A DCT-based Information Hiding Method for Network Authentication

被引:0
作者
Song, Wei [1 ]
Zou, Shuanghui [1 ]
Tian, Yifei [1 ]
Li, Chen [1 ]
Sun, Su [1 ]
Fong, Simon [2 ]
机构
[1] North China Univ Technol, Sch Comp Sci, 5 Jinyuanzhuang Rd, Beijing 100144, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2017) | 2017年
基金
北京市自然科学基金;
关键词
Information Hiding; Network Authentication; Discrete Cosine Transform; Image Processing; IMAGE; SUBSTITUTION; QUALITY;
D O I
10.1145/3175684.3175707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, information hiding method has become a research hotspot in information security field. The user authentication is the vital processing in network security. This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into RGB images. The authentication datasets are converted into the frequency domain and embedded into the raw picture, which is almost unobservable to human eyes. After the encrypted image is delivered to the destination node, the authentication is realized by decoding the hidden DCT coefficients in the images. Due to the invisible authentication information, the proposed DCT-based authentication method is more secure than the traditional bar code and Quick Response (QR) code.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [1] Reversible hiding in DCT-based compressed images
    Chang, Chin-Chen
    Lin, Chia-Chen
    Tseng, Chun-Sen
    Tai, Wei-Liang
    INFORMATION SCIENCES, 2007, 177 (13) : 2768 - 2786
  • [2] Hiding binary logo with DCT-based digital watermarking
    Thitimajshima, P
    Thitimajshima, Y
    Rangsanseri, Y
    APPLICATIONS AND SCIENCE OF COMPUTATIONAL INTELLIGENCE V, 2002, 4739 : 221 - 225
  • [3] The Wi-Fi Device Authentication Method based on Information Hiding
    Liu, Wei
    Yan, Zhehao
    He, Yunhua
    2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 80 - 86
  • [4] DCT-based iris recognition
    Monro, Donald M.
    Rakshit, Soumyadip
    Zhang, Dexin
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (04) : 586 - 595
  • [5] A DCT-based multiresolution analysis
    Jeremiah, RM
    Turner, CF
    Proceedings of the Sixth IASTED International Conference on Signal and Image Processing, 2004, : 183 - 186
  • [6] DCT-based motion estimation
    Koc, UV
    Liu, KJR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (07) : 948 - 965
  • [7] An information hiding method base on logistic map in DCT domain
    Song, Jianhua
    Zhu, Yong
    Song, Jianwei
    Advances in Information Sciences and Service Sciences, 2012, 4 (02): : 32 - 39
  • [8] A Simplified and Robust DCT-based Watermarking Algorithm
    Li, Xin
    Wang, Xingjun
    Chen, Anqi
    Xiao, Linghao
    2017 2ND INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP), 2017, : 167 - 171
  • [9] The DCT-based oscillation detection method for a single time series
    Li, Xinong
    Wang, Jiandong
    Huang, Biao
    Lu, Sien
    JOURNAL OF PROCESS CONTROL, 2010, 20 (05) : 609 - 617
  • [10] Information Hiding Within Still Images Based on the DCT Coefficients Flipping and Encryption
    Ridzon, Radovan
    Levicky, Dusan
    Kanocz, Tomas
    PROCEEDINGS ELMAR-2010, 2010, : 147 - 150