The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate ...Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance.展开更多
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by build...A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.展开更多
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm t...An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality.展开更多
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a h...A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.展开更多
Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and encryption.First,a 2D-TSCC system is designed.The 2D-TSCC has a large para...Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and encryption.First,a 2D-TSCC system is designed.The 2D-TSCC has a large parameter space in a hyperchaotic state.The chaotic trajectory fills the entire window.The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness,so it can be used in steganography and encryption.Then,the amount of information contained in each bit of the cover image is analyzed,and the three bits which carry the least amount of information are selected.The secret image is hidden in these three bits base on the 2D-TSCC.Finally,the carrier image is scrambled and diffused by the 2D-TSCC.The ciphertext is generated in this way.Send the ciphertext to the recipient through channel transmission,and the recipient obtains the secret image by decrypting twice.展开更多
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography...Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.展开更多
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but ...Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis.展开更多
Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message. High embedding capacity,good...Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message. High embedding capacity,good images quality, and security are three important essentials. In this paper, each confidential hexadecimal will be carried by two cover pixels based on a magic matrix generated from a square template to reach the goal of higher embedding capacity while keeping good image visualization. Experimental results reveal that the proposed scheme guarantees higher embedding capacity of 2 bits per pixel and has the peak signal-to-noise ratio(PSNR) of 44.7 dB on average. Moreover, secret keys are used to ensure security consideration.展开更多
Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capac...Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capacity,but due to its major location map,the pure payload is rather low.Therefore many scholars did relevant improvements which let n pixels as a unit instead of the original two pixels as a unit and can adaptively adjust the number of embedding secret information according to the smoothness degree of the block,which achieves the result of improving the information payload or the image quality.In this paper,the study of DE-based reversible data hiding schemes is comprehensively discussed.The performance of DEbased schemes is evaluated and compared in terms of embedding capacity and stego-image quality.展开更多
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et ...Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et al.'s scheme, we propose a novel (n, n) secret image sharing scheme based on Sudoku. In the proposed scheme, a secret image can be shared among n different cover images by generating n shadow images, and the secret image can be reconstructed without distortion using only these n shadow images. Also, the proposed scheme can solve the overflow and underflow problems. The experimental results show that the visual quality of the shadow images is satisfactory. Furthermore, the proposed scheme allows for a large embedding capacity.展开更多
Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also c...Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also can restore the cover medium. Histogram shifting is one of the most popular reversible data hiding techniques. Luo et ai. presented a reversible data hiding technique that shifts the histogram of prediction error. But the embedding payload of Luo et al.'s method can further be improved. The proposed method uses a difference segmentation strategy and pseudo pixel generation to increase the height of peak in the prediction error histogram. The experimental results show that the embedding payload of the proposed method is higher than that of Luo et aL's method.展开更多
In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between p...In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation.展开更多
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
基金supported in part by the National Science Foundation of China for Distinguished Young Scholars under Grant No. 61025013Sino-Singapore JRP under Grant No. 2010DFA11010+1 种基金National NSF of China under Grant No. 61073159Fundamental Research Funds for the Central Universities under Grant No. 2009JBZ006
文摘Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60972071)the Natural Science Foundation of Zhejiang Province, China(Grant Nos. Y6100421 and LQ12F02012)
文摘A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.
基金supported by the National Science Council,Taiwan under Grant No.NSC 97-2221-E-468-006
文摘An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed, method has a good performance in both hiding capacity and decrypted image quality.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60972071)the Natural Science Foundation of Zhejiang Province, China(Grant Nos. LQ12F02012 and Y6100421)
文摘A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203)+3 种基金Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013)Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103)Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031)Guangxi Key Laboratory of Multi-source Information Mining&Security (Grant No. MIMS20-M-02)
文摘Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and encryption.First,a 2D-TSCC system is designed.The 2D-TSCC has a large parameter space in a hyperchaotic state.The chaotic trajectory fills the entire window.The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness,so it can be used in steganography and encryption.Then,the amount of information contained in each bit of the cover image is analyzed,and the three bits which carry the least amount of information are selected.The secret image is hidden in these three bits base on the 2D-TSCC.Finally,the carrier image is scrambled and diffused by the 2D-TSCC.The ciphertext is generated in this way.Send the ciphertext to the recipient through channel transmission,and the recipient obtains the secret image by decrypting twice.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61170272,61272514,61003287,and 61070163)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20100005120002)+3 种基金the Fok Ying Tong Education Foundation (Grant No. 131067)the Natural Science Foundation of Shandong Province,China (Grant No. ZR2011FM023)the Outstanding Research Award Fund for Young Scientists of Shandong Province,China (Grant No. BS2011DX034)the Fundamental Research Funds for Central Universities of China (Grant No. BUPT2012RC0221)
文摘Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.
基金supported by the National Science Council Foundation of Taiwan under Grant No. NSC-100-2218-E-468-002-MY2
文摘Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis.
文摘Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message. High embedding capacity,good images quality, and security are three important essentials. In this paper, each confidential hexadecimal will be carried by two cover pixels based on a magic matrix generated from a square template to reach the goal of higher embedding capacity while keeping good image visualization. Experimental results reveal that the proposed scheme guarantees higher embedding capacity of 2 bits per pixel and has the peak signal-to-noise ratio(PSNR) of 44.7 dB on average. Moreover, secret keys are used to ensure security consideration.
基金supported in part by MOST under Grants No.105-2221-E-324-015 and No.103-2632-E-324-001-MY3
文摘Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capacity,but due to its major location map,the pure payload is rather low.Therefore many scholars did relevant improvements which let n pixels as a unit instead of the original two pixels as a unit and can adaptively adjust the number of embedding secret information according to the smoothness degree of the block,which achieves the result of improving the information payload or the image quality.In this paper,the study of DE-based reversible data hiding schemes is comprehensively discussed.The performance of DEbased schemes is evaluated and compared in terms of embedding capacity and stego-image quality.
基金supported by the National Natural Science Foundation of China Under Grant No.61272374 and No.61272371
文摘Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et al.'s scheme, we propose a novel (n, n) secret image sharing scheme based on Sudoku. In the proposed scheme, a secret image can be shared among n different cover images by generating n shadow images, and the secret image can be reconstructed without distortion using only these n shadow images. Also, the proposed scheme can solve the overflow and underflow problems. The experimental results show that the visual quality of the shadow images is satisfactory. Furthermore, the proposed scheme allows for a large embedding capacity.
基金supported by Asia University under Grant No.100-asia-33
文摘Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also can restore the cover medium. Histogram shifting is one of the most popular reversible data hiding techniques. Luo et ai. presented a reversible data hiding technique that shifts the histogram of prediction error. But the embedding payload of Luo et al.'s method can further be improved. The proposed method uses a difference segmentation strategy and pseudo pixel generation to increase the height of peak in the prediction error histogram. The experimental results show that the embedding payload of the proposed method is higher than that of Luo et aL's method.
基金supported by the National Science Council under Grant No. NSC98-2221-E-468-017 and NSC 100-2221-E-468-023the Research Project of Asia University under Grant No. 100-A-04
文摘In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation.