RSA scheme with MRF and ECC for data encryption

The security of multimedia over network transmission has recently attracted a lot of research. This paper combines schemes of cryptography with steganography for hiding secret messages. Given secret messages, for example, an English sentence, our scheme first converts the messages to an MtimesN binary image which is then covered by a binary random texture synthesized from a 2D Ising Markov random field using the seed, a shared secret key, between the sender and the receiver, generated by the strategy of elliptic curve cryptography (ECC). The concealed messages are then encrypted, based on the RSA scheme for transmission. An experiment shows that using an unauthorized key gets messages totally different from the original ones even when the error key is very close to the authorized one

[1]  Klara Nahrstedt,et al.  Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..

[2]  Chaur-Chin Chen Watermarking experiments based on wavelet transforms , 2002, SPIE/COS Photonics Asia.

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  Chun-Shien Lu,et al.  A message-based cocktail watermarking system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[5]  Jan C. A. van der Lubbe,et al.  Basic Methods of Cryptography , 1998 .

[6]  Anil K. Jain,et al.  Random field models in image analysis , 1989 .

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Chaur-Chin Chen Data Encryption Using MRF with an RSA Key , 2001, IEEE Pacific Rim Conference on Multimedia.

[12]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.