WEKO3
アイテム
{"_buckets": {"deposit": "ad2f7dde-6d0b-48fe-b99c-2eaa5da352d2"}, "_deposit": {"created_by": 15, "id": "109", "owners": [15], "pid": {"revision_id": 0, "type": "depid", "value": "109"}, "status": "published"}, "_oai": {"id": "oai:u-aizu.repo.nii.ac.jp:00000109", "sets": ["7"]}, "author_link": ["53", "54", "55", "56"], "control_number": "109", "item_10010_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2014", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "7395", "bibliographicPageStart": "7391", "bibliographic_titles": [{"bibliographic_title": "Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014)", "bibliographic_titleLang": "en"}]}]}, "item_10010_description_19": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "PDF", "subitem_description_type": "Other"}]}, "item_10010_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Secret sharing is a method of generating multiple shares from secret information so that only a qualified set of shares can be employed to recover this secret information. Visual secret sharing (VSS) is an example of secret sharing; its decryption can be performed by using human eyes without a computer.This paper provides a formulation of encryption for multiple secret images, which is a generalization of the existing ones,and also a general method of constructing VSS schemes encrypting multiple secret images.", "subitem_description_type": "Abstract"}]}, "item_10010_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_10010_relation_17": {"attribute_name": "関連サイト", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "IEEE Xplore"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6855036", "subitem_relation_type_select": "URI"}}, {"subitem_relation_name": [{"subitem_relation_name_text": "IEEE Copyright Form"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://www.ieee.org/publications_standards/publications/rights/copyrightmain.html", "subitem_relation_type_select": "URI"}}]}, "item_10010_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "佐々木, 愛美", "creatorNameLang": "ja"}, {"creatorName": "ササキ, マナミ", "creatorNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "53", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "渡邊, 曜大", "creatorNameLang": "ja"}, {"creatorName": "ワタナベ, ヨウダイ", "creatorNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "54", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sasaki, Manami", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "55", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Watanabe, Yodai", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-07-29"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "icassp2014vss.pdf", "filesize": [{"value": "230.8 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_11", "mimetype": "application/pdf", "size": 230800.0, "url": {"label": "国際会議予稿集1(渡邊)", "url": "https://u-aizu.repo.nii.ac.jp/record/109/files/icassp2014vss.pdf"}, "version_id": "474361d9-2068-48f3-bd6f-9236084dac69"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Visual secret sharing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Information-theoretic security", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Multiple secret images", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "other", "resourceuri": "http://purl.org/coar/resource_type/c_1843"}]}, "item_title": "Formulation of visual secret sharing schemes encrypting multiple images", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Formulation of visual secret sharing schemes encrypting multiple images", "subitem_title_language": "en"}]}, "item_type_id": "10010", "owner": "15", "path": ["7"], "permalink_uri": "https://u-aizu.repo.nii.ac.jp/records/109", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2015-07-29"}, "publish_date": "2015-07-29", "publish_status": "0", "recid": "109", "relation": {}, "relation_version_is_last": true, "title": ["Formulation of visual secret sharing schemes encrypting multiple images"], "weko_shared_id": -1}
Formulation of visual secret sharing schemes encrypting multiple images
https://u-aizu.repo.nii.ac.jp/records/109
https://u-aizu.repo.nii.ac.jp/records/109a6c68dd6-947b-4a8f-98be-1b76b68f0dbe
名前 / ファイル | ライセンス | アクション |
---|---|---|
国際会議予稿集1(渡邊) (230.8 kB)
|
Item type | その他 / Others(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2015-07-29 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Formulation of visual secret sharing schemes encrypting multiple images | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Visual secret sharing | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Information-theoretic security | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Multiple secret images | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_1843 | |||||
資源タイプ | other | |||||
著者 |
佐々木, 愛美
× 佐々木, 愛美× 渡邊, 曜大× Sasaki, Manami× Watanabe, Yodai |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Secret sharing is a method of generating multiple shares from secret information so that only a qualified set of shares can be employed to recover this secret information. Visual secret sharing (VSS) is an example of secret sharing; its decryption can be performed by using human eyes without a computer.This paper provides a formulation of encryption for multiple secret images, which is a generalization of the existing ones,and also a general method of constructing VSS schemes encrypting multiple secret images. | |||||
書誌情報 |
en : Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014) p. 7391-7395, 発行日 2014 |
|||||
出版者 | ||||||
言語 | en | |||||
出版者 | IEEE | |||||
関連サイト | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6855036 | |||||
関連名称 | IEEE Xplore | |||||
関連サイト | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://www.ieee.org/publications_standards/publications/rights/copyrightmain.html | |||||
関連名称 | IEEE Copyright Form | |||||
フォーマット | ||||||
内容記述タイプ | Other | |||||
内容記述 | ||||||
著者版フラグ | ||||||
出版タイプ | AM | |||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa |