期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Review of Image Steganography Based on Multiple Hashing Algorithm
1
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-lsb approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
基于Hash函数的脆弱图像水印算法 被引量:5
2
作者 林克正 李东勤 李绍华 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2008年第1期61-64,共4页
为了增强水印的内容认证性,提出了一种适用于数字媒体产品内容篡改证明和完整性认证的脆弱水印算法.采用Hash函数加密生成基于图像内容的脆弱水印,并将其嵌入到随机选择的图像点的LSB(least significantbit),有效地抵抗了伪认证攻击.利... 为了增强水印的内容认证性,提出了一种适用于数字媒体产品内容篡改证明和完整性认证的脆弱水印算法.采用Hash函数加密生成基于图像内容的脆弱水印,并将其嵌入到随机选择的图像点的LSB(least significantbit),有效地抵抗了伪认证攻击.利用Hash函数Hamming重量对输入变化的敏感性,能够精确地定位对加入水印图像的篡改,并且水印提取不需要原始图像.实验结果表明该脆弱水印算法具有较好的篡改定位能力. 展开更多
关键词 脆弱水印 HASH函数 完整性认证 LSB
下载PDF
基于小波压缩的彩色图像半脆弱水印认证 被引量:1
3
作者 詹旭 杜玲艳 +2 位作者 马将 梁小晓 陈健陵 《实验室研究与探索》 CAS 北大核心 2014年第8期22-25,共4页
提出了一种彩色图像半脆弱水印认证方案,该方案彩色图像转换成灰度图像,并进行了小波压缩后,获得水印图像;在水印嵌入时,首先将彩色图像从RGB空间转换到HSV空间中,对饱和度S分量进行了DCT变换后,获取低频分量,作为水印嵌入的位置,然后... 提出了一种彩色图像半脆弱水印认证方案,该方案彩色图像转换成灰度图像,并进行了小波压缩后,获得水印图像;在水印嵌入时,首先将彩色图像从RGB空间转换到HSV空间中,对饱和度S分量进行了DCT变换后,获取低频分量,作为水印嵌入的位置,然后将水印图像进行基于奇异值分解算法,从而嵌入水印;在生成认证码阶段,首先对嵌入水印后的图像矩阵中的元素的低位置零,将嵌入水印后的图像进行了HASH运算,生成认证码,并进行了基于LSB运算实现认证码隐藏;为检测该方案的鲁棒性和脆弱性,进行了实验。结果表明,该方案对JPEG、叠加噪声攻击能体现出较好的鲁棒性,对篡改攻击能准确检测和确定篡改的位置,符合半脆弱水印认证的要求。 展开更多
关键词 小波压缩 色度饱和度颜色空间 哈希算法 最低有效位
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部