression has become an essential key technology. Absolute Moment Block Truncation Coding (AMBTC) has been widely...
Recently, three visual cryptography schemes with t -error-correcting capability (VCSs- t EC) were introduced for preventing the shadows carrying additional information from being corrupted by noise interference. However, the concerns on VCS- t EC, such as the average amount of carrying information, decoding of information from shadows, and the demo...
Dual image based RDH is a separate research area of the traditional RDH method, which has been continuously
studied by several researchers over the past decade. In the research of dual RDH, extension of the traditional
RDH algorithm or methods of improving the existing DH algorithm to dual RDH have been proposed. Hamming
code (HC) is a method used...
Reversible Data Hiding in Encrypted Images (RDHEI) has drawn increasing concern in multimedia cloud computing scenarios. It embeds secret message into the encrypted carrier while preserving the confidentiality of the image. However, most RDHEI schemes have only one hider and one image carrier which are not efficient for the distributed system with...
In traditional (k, n) threshold secret image sharing (SIS) scheme, all participants play the same roles in the revealing process. The threshold value k is reflected by the security level, which is a fixed integer predetermined before sharing. However, in practice of SIS, some participants are more important than others. These important participants...
Secret Image Sharing (SIS) is the technology that shares any given secret image by generating and distributing
n
shadow images in the way that any subset of
k
shadow images can restore the secret image. However, in the existing SIS schemes, the shadow images will be easily tampered and corrupted during the communication, which will pose serious...
In existing Secret Medical-Image Sharing (SMIS) schemes, to protect and manage secret medical-images (SMIs), the sharing and recovery of each SMI are implemented by local servers of medical institutions. However, since a lot of SMIs are produced by personal smart terminal devices in Internet of Things (IoT) environment, directly implementing the sh...
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing
${n}$
shares in the way that a set of any
${k}$
shares can recover the secret. On the other hand, blockchain is a decentralized system establishing a secure data structure for storing data in the form of a hash chain. Combining SS and blockch...
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multiple scales of features in the encoder part may not effectively aggregate contextual information, resulting in poor performance. In thi...
All secret image sharing (SIS) schemes are based on a finite field, on which the generation and reconstruction can be accomplished correctly. To achieve distortionless secret images, a Galois field GF(2m) would be adopted with increased computational complexity. Simple modular arithmetic, on the other hand, is frequently utilized to improve computa...
For (k, n)-threshold secret image sharing (SIS) scheme, only k or more than k complete parts can recover the secret information, and the correct image cannot be obtained if the count of shadow images is not enough or the shadow images are damaged. The existing schemes are weak in resisting large-area shadow image tampering. In this paper, we propos...
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but graphical passwords are often considered prone to shoulder-surfing attacks. In this paper, in order to build a balance between usability and security for authentication, we propose a new graphical password scheme...
Reversible Data Hiding in Encrypted Image (RDHEI) may redistribute the data hiding procedure to other parties, and can preserve privacy of the cover image. Recently, cloud computing technology has led to the rapid growth of networked media, many multimedia rights are owned by multiple parties, such as a film's producer and multiple distributors. Th...
A distortionless secret image sharing scheme using finite field GF(PG) (PG is the largest prime less than a given number) is investigated for sharing the absolute moment block truncation coding (AMBTC) images. Two adjusting operations are devised to modify the AMBTC trios (i.e., quantization pixels and bit maps) suitable for GF(PG) sharing. Polynom...
In the industrial Internet of Things (IoT), large amounts of image data are collected, stored and transmitted by low power cooperative sensors and heterogeneous devices, such as, monitoring pictures taken by surveillance cameras in intelligent transportation. Thus the increasing image data would be outsourced and shared between different distribute...
Recently, Ehdaie et al. proposed a two-dimensional hash chain based key pre-distribution (2DHC-KPD) scheme that can enhance resiliency against node-capture attack when compared with the conventional hash chain based key pre-distribution (HC-KPD) scheme. However, these HC-KPD-like schemes cannot resist the advanced node-capture attack (ANA) that att...
A (k, n) Secret document sharing (SDS) was first proposed by Tu and Hsu. A secret document is shared into n noise-like shares with a public meaningful cover document. In Tu and Hsu's (k, n)-SDS, any k or more shares with the public document are collaboratively used for recovering the secret document. Recently, Liu et al. enhanced Tu and Hsu's (k, n...
