Kai-Hui Lee
Ming Chuan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kai-Hui Lee.
IEEE Transactions on Information Forensics and Security | 2012
Kai-Hui Lee; Pei-Ling Chiu
Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. However, the previous approaches involving the EVCS for general access structures suffer from a pixel expansion problem. In addition, the visual cryptography (VC)-based approach needs a sophisticated codebook design for various schemes. In this paper, we propose a general approach to solve the above- mentioned problems; the approach can be used for binary secret images in noncomputer-aided decryption environments. The pro- posed approach consists of two phases. In the first phase, based on a given access structure, we construct meaningless shares using an optimization technique and the construction for conventional VC schemes. In the second phase, cover images are added in each share directly by a stamping algorithm. The experimental results indicate that a solution to the pixel expansion problem of the EVCS for GASs is achieved. Moreover, the display quality of the recovered image is very close to that obtained using conventional VC schemes.
Expert Systems With Applications | 2010
Tsung-Lieh Lin; Shi-Jinn Horng; Kai-Hui Lee; Pei-Ling Chiu; Tzong-Wann Kao; Yuan-Hsin Chen; Ray-Shine Run; Jui-Lin Lai; Rong-Jian Chen
The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be revealed by printing the share images on transparencies and stacking the transparencies directly, so that the human visual system can recognize the shared secret image without using any devices. The visual secrets sharing scheme for multiple secrets (called VSSM scheme) is intended to encrypt more than one secret image into the same quantity of share images to increase the encryption capacity compared with the original VSS scheme. However, all presented VSSM schemes utilize a pre-defined pattern book with pixel expansion to encrypt secret images into share images. In general, it leads to at least 2x times pixel expansion on the share images by any one of the VSSM schemes. Thus, the pixel expansion problem becomes more serious for sharing multiple secrets. This is neither a practical nor the best solution for increasing the number of secret sharing images. In this paper, we propose a novel VSSM scheme that can share two binary secret images on two rectangular share images with no pixel expansion. The experimental results show that the proposed approach not only has no pixel expansion, but also has an excellent recovery quality for the secret images. As our best knowledge, this is the first approach that can share multiple visual secret images without pixel expansion.
IEEE Transactions on Information Forensics and Security | 2011
Pei-Ling Chiu; Kai-Hui Lee
Reducing the pixel expansion and improving the display quality of recovered images are still major issues in visual cryptography schemes (VCSs), particularly for large k and n. Moreover, the development of a systematic and practical approach for threshold VCSs is a challenge. In this paper, a pixel-expansion-free threshold VCSs approach based on an optimization technique is proposed in order to encrypt binary secret images. In addition to contrast, we consider blackness as a performance metric in the evaluation of the display quality of recovered images. We first formulate the problem as a mathematical optimization model in order to maximize the contrast of recovered images that are subject to density-balance and blackness constraints. We then develop a simulated-annealing-based algorithm to solve this problem. Furthermore, we try to promote the contrast by slightly relaxing the density-balance constraint. The experimental results show that the proposed optimization-based approach significantly outperforms previous methods in terms of both the pixel expansion factor and the display quality of recovered images.
IEEE Transactions on Image Processing | 2013
Kai-Hui Lee; Pei-Ling Chiu
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
IEEE Transactions on Information Forensics and Security | 2014
Kai-Hui Lee; Pei-Ling Chiu
Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares. Hence, VSS schemes suffer from a transmission risk problem for the secret itself and for the participants who are involved in the VSS scheme. To address this problem, we proposed a natural-image-based VSS scheme (NVSS scheme) that shares secret images via various carrier media to protect the secret and the participants during the transmission phase. The proposed (n,n)- NVSS scheme can share one digital secret image over n-1 arbitrary selected natural images (called natural shares) and one noise-like share. The natural shares can be photos or hand-painted pictures in digital form or in printed form. The noise-like share is generated based on these natural shares and the secret image. The unaltered natural shares are diverse and innocuous, thus greatly reducing the transmission risk problem. We also propose possible ways to hide the noise-like share to reduce the transmission risk problem for the share. Experimental results indicate that the proposed approach is an excellent solution for solving the transmission risk problem for the VSS schemes.
