完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, CCen_US
dc.contributor.authorTsai, WHen_US
dc.date.accessioned2014-12-08T15:37:20Z-
dc.date.available2014-12-08T15:37:20Z-
dc.date.issued2004-11-01en_US
dc.identifier.issn0164-1212en_US
dc.identifier.urihttp://dx.doi.org/10.1016/S0164-1212(03)00239-5en_US
dc.identifier.urihttp://hdl.handle.net/11536/25664-
dc.description.abstractA novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pictures, etc., to increase the steganographic effect for the security protection purpose. Furthermore, an image watermarking technique is employed to embed fragile watermark signals into the camouflage images by the use of parity-bit checking, thus providing the capability of authenticating the fidelity of each processed camouflage image, called a stego-image. During the secret image recovery process, each stego-image brought by a participant is first verified for its fidelity by checking the consistency of the parity conditions found in the image pixels. This helps to prevent the participant from incidental or intentional provision of a false or tampered stego-image. The recovery process is stopped if any abnormal stego-image is found. Otherwise, the secret image is recovered from k or more authenticated stego-images. Some effective techniques for handling large images as well as for enhancing security protection are employed, including pixelwise processing of the secret image in secret sharing, use of parts of camouflage images as share components, adoption of prime-number modular arithmetic, truncation of large image pixel values, randomization of parity check policies, etc. Consequently, the proposed scheme as a whole offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. Good experimental results proving the feasibility of the proposed approach are also included. (C) 2003 Elsevier Inc. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectsecret image sharingen_US
dc.subjectsteganography authenticationen_US
dc.subjectcamouflage imageen_US
dc.subjectdata hidingen_US
dc.subjectstego-imageen_US
dc.subjectfragile watermarkingen_US
dc.subjectleast significant bit replacementen_US
dc.titleSecret image sharing with steganography and authenticationen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/S0164-1212(03)00239-5en_US
dc.identifier.journalJOURNAL OF SYSTEMS AND SOFTWAREen_US
dc.citation.volume73en_US
dc.citation.issue3en_US
dc.citation.spage405en_US
dc.citation.epage414en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000224158900005-
dc.citation.woscount113-
顯示於類別:期刊論文


文件中的檔案:

  1. 000224158900005.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。