A DCT-based Information Hiding Method for Network Authentication

被引:0
作者
Song, Wei [1 ]
Zou, Shuanghui [1 ]
Tian, Yifei [1 ]
Li, Chen [1 ]
Sun, Su [1 ]
Fong, Simon [2 ]
机构
[1] North China Univ Technol, Sch Comp Sci, 5 Jinyuanzhuang Rd, Beijing 100144, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2017) | 2017年
基金
北京市自然科学基金;
关键词
Information Hiding; Network Authentication; Discrete Cosine Transform; Image Processing; IMAGE; SUBSTITUTION; QUALITY;
D O I
10.1145/3175684.3175707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, information hiding method has become a research hotspot in information security field. The user authentication is the vital processing in network security. This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into RGB images. The authentication datasets are converted into the frequency domain and embedded into the raw picture, which is almost unobservable to human eyes. After the encrypted image is delivered to the destination node, the authentication is realized by decoding the hidden DCT coefficients in the images. Due to the invisible authentication information, the proposed DCT-based authentication method is more secure than the traditional bar code and Quick Response (QR) code.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [21] Lightweight Authentication Mechanism for Software Defined Network using Information Hiding
    Abdullaziz, Osamah Ibrahiem
    Chen, Yu-Jia
    Wang, Li-Chun
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [22] DCT-BASED INTERFRAME CODING FOR VIDEO CODEC
    JONG, HM
    CHEN, LG
    CHIUEH, TD
    ELECTRONICS LETTERS, 1992, 28 (04) : 411 - 413
  • [23] Information Hiding for Pervasive Trusted Authentication
    Liu, Wenjuan
    Fu, Xiufen
    Ouyang, Shaocong
    Lin, Jinchuan
    Teng, Shaohua
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 653 - 656
  • [24] A DCT-based ownership identification method with gray-level and colorful signatures
    Shu-Fen Tu
    Ching-Sheng Hsu
    Pattern Analysis and Applications, 2006, 9 : 229 - 242
  • [25] A new DCT-based multiresolution method for simultaneous denoising and fusion of SAR images
    Radford, D.
    Kurekin, A.
    Marshall, D.
    Lever, K.
    2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 352 - 359
  • [26] DCT-based color digital image blind watermarking method with variable steps
    Zihan Yuan
    Decheng Liu
    Xueting Zhang
    Huanying Wang
    Qingtang Su
    Multimedia Tools and Applications, 2020, 79 : 30557 - 30581
  • [27] DCT-based color digital image blind watermarking method with variable steps
    Yuan, Zihan
    Liu, Decheng
    Zhang, Xueting
    Wang, Huanying
    Su, Qingtang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (41-42) : 30557 - 30581
  • [28] DCT-based image watermarking using subsampling
    Chu, WC
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) : 34 - 38
  • [29] A DCT-based ownership identification method with gray-level and colorful signatures
    Tu, Shu-Fen
    Hsu, Ching-Sheng
    PATTERN ANALYSIS AND APPLICATIONS, 2006, 9 (2-3) : 229 - 242
  • [30] Efficient DCT-based image compression technique
    El-said, Shaimaa A.
    INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2013, 6 (04) : 259 - 274