2
International Journal of Quality & Reliability Management Emerald Article: Consolidation of China's quality transformation efforts: a review Kwai-Sang Chin, Kit-Fai Pun, Hong-Ming Hua Article information: To cite this document: Kwai-Sang Chin, Kit-Fai Pun, Hong-Ming Hua, (2001),"Consolidation of China's quality transformation efforts: a review", International Journal of Quality & Reliability Management, Vol. 18 Iss: 8 pp. 836 - 853 Permanent link to this document: http://dx.doi.org/10.1108/EUM0000000006032 Downloaded on: 18-10-2012 References: This document contains references to 53 other documents Citations: This document has been cited by 12 other documents To copy this document: [email protected] This document has been downloaded 892 times since 2005. * Users who downloaded this Article also downloaded: * Hui Chen, Miguel Baptista Nunes, Lihong Zhou, Guo Chao Peng, (2011),"Expanding the concept of requirements traceability: The role of electronic records management in gathering evidence of crucial communications and negotiations", Aslib Proceedings, Vol. 63 Iss: 2 pp. 168 - 187 http://dx.doi.org/10.1108/00012531111135646 Sandy Bond, (2011),"Barriers and drivers to green buildings in Australia and New Zealand", Journal of Property Investment & Finance, Vol. 29 Iss: 4 pp. 494 - 509 http://dx.doi.org/10.1108/14635781111150367 Charles Inskip, Andy MacFarlane, Pauline Rafferty, (2010),"Organising music for movies", Aslib Proceedings, Vol. 62 Iss: 4 pp. 489 - 501 http://dx.doi.org/10.1108/00012531011074726 Access to this document was granted through an Emerald subscription provided by University of Calgary For Authors: If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service. Information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.com With over forty years' experience, Emerald Group Publishing is a leading independent publisher of global research with impact in business, society, public policy and education. In total, Emerald publishes over 275 journals and more than 130 book series, as well as an extensive range of online products and services. Emerald is both COUNTER 3 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation. *Related content and download information correct at time of download.

Consolidation of China’s quality transformation efforts: a review

Embed Size (px)

Citation preview

International Journal of Quality & Reliability ManagementEmerald Article: Consolidation of China's quality transformation efforts: a reviewKwai-Sang Chin, Kit-Fai Pun, Hong-Ming Hua

Article information:

To cite this document: Kwai-Sang Chin, Kit-Fai Pun, Hong-Ming Hua, (2001),"Consolidation of China's quality transformation efforts: a review", International Journal of Quality & Reliability Management, Vol. 18 Iss: 8 pp. 836 - 853

Permanent link to this document: http://dx.doi.org/10.1108/EUM0000000006032

Downloaded on: 18-10-2012

References: This document contains references to 53 other documents

Citations: This document has been cited by 12 other documents

To copy this document: [email protected]

This document has been downloaded 892 times since 2005. *

Users who downloaded this Article also downloaded: *

Hui Chen, Miguel Baptista Nunes, Lihong Zhou, Guo Chao Peng, (2011),"Expanding the concept of requirements traceability: The role of electronic records management in gathering evidence of crucial communications and negotiations", Aslib Proceedings, Vol. 63 Iss: 2 pp. 168 - 187http://dx.doi.org/10.1108/00012531111135646

Sandy Bond, (2011),"Barriers and drivers to green buildings in Australia and New Zealand", Journal of Property Investment & Finance, Vol. 29 Iss: 4 pp. 494 - 509http://dx.doi.org/10.1108/14635781111150367

Charles Inskip, Andy MacFarlane, Pauline Rafferty, (2010),"Organising music for movies", Aslib Proceedings, Vol. 62 Iss: 4 pp. 489 - 501http://dx.doi.org/10.1108/00012531011074726

Access to this document was granted through an Emerald subscription provided by University of Calgary

For Authors: If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service. Information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.

About Emerald www.emeraldinsight.comWith over forty years' experience, Emerald Group Publishing is a leading independent publisher of global research with impact in business, society, public policy and education. In total, Emerald publishes over 275 journals and more than 130 book series, as well as an extensive range of online products and services. Emerald is both COUNTER 3 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.

*Related content and download information correct at time of download.

Leung B W, Ng F Y, Wong D S (Hong Kong CityUniversity, China)

On the security of a visual cryptography scheme forcolor imagesPattern Recognition (UK)2009 Vol 42 No 5: pp. 929–940SECURITY, VISUAL CRYPTOGRAPHY, COLOR IMAGES

Hou [Visual cryptography for color images, PatternRecognition 36 (2003) 1619-1629] proposed a four-sharevisual cryptography scheme for color images. The schemesplits a dithered eight-color secret image into four shares:the black mask and other three shares. It was claimed thatwithout knowing the black mask, no information about thesecret image can be obtained even if all the other threeshares are known. In this paper, we show that this may betrue for a few specific two-color secret images only. In allother cases, however, security cannot be guaranteed. Weshow that an attacker can compromise a randomly chosentwo-color secret image from any two of the other three

shares with probability47

by completely recovering the

shape and pattern of the secret image. The advantage will

increase to67

if all the three shares are known. If the secret

image has three or four colors, we show that the attacker can

compromise it with probability47

and835

, respectively.

Finally, we show that our technique can be extended tocompromising secret images with more than four colors.

18_804

| 1