Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data strin...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2014-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2014/603659 |
id |
doaj-250f099ba9654768868abdfb424d4a12 |
---|---|
record_format |
Article |
spelling |
doaj-250f099ba9654768868abdfb424d4a122020-11-25T01:05:37ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/603659603659Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding MethodKuang Tsan Lin0Sheng Lih Yeh1Department of Mechanical and Computer Aided Engineering, St. John’s University, 499 Sec. 4, Tam King Road, Tamsui, New Taipei City 25135, TaiwanDepartment of Mechanical Engineering, Lunghwa University of Science and Technology, 300 Sec. 1, Wanshou Road, Kueishan, Taoyuan County 33306, TaiwanThe Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.http://dx.doi.org/10.1155/2014/603659 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kuang Tsan Lin Sheng Lih Yeh |
spellingShingle |
Kuang Tsan Lin Sheng Lih Yeh Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method Mathematical Problems in Engineering |
author_facet |
Kuang Tsan Lin Sheng Lih Yeh |
author_sort |
Kuang Tsan Lin |
title |
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method |
title_short |
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method |
title_full |
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method |
title_fullStr |
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method |
title_full_unstemmed |
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method |
title_sort |
hiding a covert digital image by assembling the rsa encryption method and the binary encoding method |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2014-01-01 |
description |
The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same. |
url |
http://dx.doi.org/10.1155/2014/603659 |
work_keys_str_mv |
AT kuangtsanlin hidingacovertdigitalimagebyassemblingthersaencryptionmethodandthebinaryencodingmethod AT shenglihyeh hidingacovertdigitalimagebyassemblingthersaencryptionmethodandthebinaryencodingmethod |
_version_ |
1725193500554690560 |