The image hiding algorithm based on the mask matrix and DCT transform

Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Sun Xijing, Si Shoukui, Tian Shurong
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 767
container_issue
container_start_page 765
container_title
container_volume
creator Sun Xijing
Si Shoukui
Tian Shurong
description Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.
doi_str_mv 10.1109/AIMSEC.2011.6010240
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6010240</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6010240</ieee_id><sourcerecordid>6010240</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-87b06295503a55d68eff3028de83435ac0f9426206ed1360813fc259002d432f3</originalsourceid><addsrcrecordid>eNpFT8FOwzAUC0KTgG1fsEt-oOUlL0nT41QKTBriQO9TtiRtYG1R0gP8PZWYNB9sWbIsm5ANg5wxKB-3u7ePuso5MJYrYMAF3JAHJmRRgETFb69GijuyTukTZiilC4X3pG46R0NvWke7YMPQUnNuxximrqdHk5yl40CnOdOb9DXTFMMPNYOlT1VDp2iG5MfYr8jCm3Ny64suSfNcN9Vrtn9_2VXbfRZKmDJdHEHxUkpAI6VV2nmPwLV1GgVKcwJfCq44KGcZKtAM_YnLEoBbgdzjkmz-a4Nz7vAd593x93B5jX8jPEmM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>The image hiding algorithm based on the mask matrix and DCT transform</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Sun Xijing ; Si Shoukui ; Tian Shurong</creator><creatorcontrib>Sun Xijing ; Si Shoukui ; Tian Shurong</creatorcontrib><description>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</description><identifier>ISBN: 1457705354</identifier><identifier>ISBN: 9781457705359</identifier><identifier>EISBN: 1457705362</identifier><identifier>EISBN: 9781457705342</identifier><identifier>EISBN: 1457705346</identifier><identifier>EISBN: 9781457705366</identifier><identifier>DOI: 10.1109/AIMSEC.2011.6010240</identifier><language>eng</language><publisher>IEEE</publisher><subject>Data mining ; DCT basis function ; DCT transform ; Discrete cosine transforms ; embedding strength ; Humans ; mask matrix ; Matrix decomposition ; PSNR</subject><ispartof>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011, p.765-767</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6010240$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6010240$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sun Xijing</creatorcontrib><creatorcontrib>Si Shoukui</creatorcontrib><creatorcontrib>Tian Shurong</creatorcontrib><title>The image hiding algorithm based on the mask matrix and DCT transform</title><title>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)</title><addtitle>AIMSEC</addtitle><description>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</description><subject>Data mining</subject><subject>DCT basis function</subject><subject>DCT transform</subject><subject>Discrete cosine transforms</subject><subject>embedding strength</subject><subject>Humans</subject><subject>mask matrix</subject><subject>Matrix decomposition</subject><subject>PSNR</subject><isbn>1457705354</isbn><isbn>9781457705359</isbn><isbn>1457705362</isbn><isbn>9781457705342</isbn><isbn>1457705346</isbn><isbn>9781457705366</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFT8FOwzAUC0KTgG1fsEt-oOUlL0nT41QKTBriQO9TtiRtYG1R0gP8PZWYNB9sWbIsm5ANg5wxKB-3u7ePuso5MJYrYMAF3JAHJmRRgETFb69GijuyTukTZiilC4X3pG46R0NvWke7YMPQUnNuxximrqdHk5yl40CnOdOb9DXTFMMPNYOlT1VDp2iG5MfYr8jCm3Ny64suSfNcN9Vrtn9_2VXbfRZKmDJdHEHxUkpAI6VV2nmPwLV1GgVKcwJfCq44KGcZKtAM_YnLEoBbgdzjkmz-a4Nz7vAd593x93B5jX8jPEmM</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Sun Xijing</creator><creator>Si Shoukui</creator><creator>Tian Shurong</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201108</creationdate><title>The image hiding algorithm based on the mask matrix and DCT transform</title><author>Sun Xijing ; Si Shoukui ; Tian Shurong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-87b06295503a55d68eff3028de83435ac0f9426206ed1360813fc259002d432f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Data mining</topic><topic>DCT basis function</topic><topic>DCT transform</topic><topic>Discrete cosine transforms</topic><topic>embedding strength</topic><topic>Humans</topic><topic>mask matrix</topic><topic>Matrix decomposition</topic><topic>PSNR</topic><toplevel>online_resources</toplevel><creatorcontrib>Sun Xijing</creatorcontrib><creatorcontrib>Si Shoukui</creatorcontrib><creatorcontrib>Tian Shurong</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sun Xijing</au><au>Si Shoukui</au><au>Tian Shurong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The image hiding algorithm based on the mask matrix and DCT transform</atitle><btitle>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)</btitle><stitle>AIMSEC</stitle><date>2011-08</date><risdate>2011</risdate><spage>765</spage><epage>767</epage><pages>765-767</pages><isbn>1457705354</isbn><isbn>9781457705359</isbn><eisbn>1457705362</eisbn><eisbn>9781457705342</eisbn><eisbn>1457705346</eisbn><eisbn>9781457705366</eisbn><abstract>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</abstract><pub>IEEE</pub><doi>10.1109/AIMSEC.2011.6010240</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1457705354
ispartof 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011, p.765-767
issn
language eng
recordid cdi_ieee_primary_6010240
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Data mining
DCT basis function
DCT transform
Discrete cosine transforms
embedding strength
Humans
mask matrix
Matrix decomposition
PSNR
title The image hiding algorithm based on the mask matrix and DCT transform
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T20%3A23%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20image%20hiding%20algorithm%20based%20on%20the%20mask%20matrix%20and%20DCT%20transform&rft.btitle=2011%202nd%20International%20Conference%20on%20Artificial%20Intelligence,%20Management%20Science%20and%20Electronic%20Commerce%20(AIMSEC)&rft.au=Sun%20Xijing&rft.date=2011-08&rft.spage=765&rft.epage=767&rft.pages=765-767&rft.isbn=1457705354&rft.isbn_list=9781457705359&rft_id=info:doi/10.1109/AIMSEC.2011.6010240&rft_dat=%3Cieee_6IE%3E6010240%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457705362&rft.eisbn_list=9781457705342&rft.eisbn_list=1457705346&rft.eisbn_list=9781457705366&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6010240&rfr_iscdi=true