Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement.
Feng LiuPengpeng LuoZhujuan MaCheng ZhangYiwen ZhangErzhou ZhuPublished in: Trustcom/BigDataSE/ISPA (2016)
Keyphrases
- information hiding
- hash functions
- secret information
- secret message
- secret key
- encryption scheme
- information hiding scheme
- data hiding
- secret sharing scheme
- key management
- similarity search
- jpeg images
- authentication scheme
- copyright protection
- remote sensing images
- data distribution
- data embedding
- watermarking scheme
- secret data
- data sets
- frequency domain
- signature scheme
- image authentication
- denoising
- pattern recognition