{"title":"带有图像处理的消息加密","authors":"S. Ashar, T. M. Shah, R. Khalid","doi":"10.1109/INMIC.2003.1416607","DOIUrl":null,"url":null,"abstract":"The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The \"compression module\" gives the benefit of entropy coding. The \"cryptographic module\" provides confidentiality in the communication. To preserve integrity of data, the \"hash module\" is used with a shared secret key. A technique is proposed in which it is not required that the receiver should know the secret key before reception of the message. For the \"steganographic module\", an image steganographic method is proposed that is derived from the method of Yeuan-Kuen Lee and Ling-Hwei Chen (see IEEE Proc. Vision, Image and Sig. Process., 2000). As compared to that method, we make little use of the smooth regions of the cover image that provides better image fidelity and perceptual transparency. The proposed method can also hide data in 24 bit true color images. Furthermore, we spread the data on the whole image instead of using part of the image. This steganographic method is used to hide the encrypted communication. Experimental results show the effectiveness and efficiency of the proposed model","PeriodicalId":253329,"journal":{"name":"7th International Multi Topic Conference, 2003. INMIC 2003.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Message encryption with image processing\",\"authors\":\"S. Ashar, T. M. Shah, R. Khalid\",\"doi\":\"10.1109/INMIC.2003.1416607\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The \\\"compression module\\\" gives the benefit of entropy coding. The \\\"cryptographic module\\\" provides confidentiality in the communication. To preserve integrity of data, the \\\"hash module\\\" is used with a shared secret key. A technique is proposed in which it is not required that the receiver should know the secret key before reception of the message. For the \\\"steganographic module\\\", an image steganographic method is proposed that is derived from the method of Yeuan-Kuen Lee and Ling-Hwei Chen (see IEEE Proc. Vision, Image and Sig. Process., 2000). As compared to that method, we make little use of the smooth regions of the cover image that provides better image fidelity and perceptual transparency. The proposed method can also hide data in 24 bit true color images. Furthermore, we spread the data on the whole image instead of using part of the image. This steganographic method is used to hide the encrypted communication. Experimental results show the effectiveness and efficiency of the proposed model\",\"PeriodicalId\":253329,\"journal\":{\"name\":\"7th International Multi Topic Conference, 2003. INMIC 2003.\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"7th International Multi Topic Conference, 2003. INMIC 2003.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INMIC.2003.1416607\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"7th International Multi Topic Conference, 2003. INMIC 2003.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2003.1416607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
提出了一种新的秘密数据通信隐写模型。使用四个模块的堆栈。“压缩模块”提供了熵编码的好处。“加密模块”在通信中提供机密性。为了保持数据的完整性,“哈希模块”与共享密钥一起使用。提出了一种不要求接收方在接收消息之前知道密钥的技术。对于“隐写模块”,提出了一种图像隐写方法,该方法来源于Yeuan-Kuen Lee和Ling-Hwei Chen(参见IEEE Proc. Vision, image and Sig. Process)。, 2000)。与该方法相比,我们很少使用覆盖图像的平滑区域,从而提供更好的图像保真度和感知透明度。该方法还可以在24位真彩色图像中隐藏数据。此外,我们在整个图像上展开数据,而不是使用图像的一部分。这种隐写方法用于隐藏加密的通信。实验结果表明了该模型的有效性和有效性
The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The "compression module" gives the benefit of entropy coding. The "cryptographic module" provides confidentiality in the communication. To preserve integrity of data, the "hash module" is used with a shared secret key. A technique is proposed in which it is not required that the receiver should know the secret key before reception of the message. For the "steganographic module", an image steganographic method is proposed that is derived from the method of Yeuan-Kuen Lee and Ling-Hwei Chen (see IEEE Proc. Vision, Image and Sig. Process., 2000). As compared to that method, we make little use of the smooth regions of the cover image that provides better image fidelity and perceptual transparency. The proposed method can also hide data in 24 bit true color images. Furthermore, we spread the data on the whole image instead of using part of the image. This steganographic method is used to hide the encrypted communication. Experimental results show the effectiveness and efficiency of the proposed model