2012
DOI: 10.3390/s121013441
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

Abstract: In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 41 publications
(36 reference statements)
0
4
0
Order By: Relevance
“…Another solution is to encrypt image areas and encode the modified image, e.g., a permutation of positions of the pixels in the privacy-endangering areas has been proposed in [ 6 , 7 , 8 , 9 , 10 ] based on the chaos cryptography theory [ 11 ], which can serve to protect video contents. These methods have exploited the concept of scrambling image pixels with a secret key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another solution is to encrypt image areas and encode the modified image, e.g., a permutation of positions of the pixels in the privacy-endangering areas has been proposed in [ 6 , 7 , 8 , 9 , 10 ] based on the chaos cryptography theory [ 11 ], which can serve to protect video contents. These methods have exploited the concept of scrambling image pixels with a secret key.…”
Section: Related Workmentioning
confidence: 99%
“…In transmitting video data over Video Sensor Networks (VSNs), the video data can be sent to and from portable devices such as smartphones [ 1 , 2 , 3 , 4 , 5 ]. Frequently, multimedia data delivery raises issues around content ownership and privacy; therefore, protecting content is important in multimedia applications [ 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 ]. Since the size of multimedia data is large, efficient encryption methods for protecting content, while also satisfying real-time requirements, are necessary [ 3 , 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…Optical and digital information security systems [ 28 35 ] based on the double random phase encoding (DRPE) [ 25 30 , 30 32 ] technique has played a predominant role in information security. According to the DRPE principle, the primary image f ( x , y ), which represents the spatial coordinates of a two-dimensional signal or image, is encrypted into stationary white noise data using two random phase masks.…”
Section: Double Random Phase Encoding (Drpe)mentioning
confidence: 99%
“…However, the risk of information leakage is inevitably increased due to the abused usage of image processing technology, in particular, for text image with official information or private database. [2] It is very necessary to encrypt the text image for security protection. [3,4] To our knowledge, there are three typical ways to achieve image encryption, including fluorescent material-based encryption, [5][6][7][8] computer cryptology, [9][10][11][12][13] and optical encryption, [14][15][16][17][18][19][20][21] while these techniques hardly satisfy the high-speed encryption requirements of information acquisition and online communication.…”
Section: Introductionmentioning
confidence: 99%