Cryptography Reference
In-Depth Information
16
Image Sharing with Steganography and
Authenticat ion
Zhao-Xia Yin
Anhui University, China
Chia-Chen Lin
Providence University, Taiwan
Chin-Chen Chang
Feng Chia University, Taiwan
CONTENTS
16.1
Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::::: 425
16.2
Related Work :::::::::::::::::::::::::::::::::::::::::::::::::::: 428
16.2.1
Lin and Tsai's Scheme ::::::::::::::::::::::::::::::::::: 428
16.2.2
Yang et al.'s Scheme ::::::::::::::::::::::::::::::::::::: 430
16.2.3
Chang et al.'s Scheme ::::::::::::::::::::::::::::::::::: 432
16.3
Adopted Techniques in the Proposed Scheme ::::::::::::::::::: 434
16.3.1
Error Diusion Technique ::::::::::::::::::::::::::::::: 434
16.3.2
Interpolation Technique ::::::::::::::::::::::::::::::::: 439
16.3.3
Canny Edge Detector :::::::::::::::::::::::::::::::::::: 440
16.3.4
Edge Lookup Inverse Halftoning Technique ::::::::::::: 441
16.3.5
Shamir Scheme for Secret Sharing :::::::::::::::::::::: 443
16.4
Proposed Scheme ::::::::::::::::::::::::::::::::::::::::::::::::: 445
16.4.1
Sharing and Embedding Phase :::::::::::::::::::::::::: 445
16.4.2
Reconstruction and Verifying Phase :::::::::::::::::::: 449
16.5
Experimental Results :::::::::::::::::::::::::::::::::::::::::::: 453
16.6
Conclusions ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 458
Bibliography :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 459
16.1 Introduction
More and more data are being transmitted via the public access network, the
Internet, due to its favorable characteristics such as low cost, speed, and reli-
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Search WWH ::




Custom Search