Cryptography Reference
In-Depth Information
set to the Galois Field GF(2
8
), that is, p = g(x) = x
8
+ x
4
+ x
3
+ x
1
+ x
0
.
This approach allows the acquisition of a secret image without distortion.
FIGURE 16.3
The cover blocks used in Yang et al.'s scheme.
FIGURE 16.4
The block of a stego-image in Yang et al.'s scheme.
In Yang et al's scheme, let the pixel I
ij
of the secret image be used to
produce the n shared pixels S
ij
, S
ij
,...,S
ij
, to be embedded into the cover
blocks C
ij
,C
ij
,...,C
ij
, where each cover block is represented as C
ij
= fV
ij
,
Y
ij
, Z
ij
, U
ij
g for 1 k n as shown in Figure 16.3. Pixel I
ij
of the secret
image is first embedded into the coecient c
0
to construct a polynomial as
shown in Equation 16.1. Next, the shared pixel S
ij
is computed by taking the
pixel value V
ij
of the corresponding cover image block C
ij
as the input x of
the polynomial shown in Equation 16.1. Let the binary representation of the
shared pixel S
ij
be (s
1
s
2
...s
8
). Hence, the shared pixel S
ij
is embedded into
Search WWH ::
Custom Search