Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Publication year range
1.
Math Biosci Eng ; 17(4): 2950-2966, 2020 03 31.
Article in English | MEDLINE | ID: mdl-32987509

ABSTRACT

The polynomial-based image secret sharing (ISS) scheme encodes a secret image into n shadows assigned to n participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows. Thus, ISS is used in applications such as distributive storage in the cloud, digital watermarking, block chain, and access control. Meaningful shadows are significant in ISS because meaningful shadows decrease the suspicion of image encryption and increase the efficiency of shadow management. Generally, previously meaningful ISS schemes were achieved through embedding the shadows into cover images using information hiding techniques and suffer from large pixel expansion and complex decoding procedure. Digital image processing, such as inpainting (texture synthesis), is a standard technique in multimedia applications. It will be highly significant if ISS can be performed in the processing of a normal digital image processing technique. Generally, the encoding method of an ISS scheme entails the use of a mathematical function that is sensitive to any slight change in the ISS output; therefore, the development of a method for performing the ISS procedure and simultaneously achieving image processing behavior is a key challenge. In this paper, we exploit the behavior ISS (BISS) and realize an image inpainting-based BISS scheme for the (k, n) threshold. Using screening operations, a secret image is encoded into the pixels of cover images by polynomial-based ISS in the processing of inpainting shadows to obtain meaningful shadows similar to the input cover images. In addition, the secret image can be losslessly decoded by Lagrange interpolation when collecting any k or more shadows. Experiments are given to confirm the efficiency of the scheme.


Subject(s)
Algorithms , Computer Security , Humans , Image Processing, Computer-Assisted
2.
Math Biosci Eng ; 16(6): 6367-6385, 2019 07 10.
Article in English | MEDLINE | ID: mdl-31698567

ABSTRACT

In this paper, we propose a novel mechanism for QR code security anti-counterfeit based on the fusion of visual secret sharing (VSS) and QR code (called VSSQR scheme), which can greatly improve the security of QR code payment. Due to different application scenarios, the background security anti-counterfeit application and the prospects security anti-counterfeit application are shown for QR code payment authentication. The basic idea of the two applications can be characterized as follows. First, two QR code shares that contain the information of the merchant can be generated based on VSSQR scheme with an original secret image. Second, the secret image can be revealed by stacking two QR code shares to obtain the original information. Finally, whether the stacking result is the same as the original secret image or not can determine the authenticity of QR code share used for payment. The analyses show the security of our method. The applications are conducted to show the effectiveness and practicability.

3.
Math Biosci Eng ; 16(6): 7458-7476, 2019 08 16.
Article in English | MEDLINE | ID: mdl-31698623

ABSTRACT

In recent years, many methods of exfiltrating information from air-gapped systems, including electromagnetic, thermal, acoustic and optical covert channels, have been proposed. However, as a typical optical channel, the screen-camera method has rarely been considered; it is less covert because it is visible to humans. In this paper, inspired by the rapid upgrades of cameras and monitors, we propose an air-gapped screen-camera covert channel with decreased perceptibility that is suitable for complex content. Our method exploits the characteristics of the human vision system (HVS) and embeds quick response (QR) codes containing sensitive data in the displayed frames. This slight modification of the frames cannot be sensed by the HVS but can be recorded by the cameras. Then, using certain image processing techniques, we reconstruct the QR codes to some degree and extract the secret data with a certain level of robustness due to the error correction capacity of QR codes. In the scenario to which our method applies, we assume that a program has been installed in the target system and has the authority to modify the frames without affecting the normal operations of valid users. Cameras, such as web cameras, surveillance cameras and smartphone cameras, can be receivers in our method. We illustrate the applicability of our method to frames with complex content using several different cover images. Experiments involving different angles between the screen and the camera were conducted to highlight the feasibility of our method with angles of $ 0^{\circ}, 15^{\circ}$ and $30^{\circ} $.

