Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shenchuan Liu is active.

Publication


Featured researches published by Shenchuan Liu.


international symposium on intelligent signal processing and communication systems | 2011

A leakage suppressed two-level security visual secret sharing scheme

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya

This paper proposes a new scheme of visual secret sharing which serves two-level security for color images. The proposed scheme splits a secret color image into four pieces referred to as shares; a black-and-white mask share and three color component shares, namely, red, green, and blue. All shares in this scheme are random binary images and each share is delivered to a different user to keep the image secret. In the scheme, the secrecy of the image can remain intact even three color component shares are gathered, that is, two-level security is served. The conventional scheme having the above mentioned features has the risk of information leakage even without the mask share. In contrast, the proposed scheme suppresses the possibility of information leakage in exchange for introducing low contrast recovered images.


international workshop on digital watermarking | 2013

A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya

A visual secret sharing (VSS) scheme with minimum pixel expansion is proposed to prevent malicious participants from deceiving an honest participant. A VSS scheme encrypts a secret image into pieces referred to as shares where each participant keeps a share so that stacking sufficient number of shares recovers the secret image. A cheat prevention VSS scheme provides another piece for each participant for verifying whether the shares presented by other participants are genuine. The proposed scheme improves the contrast of the recovered image and cheat-prevention functionality by introducing randomness in producing pieces for verification. Experimental results show the effectiveness of the proposed scheme.


international conference on image processing | 2014

A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya

This paper proposes a cheat-prevention method of visual cryptography (VC) for binary images. A VC technique encrypts a secret image into images referred to as shares so that stacking sufficient shares recovers the secret image, where shares are kept by different parties. The proposed method prevents malicious parties from deceiving an honest party, i.e., from cheating the honest party. To fight cheating, no further pixel expansion is introduced to the proposed method, so this method improves the contrast of recovered secret image and cheat-prevention functionality.


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2013

An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya


IEICE Transactions on Information and Systems | 2014

An Efficient Compression of Amplitude-Only Images for the Image Trading System

Shenchuan Liu; Wannida Sae-Tang; Masaaki Fujiyoshi; Hitoshi Kiya


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2014

A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000

Wannida Sae-Tang; Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya


computer and information technology | 2014

1D Frequency Transformation- Based Amplitude- Only Images for Copyright- and Privacy- Protection in Image Trading Systems

Wannida Sae-Tang; Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya


電子情報通信学会技術研究報告. EMM, マルチメディア情報ハイディング・エンリッチメント | 2012

A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems (メディア工学)

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya


電気学会研究会資料. CMN, 通信研究会 | 2012

A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya


電子情報通信学会技術研究報告. LOIS, ライフインテリジェンスとオフィス情報システム | 2012

A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems (ライフインテリジェンスとオフィス情報システム)

Shenchuan Liu; Masaaki Fujiyoshi; Hitoshi Kiya

Collaboration


Dive into the Shenchuan Liu's collaboration.

Top Co-Authors

Avatar

Hitoshi Kiya

Sumitomo Electric Industries

View shared research outputs
Top Co-Authors

Avatar

Masaaki Fujiyoshi

Sumitomo Electric Industries

View shared research outputs
Top Co-Authors

Avatar

Wannida Sae-Tang

Tokyo Metropolitan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge