首页> 外文期刊>The Journal of Systems and Software >Secret image sharing with authentication-chaining and dynamic embedding
【24h】

Secret image sharing with authentication-chaining and dynamic embedding

机译:通过身份验证链和动态嵌入进行秘密图像共享

获取原文
获取原文并翻译 | 示例
           

摘要

A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in rTcover" images. The resulting "stego" images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker's attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers (Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.
机译:在n个参与者之间共享秘密图像的一种流行技术是将其首先分成一些阴影图像,然后将阴影嵌入“ rTcover”图像中,然后将包含嵌入数据的“ stego”图像分布在预期的接收者中。为了不引起攻击者的注意,重要的是应用适当的嵌入以生成高质量的隐身图像,并且,为了确保隐身数据的完整性,应该实现一种鲁棒的身份验证机制,该机制可以检测到高概率的篡改。最近,一系列论文(Lin和Tsai,2004; Yang等,2007; Chang等,2008; Yang和Ciou,2009)考虑了基于多项式的秘密图像共享与隐写技术和认证。在所有这些论文中都是静态的,即隐藏位被嵌入到每个封面图像的预定固定大小的块中,因此有可能仅在部分隐藏子集中替换所有隐藏数据。封面图像块,而其他块保持不变。对于身份验证,这些方案中的最佳方案以15/16的概率检测到被篡改的Stego块,但是,由于这是以每块使用4个身份验证位为代价而获得的,因此Stego图像的视觉质量会严重下降。在本文中,我们提出了一种新的基于多项式的秘密图像共享方案,该方案具有两个成果。首先,提出一种新的嵌入方法,以便根据隐藏数据的大小动态确定块的大小,因此,将封面图像的所有容量都用于数据隐藏。其次,我们介绍了一种新的身份验证链接方法,该方法仅使用2个身份验证位即可达到15/16的篡改检测能力。实验结果证实了这一理论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号