4.
Math Biosci Eng ; 16(5): 4433-4455, 2019 05 20.
Article in English | MEDLINE | ID: mdl-31499670

ABSTRACT

Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k,n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT). In the proposed scheme, on the one hand, when we collect any k1 or more and less than k2 shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any k2 or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic, which can be used in some real-time applications. We give theoretical analyses and experiments to show the effectiveness of the proposed scheme.

5.
Math Biosci Eng ; 16(5): 5750-5764, 2019 06 20.
Article in English | MEDLINE | ID: mdl-31499736

ABSTRACT

Traditional visual secret sharing (VSS) encodes the original secret image into n shares, and each share is of equal importance. However, in some scenarios, we need to make a difference between the participants according to the levels of their importance. Therefore, the capability of each share to recover the original secret image will be different. In this paper, we proposed a weighted (k,n)-threshold random grid VSS(RG-VSS) with multiple decrytions and lossless recovery. When we get k or more shares for decryption, we will recover different levels of the original image because of the different weights of the shares. More importantly, the secret information can be recovered by OR and XOR operations in our scheme. When we get all the n shares and using the XOR operation to recover the image, we can recover the secret information losslessly. The experimental results and analyses show that our scheme outperforms the related schemes.

6.
Math Biosci Eng ; 16(4): 3183-3194, 2019 04 12.
Article in English | MEDLINE | ID: mdl-31137257

ABSTRACT

In practice, most audio files such as MP3 and AAC are stored and transmitted in the form of compressed files, which can serve as the cover in audio steganography. Currently, the prevailing audio steganography methods are not ideal because of the drawbacks. Some are characterized by low capacity while others are irreversible. In this paper, we propose a method to embed secret messages in MP3 encoding. Our strategy is to hide the information by Huffman table transformation. We extract secret information by analyzing side information. Experimental results show that our method can greatly improve the steganographic capacity with low distortion and high security. Meanwhile, it featured with higher decoding rate and reversible over some state-of-the-art methods.


Subject(s)
Algorithms , Computer Security , Data Compression , Image Processing, Computer-Assisted , Informatics/methods , Audiovisual Aids , Confidentiality , Security Measures , Signal Processing, Computer-Assisted , Signal-To-Noise Ratio , Software
7.
Ying Yong Sheng Tai Xue Bao ; 18(11): 2398-405, 2007 Nov.
Article in Chinese | MEDLINE | ID: mdl-18260438

ABSTRACT

Based on field measurements of throughfall and stemflow in combination with climatic data collected from the meteorological station adjacent to the studied sub-alpine dark coniferous forest in Wolong, Sichuan Province, canopy interception of sub-alpine dark coniferous forests was analyzed and modeled at both stand scale and catchment scale. The results showed that monthly interception rate of Fargesia nitida, Bashania fangiana--Abies faxoniana old-growth ranged from 33% Grass to 72%, with the average of 48%. In growing season, there was a linear or powerful or exponential relationship between rainfall and interception an. a negative exponential relationship between rainfall and interception rate. The mean maximum canopy interception by the vegetation in the catchment of in.44 km was 1.74 ment and the significant differences among the five communities occurred in the following sequence: Moss-Fargesia nitida, Bashan afanglana-A. faxoniana stand > Grass-F. nitida, B. fangiana-A. faxoniana stand > Moss-Rhododendron spp.-A. faxoniana stand > Grass-Rh. spp.-A. faxoniana stand > Rh. spp. shrub. In addition, a close linear relationship existed between leaf area index (LAI) and maximum canopy interception. The simulated value of canopy interception rate, maximum canopy interception rate and addition interception rate of the vegetation in the catchment were 39%, 25% and 14%, respectively. Simulation of the canopy interception model was better at the overall growing season scale, that the mean relative error was 9%-14%.


Subject(s)
Biomass , Ecosystem , Poaceae/growth & development , Rain , Tracheophyta/growth & development , China , Models, Theoretical , Population Dynamics , Seasons , Tracheophyta/classification , Water Movements
SELECTION OF CITATIONS
SEARCH DETAIL
...