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention. In the beginning, there were an intensive amount of studies on digital copyright issues, and since then, intere...
In this paper, a (k,n,m)-intragroup and intergroup secret image sharing (I2SIS) scheme for the multi-group (i.e., m-group) environment is investigated. (2m−1) secret images are shared within groups (intragroups) and between groups (intergroups). Differing from existing SIS methods, any k or more qualified participants among different groups (i.e.,...
Determination of image authenticity usually requires the identification and localization of the manipulated regions of images. Hence, image manipulation detection has become one of the most important tasks in the field of multimedia forensics. Recently, Convolutional Neural Networks (CNNs) have achieved promising performance in image manipulation d...
With the rapid development of E-commerce, more and more people are used to shopping online, in which the reputation scores of sellers play an important role in helping consumers purchase satisfactory products. However, in the existing E-commerce environments, the reputation scores of users (including sellers and buyers) are centrally computed and s...
Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data hiding method based on a color AMBTC using Optimal Pixe...
Secret Image Sharing (SIS) as a secure data sharing scheme in multiple cover images, has become an increasing researchers’ concern. In traditional SIS, the cover image can’t be recovered losslessly. The distorted cover images would reduce the practicability of the scheme, especially in medical and military images. The lossless recovery of cover ima...
In (k, n) Progressive Secret Image Sharing (PSIS) schemes, n shares are obtained by sharing a secret image. With k to n shares, the secret image can be recovered progressively. No information of the secret image can be constructed by k-1 or fewer shares. Many Secret Image Sharing (SIS) schemes have been developed to achieve the progressive reconstr...
With the rapid development of network media, increasing research on reversible watermarking has focused on improving its robustness to resisting attacks during digital media transmission. There are some other reversible watermarking schemes that work in the encrypted domain for preserving the privacy of the cover image. The robustness of the waterm...
Research on self-embedding watermarks is being actively conducted to solve personal privacy and copyright problems by image attack. In this paper, we propose a self-embedded watermarking technique based on Absolute Moment Block Truncation Coding (AMBTC) for reconstructing tampered images by cropping attacks and forgery. AMBTC is suitable as a recov...
Hou et al. introduced a (2, n) block-based progressive visual cryptographic scheme (BPVCS). In (2, n)-BPVCS, a secret image is subdivided into n non-overlapped image blocks. When t (2 ≤ t ≤ n) participants stack their shadow images, the image blocks belonged to these t participants will be recovered. Unfortunately, Hou et al.’s (2, n)-BPVCS suffers...
Recently, image compression using adaptive block truncation coding based on edge quantization (ABTC-EQ) was proposed by Mathews and Nair. Their approach deals with an image for two types of blocks, edge blocks and non-edge blocks. Different from using the bi-clustering approach on all blocks in previous block truncation coding (BTC)-like schemes, A...
Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication is an important issue in its practical application. However,...
Existing secret image sharing (SIS) schemes with steganography and authentication are only suitable for uncompressed grayscale images. To make it more practical, a scheme for sharing and hiding a secret image in color palette images with authentication is proposed in this paper. Three commonly used system color palettes are considered. In sharing p...
A (
$k$
,
$n$
) visual cryptographic scheme (VCS) shares a secret image into
$n$
shadow images that are distributed over
$n$
involved participants. When
$k$
participants stack their shadow images, the secret is revealed. The secret image of VCS is a visual secret. Even though black/white dots in shadows suffer from interference by noise, t...
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment Block Truncation Coding (AMBTC) is one of several compression methods and is appropriate for emb...
A high capacity partial reversible data hiding (PRDH) is introduced in this paper. First of all, an original image is converted to a cover image by the proposed image transformation algorithm. The image transformation algorithm adopts (7,4) Hamming code and minimal pairwise square error to ensure that the generated cover image is an almost distorti...
A (k, n)-threshold secret image sharing (SIS) scheme protects a secret image by dividing it into n shadow images. When any k or more shadow images are collected, the secret image is reconstructed. While any (k−1) or fewer shadows give no clue about the secret. However, all previous SIS schemes do not deal with secure secret image recovery over dist...
