A DCT-based Information Hiding Method for Network Authentication

被引:0
|
作者
Song, Wei [1 ]
Zou, Shuanghui [1 ]
Tian, Yifei [1 ]
Li, Chen [1 ]
Sun, Su [1 ]
Fong, Simon [2 ]
机构
[1] North China Univ Technol, Sch Comp Sci, 5 Jinyuanzhuang Rd, Beijing 100144, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2017) | 2017年
基金
北京市自然科学基金;
关键词
Information Hiding; Network Authentication; Discrete Cosine Transform; Image Processing; IMAGE; SUBSTITUTION; QUALITY;
D O I
10.1145/3175684.3175707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, information hiding method has become a research hotspot in information security field. The user authentication is the vital processing in network security. This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into RGB images. The authentication datasets are converted into the frequency domain and embedded into the raw picture, which is almost unobservable to human eyes. After the encrypted image is delivered to the destination node, the authentication is realized by decoding the hidden DCT coefficients in the images. Due to the invisible authentication information, the proposed DCT-based authentication method is more secure than the traditional bar code and Quick Response (QR) code.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [21] Preprocessing method for DCT-Based image-compression
    Oizumi, Munenori
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2006, 52 (03) : 1021 - 1026
  • [22] DCT-based iris recognition
    Monro, Donald M.
    Rakshit, Soumyadip
    Zhang, Dexin
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (04) : 586 - 595
  • [23] A DCT-based multiresolution analysis
    Jeremiah, RM
    Turner, CF
    Proceedings of the Sixth IASTED International Conference on Signal and Image Processing, 2004, : 183 - 186
  • [24] DCT-based watermarking for video
    Natl Taiwan Univ, Taipei, Taiwan
    IEEE Trans Consum Electron, 1 (206-216):
  • [25] DCT-based motion estimation
    Koc, UV
    Liu, KJR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (07) : 948 - 965
  • [26] DCT-based watermarking for video
    Hsu, CT
    Wu, JL
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1998, 44 (01) : 206 - 216
  • [27] An information hiding method base on logistic map in DCT domain
    Song, Jianhua
    Zhu, Yong
    Song, Jianwei
    Advances in Information Sciences and Service Sciences, 2012, 4 (02): : 32 - 39
  • [28] Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications
    P. Punithavathi
    S. Geetha
    Multimedia Tools and Applications, 2019, 78 : 25487 - 25514
  • [29] A DCT-based digital watermarking
    Chung, YY
    Wong, MT
    CISST'03: PROCEEDING OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS AND TECHNOLOGY, VOLS 1 AND 2, 2003, : 13 - 19
  • [30] A DCT-based image steganographic method resisting statistical attacks
    Chu, RF
    You, XG
    Kong, XW
    Ba, XH
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 953 - 956