A DCT-based Information Hiding Method for Network Authentication

被引:0
|
作者
Song, Wei [1 ]
Zou, Shuanghui [1 ]
Tian, Yifei [1 ]
Li, Chen [1 ]
Sun, Su [1 ]
Fong, Simon [2 ]
机构
[1] North China Univ Technol, Sch Comp Sci, 5 Jinyuanzhuang Rd, Beijing 100144, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
基金
北京市自然科学基金;
关键词
Information Hiding; Network Authentication; Discrete Cosine Transform; Image Processing; IMAGE; SUBSTITUTION; QUALITY;
D O I
10.1145/3175684.3175707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, information hiding method has become a research hotspot in information security field. The user authentication is the vital processing in network security. This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into RGB images. The authentication datasets are converted into the frequency domain and embedded into the raw picture, which is almost unobservable to human eyes. After the encrypted image is delivered to the destination node, the authentication is realized by decoding the hidden DCT coefficients in the images. Due to the invisible authentication information, the proposed DCT-based authentication method is more secure than the traditional bar code and Quick Response (QR) code.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [1] A DCT-based approach for hiding patients' identification information
    Popa, Camelia
    Pop, Florin
    Nemes, Paul
    Vlaicu, Sonia
    2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR 2008), THETA 16TH EDITION, VOL III, PROCEEDINGS, 2008, : 396 - 401
  • [2] DCT-based multimedia authentication scheme
    Li, De-Quan
    Su, Pu-Rui
    Feng, Deng-Guo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (06):
  • [3] Reversible hiding in DCT-based compressed images
    Chang, Chin-Chen
    Lin, Chia-Chen
    Tseng, Chun-Sen
    Tai, Wei-Liang
    INFORMATION SCIENCES, 2007, 177 (13) : 2768 - 2786
  • [4] DCT-based reversible data hiding scheme
    Lin C.-C.
    Shiu P.-F.
    Journal of Software, 2010, 5 (02) : 214 - 224
  • [5] Palmprint Authentication Based on DCT-based Watermarking
    Yu, Pengfei
    Yu, Pengcheng
    Xu, Dan
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 893 - 898
  • [6] A DCT-Based watermarking technique for image authentication
    Al Baloshi, Mohamed
    Al-Mualla, Mohammed E.
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 754 - +
  • [7] Reversible DCT-based data hiding in stereo images
    Wen-Chao Yang
    Ling-Hwei Chen
    Multimedia Tools and Applications, 2015, 74 : 7181 - 7193
  • [8] Hiding binary logo with DCT-based digital watermarking
    Thitimajshima, P
    Thitimajshima, Y
    Rangsanseri, Y
    APPLICATIONS AND SCIENCE OF COMPUTATIONAL INTELLIGENCE V, 2002, 4739 : 221 - 225
  • [9] Reversible DCT-based data hiding in stereo images
    Yang, Wen-Chao
    Chen, Ling-Hwei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (17) : 7181 - 7193
  • [10] DCT-based data hiding for securing ROI of color images
    Lo-Varco, G
    Puech, W
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 1393 - 1396