We present a method of effectively concealing data in two quantization levels representing blocks based on Absolute Moment Block Truncation Coding (AMBTC) using Hamming code. The reason for choosing AMBTC as the cover media is that AMBTC is not only easily compressible by simple arithmetic operations, but is also efficient for exchanging data in sm...
Video traffic monitoring is an inexpensive and convenient source of traffic data. Traffic images processing are widely used to check traffic conditions and they can determine traffic control strategies in intelligent transportation systems (ITS). However, these traffic images always contain privacy-related data, such as vehicles registration number...
A general framework for partial reversible data hiding is proposed in this paper. The original image is adjusted to form a cover image in image transferring phase. The minimal square error criterion between Hamming codeword and the bits from the original image is adopted to generate the cover image. After image transformation, some bits in the cove...
Due to the great success of convolutional neural networks (CNNs) in the area of computer vision, the existing methods tend to match the global or local CNN features between images for near-duplicate image detection. However, global CNN features are not robust enough to combat background clutter and partial occlusion, while local CNN features lead t...
We present a new data hiding method based on Adaptive BTC Edge Quantization (ABTC-EQ) using an optimal pixel adjustment process (OPAP) to optimize two quantization levels. The reason we choose ABTC-EQ as a cover media is that it is superior to AMBTC in maintaining a high-quality image after encoding is executed. ABTC-EQ is represented by a form of...
A hybrid approach for enhancing the recovered image quality in Shamir’s polynomial based secret image sharing (SIS) is proposed in this paper. To remain computational efficiency, simple modular arithmetic is still used. The fundamental operation in the proposed method is mod P calculation, where P is a prime. A framework for the proposed method is...
Color-black-and-white visual cryptography scheme (CBW-VCS) is a methodology that utilizes colors to alleviate the pixel expansion problem. In a general (k,n) CBW-VCS, when k and n become larger, the pixel expansion increases dramatically. In this paper, two constructions for constituting a (k,n) threshold probabilistic CBW-VCS (PCBW-VCS) are introd...
Recently, Secret Image Sharing (SIS) has attracted more and more researchers’ attention, in which a secret image is divided into several shadows for sharing. In practice, the produced shadows are meaningless, and are easy to be attacked if that shadows are directly used in transmission. In order to overcome the shortcoming, the shadows would be emb...
Relief algorithm is a feature selection algorithm used in binary classification proposed by Kira and Rendell, and its computational complexity remarkable increases with both the scale of samples and the number of features. In order to reduce the complexity, a quantum feature selection algorithm based on Relief algorithm, also called quantum Relief...
Band moiré pattern is produced by the superposition of the base layer with the revealing layer that has a different periodic frequency. Band moiré can effectively describe the geometric transformation of moiré, so that we can design more elements and specific moiré in band moiré image, which can be used to engage and decipher the secret image. Hers...
There are many schemes to detect and identify cheaters when the number of participants is exactly equal to \( t \) in secret sharing schemes. However, most of them need dealers or redundant information to detect the dishonest participants when participants are greater than threshold \( t \). Harn et al. proposed a dynamic threshold secret reconstru...
In 2017, Singh et al. constructed a secure cloud-based (2, 2) secret image sharing with the capability of tampering detection using (r, n) Permutation Ordered Binary (POB) number system. This scheme can solve the problem of secure storage of image-shares at cloud servers, and is also capable of authenticating image-shares at pixel level. However, S...
Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for developing data hiding schemes. All the existing techniques demonstrated steady performance. To further improve performance, in this paper, we present a meth...
Visual cryptography scheme (VCS) shares secret image into shadows. Without computing, stacking shadows can reveal the secret image. In this paper, we propose a VCS with block expansion. Each shadow pixel is expanded into a 4-pixel block with extra secret information embedded in. In the revealing process, the secret image can be revealed by stacking...
This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have...
Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. However, in the text password systems, the main issue is that it is very hard for users to remember long random alphanumeric strings due to the long-term memory limitation of the human brain. To address t...
(k, n)-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into n shadow images distributed among n participants. When any k participants superimposed their shadow images, the secret image can be visually revealed. This stacking operation in decoding process is equivalent to perform OR operation. Basis matri...
Data hiding is a way of hiding secret data on cover-media and it is used for a variety of applications. An important of the data hiding is to conceal the data in a secret way without loss of cover-media. Until now, continuous research on absolute moment block truncation coding based data hiding methods have improved a performance on data concealmen...
