Cryptography Reference
In-Depth Information
FIGURE 15.2
The format of stego-block
B
ij
with the size of 2 2 gray-level pixels.
FIGURE 15.3
Stego-block B
ij
used in Yang et al. which is revised from Figure 15.2, where
hash is used in the pixel of wˆi
i
= (w
i1
; ;w
i5
;h
i
;y
i3
;y
i4
).
v
i
= (v
i1
;v
i2
; ;v
i5
, y
i6
;y
i7
;y
i8
),
and u
i
= (u
i1
;u
i2
; ;u
i5
;y
i6
;y
i7
;y
i8
),
where b0
i
is the parity bit, which is chosen to make
w
i
including the cor-
B
ij
is shown in Figure
responding bit-string bi.
i
. The format of stego-block
15.2.
B
ij
generated in the Step 3 to create stego-image I
j
.
Step 4. Collect
15.3.3 Yang et al.'s Scheme
As observed from the Lin-Tsai scheme, the fake shares can be easily
made by the manner of fixing the parity bit b′i.
0
i
. For example, if a
i
=
(w
i1
;w
i2
; ;w
i5
;b
0
i
;y
i1
,y
i2
) = (0; 0; 1; 1; 1; 0; 1; 1), the parity bit b
0
i
is all the
same when the original wˆi
i
is changed to a new wˆi
i
as w
i
= (1; 0; 1; 1; 1; 0; 0; 1).
In such a way, the malicious attackers can easily modify w
i
0
s in the stego-
image to pass the authentication detection. As a result, the revelation of the
target secret image is not a right one. Next, Yang et al. [12] proposed a revised
version to set a new check function, e.g., hash function, instead of parity bit
in [4]. The stego-block B
ij
in [4] is then revised as the format shown in Figure
15.3. As analyzed in Yang et al., the probability of passing the detection with
the fake share offers is (
2
)
m
2
.
15.3.4 Inverted Pattern LSB Scheme
In order to conceal the existence of shadow data, steganographic methods
are used to keep the shadows imperceptible. The steganographic method is a
kind of data hiding technique that embeds secret data in preselected mean-
ingful images, called cover images, with people being visually unaware of the
secret's existence. One common technique to achieve the data hiding is the
LSB-based approach, in which secret data are embedded by directly replacing
the least significant bits (LSBs) with equal bits of the secret for each pixel.
Search WWH ::
Custom Search