Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data strin...

Full description

Bibliographic Details
Main Authors: Kuang Tsan Lin, Sheng Lih Yeh
Format: Article
Language:English
Published: Hindawi Limited 2014-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2014/603659
id doaj-250f099ba9654768868abdfb424d4a12
record_format Article
spelling doaj-250f099ba9654768868abdfb424d4a122020-11-25T01:05:37ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/603659603659Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding MethodKuang Tsan Lin0Sheng Lih Yeh1Department of Mechanical and Computer Aided Engineering, St. John’s University, 499 Sec. 4, Tam King Road, Tamsui, New Taipei City 25135, TaiwanDepartment of Mechanical Engineering, Lunghwa University of Science and Technology, 300 Sec. 1, Wanshou Road, Kueishan, Taoyuan County 33306, TaiwanThe Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.http://dx.doi.org/10.1155/2014/603659
collection DOAJ
language English
format Article
sources DOAJ
author Kuang Tsan Lin
Sheng Lih Yeh
spellingShingle Kuang Tsan Lin
Sheng Lih Yeh
Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
Mathematical Problems in Engineering
author_facet Kuang Tsan Lin
Sheng Lih Yeh
author_sort Kuang Tsan Lin
title Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
title_short Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
title_full Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
title_fullStr Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
title_full_unstemmed Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method
title_sort hiding a covert digital image by assembling the rsa encryption method and the binary encoding method
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2014-01-01
description The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.
url http://dx.doi.org/10.1155/2014/603659
work_keys_str_mv AT kuangtsanlin hidingacovertdigitalimagebyassemblingthersaencryptionmethodandthebinaryencodingmethod
AT shenglihyeh hidingacovertdigitalimagebyassemblingthersaencryptionmethodandthebinaryencodingmethod
_version_ 1725193500554690560