Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tang Dan is active.

Publication


Featured researches published by Tang Dan.


computer science and software engineering | 2008

Image Encryption Based on Bivariate Polynomials

Tang Dan; Wang Xiaojing

Encryption of image is different from that of texts due to some intrinsic features of images: large amount of data, highly redundancy, strong correlation among pixels and so on. Therefore, the encryption result is not very well if we used the traditional encryption methods to encrypt images. The paper proposes a new method of image encryption based on bivariate polynomials; another image is used as the key in which method. Because the size of the image key could be much smaller than the secret image, we can hold it expediently. And the method can expand to the video encryption field, and has a good perspective.


asia-pacific conference on wearable computing systems | 2010

Secret Image Sharing Based on Array Codes

Wang Yiding; Wang Xiaojing; Tang Dan

A new secret image sharing scheme is proposed in this paper, and which scheme is based on array codes. Any type digital images can be shared by the new method, and compared to other secret image sharing schemes, all the calculations of the new scheme only uses XOR operations, so it is very efficiently. And more, the new scheme can share multi secret images, all shadow images can have clear visual significance, and pixels of all images including secret images and shadow images would not be expanded. In addition, the new method can extend to audio and video areas easily, so we think this method will have a good perspective.


wase international conference on information engineering | 2009

An Efficient Copyright Protection Technique for Digital Images Based on Finite Groups

Wang Yiding; Wang Xiaojing; Tang Dan

It is well known that a digital signature scheme and digital timestamp are two well-defined security methods for copyright protection. However, these techniques are not suitable for dealing with digital images directly because of some intrinsic features of digital images such as large amount of data, highly redundancy, and strong correlation among pixels. For this reason, digital watermarking has received considerable attention for copyright protection. In this paper, a robust copyright protection scheme for digital image is proposed. In the new scheme, Color images can be used as the watermark is an important characteristic and the watermark does not require to be embedded into the protected image but is used to generate a secret image by addition operations over finite groups, then the secret image is registered to certified authority (CA) for further protection. The experimental results show that the proposed scheme not only can clearly verify the copyright of the digital image, but also is robust to withstand many image processing attacks.


Archive | 2013

Distributed adaptive coding and storing method

Cai Hongliang; Chen Zheng; Fang Jiajia; Jiang Haibo; Sun Xuandong; Tang Dan; Wang Qian; Wang Xiaojing; Wang Yiding; Xiao Yilong


Archive | 2013

Method for secretly sharing and restoring digital image

Tang Dan; Shu Hongping; Fang Jiajia


Archive | 2017

Medical ancient Chinese sentence segmentation method based on Bayesian statistics learning

Wang Yaqiang; Liu Yin; Tang Dan; Shu Hongping


Archive | 2017

Construction method of check matrix and construction method of horizontal array erasure codes

Tang Dan; Shu Hongping; Wang Yaqiang


Archive | 2016

Share dimension reducing method of (2,2) threshold secret sharing

Tang Dan; Shu Hongping; Wang Yaqiang; Gao Yan; Wen Liyu; Yue Xi


Archive | 2016

(k, n) threshold secret sharing-based failure share recovery method

Tang Dan; Shu Hongping; Yang Yang; Wang Yaqiang; Zhao Zhuoning; Liu Kui; Cao Liang; Luo Fei


Archive | 2016

Coding fault-tolerance method for array type storage system

Tang Dan; Shu Hongping; Wang Yaqiang; Liu Dunlong; Luo Fei

Collaboration


Dive into the Tang Dan's collaboration.

Top Co-Authors

Avatar

Shu Hongping

Chengdu University of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Xiaojing

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wang Yiding

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Fang Jiajia

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jiang Haibo

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Luo Fei

Chengdu University of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Xiao Yilong

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Liu Kui

Chengdu University of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Yuantu

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge