• 沒有找到結果。

Sharing Secrets in Stego Images with Authentication

N/A
N/A
Protected

Academic year: 2022

Share "Sharing Secrets in Stego Images with Authentication"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Sharing Secrets in Stego Images with Authentication 作者: Chang, C. C.;Hsieh, Y. P.;Lin, C. H.

日期: 2008-10

上傳時間: 2009-12-17T06:57:39Z 出版者: Asia University

摘要: Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego images so as to be transmitted to authorized recipients securely. In addition, these schemes also involve their authentication mechanisms to verify the integrity of the stego images such that the secret image can be restored correctly. Unfortunately, these schemes still have two shortcomings. One is that the weak authentication cannot well protect the integrity of the stego images, so the secret image cannot be recovered completely. The other

shortcoming is that the visual quality of the stego images is not good enough. To overcome such drawbacks, in this paper, we propose a novel secret image sharing scheme combining steganography and

authentication based on Chinese remainder theorem (CRT). The

proposed scheme not only improves the authentication ability but also enhances the visual quality of the stego images. The experimental results show that the proposed scheme is superior to the previously existing methods

參考文獻

相關文件

In this research, we use conventional RGB (Red, Green, Blue) images as input data. The conventional RGB image is demosaiced from raw image by using the color interpolation

T transforms S into a region R in the xy-plane called the image of S, consisting of the images of all points in S.... So we begin by finding the images of the sides

• Zero-knowledge proofs yield no knowledge in the sense that they can be constructed by the verifier who believes the statement, and yet these proofs do convince him..!.

Topic: Curriculum sharing and implementation: Integrating English into alternative curriculum at the first learning stage in the elementary school. 主題

– Change Window Type to Video Scene Editor – Select Add → Images and select all images – Drag the strip to the “1st Frame” in Layer

– For each image, use RANSAC to select inlier features from 6 images with most feature matches. •

Light rays start from pixels B(s, t) in the background image, interact with the foreground object and finally reach pixel C(x, y) in the recorded image plane. The goal of environment

 Local, RADIUS, LDAP authentication presents user with a login page.  On successful authentication the user is redirected to