Paper
8 March 2018 A novel attack method about double-random-phase-encoding-based image hiding method
Hongsheng Xu, Zhijun Xiao, Xianchen Zhu
Author Affiliations +
Proceedings Volume 10611, MIPPR 2017: Remote Sensing Image Processing, Geographic Information Systems, and Other Applications; 106111I (2018) https://doi.org/10.1117/12.2288082
Event: Tenth International Symposium on Multispectral Image Processing and Pattern Recognition (MIPPR2017), 2017, Xiangyang, China
Abstract
By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hongsheng Xu, Zhijun Xiao, and Xianchen Zhu "A novel attack method about double-random-phase-encoding-based image hiding method", Proc. SPIE 10611, MIPPR 2017: Remote Sensing Image Processing, Geographic Information Systems, and Other Applications, 106111I (8 March 2018); https://doi.org/10.1117/12.2288082
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image restoration

Image quality

Computer programming

Image encryption

Data hiding

Fourier transforms

Data modeling

Back to Top