Signal Processing | 2015
Pei-Ling Chiu; Kai-Hui Lee
User-friendly threshold visual cryptography schemes (denoted (k,n)-FVCS) generate meaningful shares to cope with the management problem of conventional threshold visual cryptography. However, several issues remain in this research field, including: the pixel expansion problem, the residual traces problem, inter-images interference on meaningful shares, the inability to adjust visual quality, the lack of systematic encryption methods, and others. To solve these problems, this paper proposes a novel (k,n)-FVCS for sharing binary secret images in non-computer-aided decryption environments. Based on the probabilistic (k,n)-VCS, we propose a systematic method for embedding complementary cover images in shares for constructing the (k,n)-FVCSs. The proposed approach can address the above-mentioned issues of (k,n)-FVCSs for all k and n. In addition, the experimental results indicate that the proposed (k,n)-FVCS significantly outperforms the previous methods in terms of the visual quality of the recovered images and of the meaningful shares. We propose a user-friendly threshold visual cryptography construction.Embedding complementary cover images into meaningful shares.A systematic approach for general (k,n)-FVCS.
IEEE Transactions on Image Processing | 2014
Kai-Hui Lee; Pei-Ling Chiu
Visual cryptography schemes (VCSs) generate random and meaningless shares to share and protect secret images. Conventional VCSs suffer from a transmission risk problem because the noise-like shares will raise the suspicion of attackers and the attackers might intercept the transmission. Previous research has involved in hiding shared content in halftone shares to reduce these risks, but this method exacerbates the pixel expansion problem and visual quality degradation problem for recovered images. In this paper, a binocular VCS (BVCS), called the \((2,n)\) -BVCS, and an encryption algorithm are proposed to hide the shared pixels in the single image random dot stereograms (SIRDSs). Because the SIRDSs have the same 2D appearance as the conventional shares of a VCS, this paper tries to use SIRDSs as cover images of the shares of VCSs to reduce the transmission risk of the shares. The encryption algorithm alters the random dots in the SIRDSs according to the construction rule of the \((2,n)\) -BVCS to produce nonpixel-expansion shares of the BVCS. Altering the dots in a SIRDS will degrade the visual quality of the reconstructed 3D objects. Hence, we propose an optimization model that is based on the visual quality requirement of SIRDSs to develop construction rules for a \((2,n)\) -BVCS that maximize the contrast of the recovered image in the BVCS.
world congress on intelligent control and automation | 2012
Pei-Ling Chiu; Kai-Hui Lee; K.-W. Peng; S.-Y. Cheng
Conventional visual secret sharing (VSS) schemes generate noise-like random pixels on shares to hide secret images. However, these schemes suffer from two problems, one related to security and one related to management. First, the noise-like shares arouse suspicion, which leads to security problems for participants who are involved in a VSS scheme. Second, participants cannot visually identify each share, especially if they hold more than one share simultaneously, which leads to the management problem. To address the management problem previous researchers developed extended visual cryptography schemes that add a meaningful cover image on each share. Generally, however, these approaches introduce a more serious pixel expansion problem than conventional VSS schemes. In addition, there are still many noise-like shares, which do not effectively reduce the security problems. This paper proposes a natural-image-based secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In such a way, the unaltered natural images are innocuous, thus greatly reducing the security problem. Experimental results indicate that the proposed approach is an excellent solution for solving the management and security problems. Moreover, the proposed approach avoids the pixel expansion problem and makes it possible to totally recover the secret images.
canadian conference on electrical and computer engineering | 2004
Pei-Ling Chiu; Yie-Tarng Chen; Kai-Hui Lee
The request scheduling is the problem of. finding a schedule for a given set of book-ahead (BA) requests connection, with the goal of maximizing the profit obtained from the accepted BA requests. The problem is considered in a scenario with advance reservations where users can specify a flexible duration for when they want their connections to be established. In this paper, we focus the problem on a subnet. The major concerned performance metrics are the resource utilization as well as the rejection ratio of the BA requests. We introduce an oversubscribed policy to support the request scheduling in a batching fashion. The request scheduling is a combinatorial problem. We formulated the problem as the 0/1 multiple-choice multi-dimensional knapsack problem (MMKP). The 0/1 MMKP is NP-hard. Hence, algorithms for finding the exact solution of 0/1 MMKP are not suitable for the proposed request-scheduling problem, especially for a large-scale network. In this paper, we present a heuristic based upon the simulated annealing algorithms for the 0/1 MMKP. Finally, simulation results show that the proposed approach can notably improve the resource utilization.
Optics Communications | 2011
Kai-Hui Lee; Pei-Ling Chiu