The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime.
View Article and Find Full Text PDFFor (k, n)-threshold secret image sharing (SIS) scheme, only k or more than k complete parts can recover the secret information, and the correct image cannot be obtained if the count of shadow images is not enough or the shadow images are damaged. The existing schemes are weak in resisting large-area shadow image tampering. In this paper, we propose a robust secret image sharing scheme resisting to maliciously tampered shadow images by Absolute Moment Block Truncation Coding (AMBTC) and quantization (RSIS-AQ).
View Article and Find Full Text PDFData hiding is a way of hiding secret data on cover-media and it is used for a variety of applications. An important of the data hiding is to conceal the data in a secret way without loss of cover-media. Until now, continuous research on absolute moment block truncation coding based data hiding methods have improved a performance on data concealment and image quality.
View Article and Find Full Text PDFRecently, Tu and Hsu proposed a secret sharing based document protecting scheme. In their scheme, a document is encrypted into n shares using Shamir's (k,n) secret sharing, where the n shares are tied in with a cover document. The document reconstruction can be accomplished by acknowledgement of any k shares and the cover document.
View Article and Find Full Text PDFMath Biosci Eng
April 2019
Exploiting Modification Direction (EMD) based data hiding achieves good stego-image quality and high security level. Recently, a section-wise EMD was proposed to enhance the embedding capacity of EMD. Later, Wang et al.
View Article and Find Full Text PDF