Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on rand...Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination.展开更多
A lexicographic image hash method based on space and frequency features was proposed. At first, the image database was constructed, and then color and texture features were extracted from the image blocks including in...A lexicographic image hash method based on space and frequency features was proposed. At first, the image database was constructed, and then color and texture features were extracted from the image blocks including information for every image in the database, which formed feature vectors. The feature vectors were clustered to form dictionary. In hash generation, the image was preproc^ssed and divided into blocks firstly. Then color and texture features vectors were extracted from the blocks. These feature vectors were used to search the dictionary, and the nearest word in dictionary for each block was used to form the space features. At the same time. frequency feature was extracted from each block. The space and frequency features were connected to form the intermediate hash. Lastly, the final hash sequence was obtained by pseudo-randomly permuting the intermediate hash. Experiments show that the method has a very low probability of collision and a good perception of robustness. Compared with other methods, this method has a low collision rate.展开更多
指出被广泛使用的电子邮件加密软件PGP(Pretty Good Privacy)的不足。讨论了最新的椭圆曲线密码体制ECC(E llipticCurve Cryptography)与RSA相比的优越性。并把椭圆曲线密码技术应用于电子邮件加密系统,设计并实现了一套电子邮件加密软...指出被广泛使用的电子邮件加密软件PGP(Pretty Good Privacy)的不足。讨论了最新的椭圆曲线密码体制ECC(E llipticCurve Cryptography)与RSA相比的优越性。并把椭圆曲线密码技术应用于电子邮件加密系统,设计并实现了一套电子邮件加密软件。与PGP相比,它的安全程度更高、技术更先进。展开更多
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
基金This work is partially supported by the National Natural Science Foundation of China(Nos.61562007,61762017,61702332)National Key R&D Plan of China(2018YFB1003701)+3 种基金Guangxi“Bagui Scholar”Teams for Innovation and Research,the Guangxi Natural Science Foundation(Nos.2017GXNSFAA198222,2015GXNSFDA139040)the Project of Guangxi Science and Technology(Nos.GuiKeAD17195062)the Project of the Guangxi Key Lab of Multi-source Information Mining&Security(Nos.16-A-02-02,15-A-02-02)the Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing,and the Innovation Project of Guangxi Graduate Education(No.XYCSZ 2018076).
文摘Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination.
基金Natural Science Foundations of Shanghai,China(Nos.15ZR1418500,15ZR1418400)the Training Program of Shanghai University of Electric Power for Academic Backbone Teachers,China
文摘A lexicographic image hash method based on space and frequency features was proposed. At first, the image database was constructed, and then color and texture features were extracted from the image blocks including information for every image in the database, which formed feature vectors. The feature vectors were clustered to form dictionary. In hash generation, the image was preproc^ssed and divided into blocks firstly. Then color and texture features vectors were extracted from the blocks. These feature vectors were used to search the dictionary, and the nearest word in dictionary for each block was used to form the space features. At the same time. frequency feature was extracted from each block. The space and frequency features were connected to form the intermediate hash. Lastly, the final hash sequence was obtained by pseudo-randomly permuting the intermediate hash. Experiments show that the method has a very low probability of collision and a good perception of robustness. Compared with other methods, this method has a low collision rate.
文摘指出被广泛使用的电子邮件加密软件PGP(Pretty Good Privacy)的不足。讨论了最新的椭圆曲线密码体制ECC(E llipticCurve Cryptography)与RSA相比的优越性。并把椭圆曲线密码技术应用于电子邮件加密系统,设计并实现了一套电子邮件加密软件。与PGP相比,它的安全程度更高、技术更先进。