Existing secret image sharing (SIS) schemes provided steganography and authentication abilities. But those schemes cannot deal with Absolute Moment Block Truncation Coding (AMBTC) compressed images. Moreover, if the cover image is significant, the distorted stego image cannot be reverted into the original form. In this paper, an invertible SIS sche...
Inspired by Naor et al.’s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the first process, the color information of each pixel from the original secret image is encoded into an n-qubit superposition state by usi...
To protect the copyright of digital videos, video copy detection has become a hot topic in the field of digital copyright protection. Since a video sequence generally contains a large amount of data, to achieve an efficient and effective copy detection, the key issue is to extract compact and discriminative video features. To this end, we propose a...
A secret image sharing (SIS) scheme inserts a secret message into shadow images in a way that if shadow images are combined in a specific way, the secret image can be recovered. A 2-out-of-2 sharing digital image scheme (SDIS) adopts a color palette to share a digital color secret image into two shadow images, and the secret image can be recovered...
Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a well-known MCDH using a covering function COV (1, n = 2k − 1, k). Afterwards, Hamming+ 1 DH (H1DH) was proposed with good embedding efficiency...
Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is obtained by slightly modifying OI. After that, one can embed secret into CI to generate SI. The so-called partial reversible feature...
In previous (k,n) secret image sharing scheme, the threshold k is decided by dealer according to the security requirement, and this threshold value is fixed without considering the dynamic secure environment in future. In this work, we propose a novel threshold changeable secret image sharing scheme where the threshold value can be changed accordin...
Existing secret image sharing (SIS) schemes with steganography and authentication are designed for uncompressed images. They cannot be applied to compressed domain. When the cover image is of significance, these schemes cannot revert the distorted stego image into its original form. To solve these problems, a (k,n) threshold partial reversible abso...
The embedding capacity and stego-image quality are two important features in data-hiding schemes. In 2016, Kuo et al. introduced sparse modified signed-digit (SMSD)-based data hiding that could embed secret data into a group of n cover-pixels. Compared with previous exploiting modification direction (EMD) and generalized EMD (GEMD)-based data hidin...
A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may be compromised when using it as steganography over lossy channel. In this paper, we consider the so-called error spreading problem that one-...
Recently, Tu and Hsu proposed a secret sharing based document protecting scheme. In their scheme, a document is encrypted into n shares using Shamir's (k,n) secret sharing, where the n shares are tied in with a cover document. The document reconstruction can be accomplished by acknowledgement of any k shares and the cover document. In this work, we...
With the advent of 3D video compression and Internet technology, 3D videos have been deployed worldwide. Data hiding is a part of watermarking technologies and has many capabilities. In this paper, we use 3D video as a cover medium for secret communication using a reversible data hiding (RDH) technology. RDH is advantageous, because the cover image...
Exploiting Modification Direction (EMD) based data hiding achieves good stego-image quality and high security level. Recently, a section-wise EMD was proposed to enhance the embedding capacity of EMD. Later, Wang et al. introduced a switch map based multi-group EMD to further improve the embedding capacity. However, by a detail observation on the s...
A new (k,n) threshold secret image sharing scheme with two decoding options is introduced in this paper. The proposed scheme combines color-black-and-white visual cryptography scheme (CBW-VCS) and polynomial based secret image sharing (PSIS) together, to offer stacking-to-see decryption and lossless image reconstruction. To construct the color shar...
Recently, Yang et al. introduced a (k,n) approach called Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) (Yang et al., 2017) to conceal a secret image into n AMBTC shares. However, a large number of reference images is used in their method. To reduce the number of reference images, a (k,n) PRAVCS using one AMBT...
As a popular technology in information security, secret image sharing is a method to guarantee the secret image’s security. Usually, the dealer would decompose the secret image into a series of shadows and then assign them to a number of participants, and only a quorum of participants could recover the secret image. Generally, it is assumed that ev...
This paper proposes a novel method for near-duplicate image elimination, by tracing the original image of each near-duplicate image cluster. For this purpose, image clustering based on the combination of global feature and local feature is firstly achieved in a coarse-to-fine way. To accurately eliminate redundant images of each cluster, image rela...