Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shih-Yu Huang is active.

Publication


Featured researches published by Shih-Yu Huang.


Pattern Recognition | 2007

Sharing multiple secrets in visual cryptography

Shyong Jian Shyu; Shih-Yu Huang; Yeuan-Kuen Lee; Ran-Zan Wang; Kun Chen

The secret sharing schemes in conventional visual cryptography are characterized by encoding one shared secret into a set of random transparencies which reveal the secret to the human visual system when they are superimposed. In this paper, we propose a visual secret sharing scheme that encodes a set of x≥2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles. This is the first true result that discusses the sharing ability in visual cryptography up to any general number of multiple secrets in two circle shares.


Multimedia Tools and Applications | 2010

An efficient segmentation algorithm for CAPTCHAs with line cluttering and character warping

Shih-Yu Huang; Yeuan-Kuen Lee; Graeme Bell; Zhan-he Ou

A CAPTCHA is a test designed to distinguish computer programs from human beings, in order to prevent the abuse of networked resources. Academic research into CAPTCHAs includes designing friendly and secure CAPTCHA systems and defeating existing CAPTCHA systems. Traditionally, defeating a CAPTCHA test requires two procedures: segmentation and recognition. Recent research shows that the problem of segmentation is much harder than recognition. In this paper, two new segmentation techniques called projection and middle-axis point separation are proposed for CAPTCHAs with line cluttering and character warping. Experimental results show the proposed techniques can achieve segmentation rates of about 75%.


pacific-rim symposium on image and video technology | 2009

An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding

Yeuan-Kuen Lee; Graeme Bell; Shih-Yu Huang; Ran-Zan Wang; Shyong Jian Shyu

The advantages of Least-Significant-Bit (LSB) steganographic data embedding are that it is simple to understand, easy to implement, and it results in stego-images that contain hidden data yet appear to be of high visual fidelity. However, it can be shown that under certain conditions, LSB embedding is not secure at all. The fatal drawback of LSB embedding is the existence of detectable artifacts in the form of pairs of values (PoVs). The goals of this paper are to present a theoretic analysis of PoVs and to propose an advanced LSB embedding scheme that possesses the advantages of LSB embedding suggested above, but which also provides an additional level of communication security. The proposed scheme breaks the regular pattern of PoVs in the histogram domain, increasing the difficulty of steganalysis and thereby raising the level of security. The experimental results show that both the Chi-square index and RS index are less than 0.1, i.e., the hidden message is undetectable by the well-known Chi-square and RS steganalysis attacks.


international conference on innovative computing, information and control | 2007

Multilevel Visual Secret Sharing

Ran-Zan Wang; Yeuan-Keun Lee; Shih-Yu Huang; Tsorng-Lin Chia

This paper presents a novel visual secret sharing (VSS) scheme, called the multilevel VSS scheme, for sharing multiple visual secrets in an image among n participants. In the proposed n-level VSS scheme, the content of an image S is distributed to n levels of secrecy, and encoded to n+1 shares that exhibit the following features: (a) each share does not reveal any secret in S, (b) any k (2 les k les n+1) shares can be used to reveal k-1 levels of secrecy, (c) all secrets in S can be disclosed when all of the n+1 shares are available and (d) the secrets are revealed by visual inspection of the appropriately stacked shares without any computation.


IEEE Transactions on Multimedia | 2008

A Vision-Based Augmented-Reality System For Multiuser Collaborative Environments

Yen-Hsu Chen; Tsorng-Lin Chia; Yeuan-Kuen Lee; Shih-Yu Huang; Ran-Zan Wang

This work presented a novel vision-based augmented-reality system for applications in multiuser collaborative environments. The kernel technology of this vision-based system locates the cameras that are utilized to point and simulate the positions of multiple viewers. Camera calibration based on computer vision is employed during the cameras locating process. The applications in multiuser collaborative environments allow the viewers to view various positions and in numerous directions. However, traditional calibration approaches are not suitable for these cases sufficiently. A novel calibration pattern based on pseudo-random arrays is designed for multiuser collaborative applications. The pattern has a simple and regular structure, easily extracts features, achieves robust recognition using local information, and does not limit viewer positions and directions. Experimental results indicate that the proposed system provides a effective platform for applications in multiuser collaborative environments.


international conference on genetic and evolutionary computing | 2012

Verifiable Visual Cryptography

Shuo-Fang Hsu; Yu-Jie Chang; Ran-Zan Wang; Yeuan-Kuen Lee; Shih-Yu Huang

The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. The idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together. The visual coherent among the revealed patterns of all pair of shares provides evidence to the genuine of the shares engaged in the decoding process. Compare to the reported cheating prevention VC schemes, the proposed scheme maintains the original pixel expansion in VC scheme without cheating prevention ability, and the share verification process is done without resorting to any additional verification image. Besides, the proposed verification mechanism can easily be attached to any VC schemes in the literature to endow legitimate user with the ability to prevent cheating from malicious participants.


intelligent information hiding and multimedia signal processing | 2009

Multisecret Image Sharing

Ran-Zan Wang; Yung-Yi Lin; Shang-Kuan Chen; Yeuan-Kuen Lee; Shih-Yu Huang; Shyong Jian Shyu

This paper proposes a multisecret image sharing (MSIS) scheme for sharing multiple secrets in an image among n participants. In the proposed n-level MSIS scheme, the content of an image S is designated to multiple regions associate with n levels of secrets, and encoded to n+1 shadow images which exhibit the following features: (a) each shadow image cannot get any region in S, (b) any t (2


Optical Engineering | 2006

Threshold-based successive elimination algorithm for block motion estimation

Shih-Yu Huang; Yeuan-Kuen Lee; Ran-Zan Wang; Yen-Hsu Chen

The successive elimination algorithm (SEA) has already proved successful in block motion estimation. This paper presents a simple and efficient algorithm called the threshold-based SEA as a search engine to take advantage of the simplicity of the SEA while avoiding its redundant computation. In addition, the threshold-based SEA utilizes a threshold adaptation mechanism to efficiently distribute the available computational power of the employed codec to blocks of video sequences. Since the threshold-based approach is performed at each search candidate block, it can be combined not only with the SEA but also with other fast algorithms, including the three-step search, the block-based gradient descent search, and the diamond search. Depending on the motion activity in the sequences, experimental results indicate that the threshold-based approach can uniformly achieve a quality improvement over the original SEA for the same computation.


Optics Communications | 2010

Incrementing visual cryptography using random grids

Ran-Zan Wang; Yung-Ching Lan; Yeuan-Kuen Lee; Shih-Yu Huang; Shyong Jian Shyu; Tsorng-Lin Chia


australasian user interface conference | 2011

A new CAPTCHA interface design for mobile devices

Rosa Lin; Shih-Yu Huang; Graeme Baxter Bell; Yeuan-Kuen Lee

Collaboration


Dive into the Shih-Yu Huang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kuei-Pin Kuo

National Pingtung University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge