ASIA unversity:Item 310904400/4410
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 90120/105277 (86%)
造访人次 : 8144015      在线人数 : 1817
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊傳播學系 > 期刊論文 >  Item 310904400/4410


    题名: Secret image sharing with steganography and authentication
    作者: C. C. Lin;W. H. Tsai
    贡献者: Department of Information Communication
    关键词: Secret image sharing;Steganography;Authentication;Camouflage image;Data hiding;Stego-image;Fragile watermarking;Least significant bit replacement
    日期: 2004
    上传时间: 2009-11-25 10:31:15 (UTC+8)
    出版者: Asia University
    摘要: A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pictures, etc., to increase the steganographic effect for the security protection purpose. Furthermore, an image watermarking technique is employed to embed fragile watermark signals into the camouflage images by the use of parity-bit checking, thus providing the capability of authenticating the fidelity of each processed camouflage image, called a stego-image. During the secret image recovery process, each stego-image brought by a participant is first verified for its fidelity by checking the consistency of the parity conditions found in the image pixels. This helps to prevent the participant from incidental or intentional provision of a false or tampered stego-image. The recovery process is stopped if any abnormal stego-image is found. Otherwise, the secret image is recovered from k or more authenticated stego-images. Some effective techniques for handling large images as well as for enhancing security protection are employed, including pixelwise processing of the secret image in secret sharing, use of parts of camouflage images as share components, adoption of prime-number modular arithmetic, truncation of large image pixel values, randomization of parity check policies, etc. Consequently, the proposed scheme as a whole offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. Good experimental results proving the feasibility of the proposed approach are also included.
    關聯: Journal of Systems & Software 73 (3): 405-414
    显示于类别:[資訊傳播學系] 期刊論文


    档案 描述 大小格式浏览次数
    310904400-4410.doc35KbMicrosoft Word377检视/开启


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