期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Information hiding with adaptive steganography based on novel fuzzy edge identification 被引量:2
1
作者 Sanjeev Kumar Amarpal Singh Manoj Kumar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第2期162-169,共8页
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ... The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain. 展开更多
关键词 Information security ADAPTIVE steganography FUZZY EDGE detection PATTERN RECOGNITION
在线阅读 下载PDF
Block-Based Adaptive Image Steganography Using LSB Matching Revisited 被引量:2
2
作者 Wei Huang Yao Zhao Rong-Rong Ni 《Journal of Electronic Science and Technology》 CAS 2011年第4期291-296,共6页
Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate ... Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance. 展开更多
关键词 Index Terms---Block-based steganography least significant bit matching revisited pixel-pairs differences histogram steganalysis.
在线阅读 下载PDF
Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states 被引量:1
3
作者 叶天语 蒋丽珍 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期152-159,共8页
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by build... A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. 展开更多
关键词 quantum steganography quantum secure direct communication dense coding entanglementswapping
在线阅读 下载PDF
A Steganography-Based Optical Image Encryption System Using RGB Channel Integration 被引量:1
4
作者 Cheng-Hung Chuang 《Journal of Electronic Science and Technology》 CAS 2013年第1期3-8,共6页
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm t... An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality. 展开更多
关键词 Data hiding data embedding information security image steganography image cryptosystem optical security.
在线阅读 下载PDF
Large payload quantum steganography based on cavity quantum electrodynamics
5
作者 叶天语 蒋丽珍 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期110-117,共8页
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a h... A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols. 展开更多
关键词 quantum steganography hidden capacity entanglement swapping Hadamard operation cavity QED
在线阅读 下载PDF
A secure image protection algorithm by steganography and encryption using the 2D-TSCC
6
作者 Qi Li Xingyuan Wang +4 位作者 He Wang Xiaolin Ye Shuang Zhou Suo Gao Yunqing Shi 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第11期274-285,共12页
Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and encryption.First,a 2D-TSCC system is designed.The 2D-TSCC has a large para... Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and encryption.First,a 2D-TSCC system is designed.The 2D-TSCC has a large parameter space in a hyperchaotic state.The chaotic trajectory fills the entire window.The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness,so it can be used in steganography and encryption.Then,the amount of information contained in each bit of the cover image is analyzed,and the three bits which carry the least amount of information are selected.The secret image is hidden in these three bits base on the 2D-TSCC.Finally,the carrier image is scrambled and diffused by the 2D-TSCC.The ciphertext is generated in this way.Send the ciphertext to the recipient through channel transmission,and the recipient obtains the secret image by decrypting twice. 展开更多
关键词 2D-TSCC steganography image encryption mod diffuse chaos
在线阅读 下载PDF
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
7
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期199-202,共4页
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 展开更多
关键词 quantum steganography GHZ4 entangled state quantum cryptography quantum communication
在线阅读 下载PDF
Double-Layer Data Embedding Scheme Based on Three-Pixel Differences 被引量:1
8
作者 Chiao-Chih Huang Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2011年第4期297-300,共4页
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but ... Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis. 展开更多
关键词 Hiding capacity least significant bit replacement security analysis steganography visual quality.
在线阅读 下载PDF
Secure Image Hiding Scheme Based on Magic Signet
9
作者 Chin-Feng Lee Ying-Xiang Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2020年第1期93-101,共9页
Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message. High embedding capacity,good... Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message. High embedding capacity,good images quality, and security are three important essentials. In this paper, each confidential hexadecimal will be carried by two cover pixels based on a magic matrix generated from a square template to reach the goal of higher embedding capacity while keeping good image visualization. Experimental results reveal that the proposed scheme guarantees higher embedding capacity of 2 bits per pixel and has the peak signal-to-noise ratio(PSNR) of 44.7 dB on average. Moreover, secret keys are used to ensure security consideration. 展开更多
关键词 Data hiding EMBEDDING capacity steganography VISUAL quality
在线阅读 下载PDF
Study of Difference-Expansion Embedding Schemes
10
作者 Ke Mao Chin-Feng Lee +1 位作者 Chin-Cheng Chang Run-Hua Shi 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期211-216,共6页
Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capac... Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capacity,but due to its major location map,the pure payload is rather low.Therefore many scholars did relevant improvements which let n pixels as a unit instead of the original two pixels as a unit and can adaptively adjust the number of embedding secret information according to the smoothness degree of the block,which achieves the result of improving the information payload or the image quality.In this paper,the study of DE-based reversible data hiding schemes is comprehensively discussed.The performance of DEbased schemes is evaluated and compared in terms of embedding capacity and stego-image quality. 展开更多
关键词 Index Terms-Difference expansion integertransform reversible data hiding steganography
在线阅读 下载PDF
A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
11
作者 Zhi-Hui Wang Cheng Guo Chin-Chen Chang 《Journal of Electronic Science and Technology》 CAS 2013年第1期44-50,共7页
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et ... Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et al.'s scheme, we propose a novel (n, n) secret image sharing scheme based on Sudoku. In the proposed scheme, a secret image can be shared among n different cover images by generating n shadow images, and the secret image can be reconstructed without distortion using only these n shadow images. Also, the proposed scheme can solve the overflow and underflow problems. The experimental results show that the visual quality of the shadow images is satisfactory. Furthermore, the proposed scheme allows for a large embedding capacity. 展开更多
关键词 Secret sharing (n n) secret image sharing SUDOKU steganography.
在线阅读 下载PDF
High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
12
作者 Yung-Chen Chou Huang-Ching Li 《Journal of Electronic Science and Technology》 CAS 2013年第1期9-14,共6页
Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also c... Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also can restore the cover medium. Histogram shifting is one of the most popular reversible data hiding techniques. Luo et ai. presented a reversible data hiding technique that shifts the histogram of prediction error. But the embedding payload of Luo et al.'s method can further be improved. The proposed method uses a difference segmentation strategy and pseudo pixel generation to increase the height of peak in the prediction error histogram. The experimental results show that the embedding payload of the proposed method is higher than that of Luo et aL's method. 展开更多
关键词 Data hiding histogram sifting secret data delivery steganography.
在线阅读 下载PDF
An Adaptive Steganographic Algorithm for Point Geometry Based on Nearest Neighbors Search
13
作者 Yuan-Yu Tsai Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期220-226,共7页
In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between p... In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation. 展开更多
关键词 ADAPTATION nearest neighbors search point geometry steganography.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部