• 沒有找到結果。

Secret image sharing with steganography and authentication

N/A
N/A
Protected

Academic year: 2022

Share "Secret image sharing with steganography and authentication"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Secret image sharing with steganography and authentication 作者: C. C. Lin;W. H. Tsai

貢獻者: Department of Information Communication

關鍵詞: Secret image sharing;Steganography;Authentication;Camouflage image;Data hiding;Stego-image;Fragile watermarking;Least significant bit replacement 日期: 2004

上傳時間: 2009-11-25T02:31:15Z 出版者: Asia University

摘要: A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user- selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pictures, etc., to increase the steganographic effect for the security protection purpose. Furthermore, an image watermarking technique is employed to embed fragile watermark signals into the camouflage images by the use of parity-bit checking, thus providing the capability of authenticating the fidelity of each processed camouflage image, called a stego-image. During the secret image recovery process, each stego-image brought by a participant is first verified for its fidelity by checking the consistency of the parity conditions found in the image pixels. This helps to prevent the participant from incidental or intentional provision of a false or tampered stego-image. The recovery process is stopped if any abnormal stego-image is found. Otherwise, the secret image is recovered from k or more authenticated stego-images. Some effective techniques for handling large images as well as for enhancing security protection are employed, including pixelwise processing of the secret image in secret sharing, use of parts of camouflage images as share components, adoption of prime-number modular arithmetic, truncation of large image pixel values, randomization of parity check policies, etc. Consequently, the proposed scheme as a whole offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. Good experimental results proving the feasibility of the proposed approach are also included.

參考文獻

相關文件

How would this task help students see how to adjust their learning practices in order to improve?..

Heal the World Michael Jackson You Raise Me Up Secret Garden Climb Every Mountain Rodgers & Hammerstein You are My Hiding Place Selah. God Will Make a Way

The Composite CPI for March 2008 dropped slightly by 0.08% month-to-month, with lower charges for outbound package tours and hairdressing services, as well as lower prices of

( tongjiao). This represents the earliest stratum of Diamond Sutra comme ntary.. 2)Explanation of the Diamond Sutra (Jin'gangjing jieyi) and Secret Oral T eachings on theDiamond

Ongoing Projects in Image/Video Analytics with Deep Convolutional Neural Networks. § Goal – Devise effective and efficient learning methods for scalable visual analytic

– S+U can also preserve annotations of synthetic images – Refined images really help improving the testing result – Generate > 1 images for each synthetic

For example, both Illumination Cone and Quotient Image require several face images of different lighting directions in order to train their database; all of

“A feature re-weighting approach for relevance feedback in image retrieval”, In IEEE International Conference on Image Processing (ICIP’02), Rochester, New York,