UM
A DCT-based information hiding method for network authentication
Song W.2; Zou S.2; Tian Y.2; Li C.2; Sun S.2; Fong S.1
2017-12-20
Source PublicationACM International Conference Proceeding Series
Pages149-152
AbstractIn recent years, information hiding method has become a research hotspot in information security field. The user authentication is the vital processing in network security. This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into RGB images. The authentication datasets are converted into the frequency domain and embedded into the raw picture, which is almost unobservable to human eyes. After the encrypted image is delivered to the destination node, the authentication is realized by decoding the hidden DCT coefficients in the images. Due to the invisible authentication information, the proposed DCT-based authentication method is more secure than the traditional bar code and Quick Response (QR) code.
KeywordDiscrete cosine transform Image processing Information hiding Network authentication
DOI10.1145/3175684.3175707
URLView the original
Language英語
Fulltext Access
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
CollectionUniversity of Macau
Affiliation1.Universidade de Macau
2.North China University of Technology
Recommended Citation
GB/T 7714
Song W.,Zou S.,Tian Y.,et al. A DCT-based information hiding method for network authentication[C],2017:149-152.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Song W.]'s Articles
[Zou S.]'s Articles
[Tian Y.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Song W.]'s Articles
[Zou S.]'s Articles
[Tian Y.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Song W.]'s Articles
[Zou S.]'s Articles
[Tian Y.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.