By Topic

Hiding binary images behind noise with authentication capability: a new approach to covert communication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chih-Hsuan Tzeng ; Dept. of Comput. Sci. & Inf. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan ; Wen-Hsiang Tsai

A new approach to hiding secret binary images behind noise images for covert communication with a capability of secret authentication is proposed. A secret image to be transmitted is transformed into a random noise image at a sender site with a given key, with the aim of both covering the secret and cheating illicit interceptors. Authentication bits are also embedded imperceptibly in the noise image. At the receiver site, the secret image is recovered from the noise image with the same key and verified by checking the existence of the authentication bits. Experimental results show the feasibility of the approach for real applications.

Published in:

Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on

Date of Conference:

14-16 Oct. 2003