The image hiding algorithm based on the mask matrix and DCT transform
Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix f...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 767 |
---|---|
container_issue | |
container_start_page | 765 |
container_title | |
container_volume | |
creator | Sun Xijing Si Shoukui Tian Shurong |
description | Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74. |
doi_str_mv | 10.1109/AIMSEC.2011.6010240 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6010240</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6010240</ieee_id><sourcerecordid>6010240</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-87b06295503a55d68eff3028de83435ac0f9426206ed1360813fc259002d432f3</originalsourceid><addsrcrecordid>eNpFT8FOwzAUC0KTgG1fsEt-oOUlL0nT41QKTBriQO9TtiRtYG1R0gP8PZWYNB9sWbIsm5ANg5wxKB-3u7ePuso5MJYrYMAF3JAHJmRRgETFb69GijuyTukTZiilC4X3pG46R0NvWke7YMPQUnNuxximrqdHk5yl40CnOdOb9DXTFMMPNYOlT1VDp2iG5MfYr8jCm3Ny64suSfNcN9Vrtn9_2VXbfRZKmDJdHEHxUkpAI6VV2nmPwLV1GgVKcwJfCq44KGcZKtAM_YnLEoBbgdzjkmz-a4Nz7vAd593x93B5jX8jPEmM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>The image hiding algorithm based on the mask matrix and DCT transform</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Sun Xijing ; Si Shoukui ; Tian Shurong</creator><creatorcontrib>Sun Xijing ; Si Shoukui ; Tian Shurong</creatorcontrib><description>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</description><identifier>ISBN: 1457705354</identifier><identifier>ISBN: 9781457705359</identifier><identifier>EISBN: 1457705362</identifier><identifier>EISBN: 9781457705342</identifier><identifier>EISBN: 1457705346</identifier><identifier>EISBN: 9781457705366</identifier><identifier>DOI: 10.1109/AIMSEC.2011.6010240</identifier><language>eng</language><publisher>IEEE</publisher><subject>Data mining ; DCT basis function ; DCT transform ; Discrete cosine transforms ; embedding strength ; Humans ; mask matrix ; Matrix decomposition ; PSNR</subject><ispartof>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011, p.765-767</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6010240$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6010240$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sun Xijing</creatorcontrib><creatorcontrib>Si Shoukui</creatorcontrib><creatorcontrib>Tian Shurong</creatorcontrib><title>The image hiding algorithm based on the mask matrix and DCT transform</title><title>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)</title><addtitle>AIMSEC</addtitle><description>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</description><subject>Data mining</subject><subject>DCT basis function</subject><subject>DCT transform</subject><subject>Discrete cosine transforms</subject><subject>embedding strength</subject><subject>Humans</subject><subject>mask matrix</subject><subject>Matrix decomposition</subject><subject>PSNR</subject><isbn>1457705354</isbn><isbn>9781457705359</isbn><isbn>1457705362</isbn><isbn>9781457705342</isbn><isbn>1457705346</isbn><isbn>9781457705366</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFT8FOwzAUC0KTgG1fsEt-oOUlL0nT41QKTBriQO9TtiRtYG1R0gP8PZWYNB9sWbIsm5ANg5wxKB-3u7ePuso5MJYrYMAF3JAHJmRRgETFb69GijuyTukTZiilC4X3pG46R0NvWke7YMPQUnNuxximrqdHk5yl40CnOdOb9DXTFMMPNYOlT1VDp2iG5MfYr8jCm3Ny64suSfNcN9Vrtn9_2VXbfRZKmDJdHEHxUkpAI6VV2nmPwLV1GgVKcwJfCq44KGcZKtAM_YnLEoBbgdzjkmz-a4Nz7vAd593x93B5jX8jPEmM</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Sun Xijing</creator><creator>Si Shoukui</creator><creator>Tian Shurong</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201108</creationdate><title>The image hiding algorithm based on the mask matrix and DCT transform</title><author>Sun Xijing ; Si Shoukui ; Tian Shurong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-87b06295503a55d68eff3028de83435ac0f9426206ed1360813fc259002d432f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Data mining</topic><topic>DCT basis function</topic><topic>DCT transform</topic><topic>Discrete cosine transforms</topic><topic>embedding strength</topic><topic>Humans</topic><topic>mask matrix</topic><topic>Matrix decomposition</topic><topic>PSNR</topic><toplevel>online_resources</toplevel><creatorcontrib>Sun Xijing</creatorcontrib><creatorcontrib>Si Shoukui</creatorcontrib><creatorcontrib>Tian Shurong</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sun Xijing</au><au>Si Shoukui</au><au>Tian Shurong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>The image hiding algorithm based on the mask matrix and DCT transform</atitle><btitle>2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)</btitle><stitle>AIMSEC</stitle><date>2011-08</date><risdate>2011</risdate><spage>765</spage><epage>767</epage><pages>765-767</pages><isbn>1457705354</isbn><isbn>9781457705359</isbn><eisbn>1457705362</eisbn><eisbn>9781457705342</eisbn><eisbn>1457705346</eisbn><eisbn>9781457705366</eisbn><abstract>Image encryption technology has a wide range of applications in protecting private information and trade secrets. The key information of carrier image can be saved by the mask matrix for information extraction, and the location of confidential information embedded can be decided by the mask matrix for information embedded. The Synthetic image embedded by the confidential information displayed as the carrier image, and the mass loss can't be identified by the human eyes. The process to extract encrypted information is the reverse process of embedding. In this paper, the carrier image is a color image, and the secret image is a gray image. The psnr peak signal to noise ratio between synthetic image and carrier image is 57.74.</abstract><pub>IEEE</pub><doi>10.1109/AIMSEC.2011.6010240</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457705354 |
ispartof | 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011, p.765-767 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6010240 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Data mining DCT basis function DCT transform Discrete cosine transforms embedding strength Humans mask matrix Matrix decomposition PSNR |
title | The image hiding algorithm based on the mask matrix and DCT transform |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T20%3A23%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=The%20image%20hiding%20algorithm%20based%20on%20the%20mask%20matrix%20and%20DCT%20transform&rft.btitle=2011%202nd%20International%20Conference%20on%20Artificial%20Intelligence,%20Management%20Science%20and%20Electronic%20Commerce%20(AIMSEC)&rft.au=Sun%20Xijing&rft.date=2011-08&rft.spage=765&rft.epage=767&rft.pages=765-767&rft.isbn=1457705354&rft.isbn_list=9781457705359&rft_id=info:doi/10.1109/AIMSEC.2011.6010240&rft_dat=%3Cieee_6IE%3E6010240%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457705362&rft.eisbn_list=9781457705342&rft.eisbn_list=1457705346&rft.eisbn_list=9781457705366&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6010240&rfr_iscdi=true |