An efficient and adaptive data-hiding scheme based on secure random matrix
Autoři:
Mingwu Zhang aff001; Shaochen Zhang aff001; Lein Harn aff003
Působiště autorů:
School of Computer Sciences, Hubei University of Technology, Wuhan, Hubei Province, China
aff001; Hubei Key Laboratory of Intelligent Geo-Information Processing, China University of Geosciences, Wuhan, Hubei Province, China
aff002; Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, State of Missouri, United States of America
aff003
Vyšlo v časopise:
PLoS ONE 14(10)
Kategorie:
Research Article
prolekare.web.journal.doi_sk:
https://doi.org/10.1371/journal.pone.0222892
Souhrn
There is a vivid research on securely deliver a secret message by using a data hiding technique in digital images. However, most existing solutions of data-hiding need to encrypt secret data first, and embed the encrypt message into cover image, which is not promising any security once the embedding algorithm is leaked. In this paper, an efficient and adaptive data hiding scheme is presented which is based on a new reference matrix named secure reference matrix. The scheme is flexible enough to meet different data hiding capacities and image quality as needed, and we allow the reference matrix to be more secure since it is randomly generated each time and make it much harder for being attack with exhaustive manner by extending the possible solution. We give the detail protocol for our scheme and provide the practical test and performance analysis. Experimental results show that our scheme has a better flexibility and efficiency in embedding process, and the average value of Peak Signal to Noise Ratio (PSNR) for the stego-images which are generated by our scheme have a higher visual quality for different embedding capacities, and our scheme is more efficient compared with related work.
Klíčová slova:
Imaging techniques – Eyes – Mathematical functions – Turtles – Digital imaging – Signal to noise ratio – Boats – Cryptography
Zdroje
1. Zhang M, Zhang Y, Jiang Y, Shen J. Obfuscating eves algorithm and its application in fair electronic transactions in public cloud systems. IEEE System Journal. 2019;13(2):1478–1486.
2. Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, et al. Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data.2017;.
3. Wang H, Zhang Z, Taleb T. Special issue on security and privacy of IoT. World Wide Web. 2018;21(1):1–6.
4. Zhang M, Zhang Y, Su Y, Huang Q, Mu Y. Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments. IEEE Systems Journal. 2015;11(2):1018–1026.
5. Lee C, Chang C, Wang K. An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image and Vision Computing. 2008;26(12):1670—1676. https://doi.org/10.1016/j.imavis.2008.05.005.
6. Chang C, Liu Y. Fast turtle shell-based data embedding mechanisms with good visual quality. Journal of Real-Time Image Processing. 2018;.
7. Hong W, Chen T. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security. 2012;7(1):176–184. doi: 10.1109/TIFS.2011.2155062
8. Mielikainen J. LSB matching revisited. IEEE Signal Processing Letters. 2006;13(5):285–287.
9. Zhang X, Wang S. Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters. 2006;10(11):781–783. doi: 10.1109/LCOMM.2006.060863
10. Kim HJ, Kim C, Choi Y, Wang S, Zhang X. Improved modification direction methods. Computers and Mathematics with Applications. 2010;60(2):319–325. doi: 10.1016/j.camwa.2010.01.006
11. Chang C, Chou Y, Kieu T. An Information Hiding Scheme Using Sudoku. In: 2008 3rd International Conference on Innovative Computing Information and Control; 2008. p. 17–17.
12. Chen J. A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Processing: Image Communication. 2014;29(3):375–384. https://doi.org/10.1016/j.image.2014.01.003.
13. Chang C, Liu Y, Nguyen T. A Novel Turtle Shell Based Scheme for Data Hiding. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing; 2014. p. 89–93.
14. Liu L, Chang C, Wang A. Data hiding based on extended turtle shell matrix construction method. Multimedia Tools and Applications. 2017;76(10):12233–12250.
15. Liu Y, Zhong Q, Chang L, Xia Z, He D, Cheng C. A secure data backup scheme using multi-factor authentication. IET Information Security. 2016;11(5):250–255.
16. Martínez-González RF, Díaz-Meńdez JA, Palacios-Luengas L, Loṕez-Hernández J, Vázquez-Medina R. A steganographic method using Bernoulli’s chaotic maps. Computers and Electrical Engineering. 2016;54:435—449. https://doi.org/10.1016/j.compeleceng.2015.12.005
17. Yadav GS, Ojha A. Chaotic system-based secure data hiding scheme with high embedding capacity. Computers and Electrical Engineering. 2018;69:447–460. https://doi.org/10.1016/j.compeleceng.2018.02.022
18. Zhang M, Yao Y, Li B, Tang C. Accountable mobile e-commerce scheme in intelligent cloud system transactions. Journal of Ambient Intelligence and Humanized Computing. 2018;9(6):1889–1899.
19. Wang F, Guo Y, Yin Z, Zhou X, Zhao Q. Data Hiding Method based on Reference Matrix. Procedia Computer Science. 2018;131:800–809. https://doi.org/10.1016/j.procs.2018.04.265.
20. Hong W, Chen T, Shiu C. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography. In: 2008 International Symposium on Information Science and Engineering. vol.1; 2008. p. 515–518.
Článok vyšiel v časopise
PLOS One
2019 Číslo 10
- Metamizol jako analgetikum první volby: kdy, pro koho, jak a proč?
- Nejasný stín na plicích – kazuistika
- Masturbační chování žen v ČR − dotazníková studie
- Těžké menstruační krvácení může značit poruchu krevní srážlivosti. Jaký management vyšetření a léčby je v takovém případě vhodný?
- Fixní kombinace paracetamol/kodein nabízí synergické analgetické účinky
Najčítanejšie v tomto čísle
- Correction: Low dose naltrexone: Effects on medication in rheumatoid and seropositive arthritis. A nationwide register-based controlled quasi-experimental before-after study
- Combining CDK4/6 inhibitors ribociclib and palbociclib with cytotoxic agents does not enhance cytotoxicity
- Experimentally validated simulation of coronary stents considering different dogboning ratios and asymmetric stent positioning
- Risk factors associated with IgA vasculitis with nephritis (Henoch–Schönlein purpura nephritis) progressing to unfavorable outcomes: A meta-analysis