Cryptography Reference
In-Depth Information
FIGURE 15.5
A secret sharing system with target secret embedding of high capacity and
detection authentication: (a) Flowchart of target secret embedding procedures;
(b) Recovery of target secret forms the stego-images in our secret sharing
systems.
B
g;j
= (x
51
; ;x
56
;y
g5
;c
g5
),
B
g;j
= (x
61
; ;x
66
;y
g6
;c
g6
),
B
g;j
= (x
71
; ;x
76
;y
g7
;c
g7
),
B
g;j
= (x
81
; ;x
86
;y
g8
;c
g8
),
gaining
l
m
2
t
m
blocks
I
j
by
B
g;j
in
Step 6. Construct
order, g =
1; 2; ;
l
m
2
t
m
.
Target Secret Image Recovery Algorithm: The TSIRA aims at the
recovery of the original secret image.
Input: A set of at least t stego-images and a secret key K.
Output: A target secret image S if all the stego-images are authenticated to
be genuine.
Step 1. Renumber t of the inputted stego-images as I
j
, j = 1; 2; ;t, in
order.
Search WWH ::
Custom Search