期刊文献+
共找到43篇文章
< 1 2 3 >
每页显示 20 50 100
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:4
1
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 Coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
2
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
3
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:1
4
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
5
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree ... Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree structure vector quantization (CPTSVQ). The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 Digital image information hiding tree structure vector quantization vector quantization.
下载PDF
AN OPTIMAL INFORMATION HIDING ALGORITHM FOR SPEECH IN THE FRACTIONAL FOURIER TRANSFORM DOMAIN
6
作者 Xi Ji Zou Cairong +1 位作者 Bao Yongqiang Wang Qingyun 《Journal of Electronics(China)》 2010年第4期564-570,共7页
With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is ... With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is developing rapidly. In order to stand against the stegano-analysis, the paper proposed an optimal information hiding algorithm for speech in the Fractional Fourier Transform (FrFT) domain based on the Minimum Mean Square Error (MMSE) criterion. The results of simulation and experiments show that speech modified by the proposed algorithm has no remarkable changes both in time and frequency domains, which can effectively resist the time and frequency analysis, Otherwise, the algorithm is robust to general signal process attack, and the difference is imperceptible between the original and modified speech. 展开更多
关键词 Fractional Fourier Transform (FrFT) Speech information hiding Minimum Mean Square Error (MMSE)
下载PDF
The Research on Audio Information Hiding Technology
7
作者 Yuan Kaiguo Yang Yu Yang Yixian (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2007年第4期6-9,共4页
Audio information hiding technology is an important branch of stenography. This article introduces the basic concepts, principles, characteristics and the typical models of the audio information hiding. It then classi... Audio information hiding technology is an important branch of stenography. This article introduces the basic concepts, principles, characteristics and the typical models of the audio information hiding. It then classifies the audio information hiding methods, according to the domain used by them including time, frequency, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and the compressed., and discusses several mainstream algorithms in various domains. It finally points out that the audio information hiding technology cannot solve the problem of re-record attacks, but it also brings forward the possible solutions to this problem. 展开更多
关键词 The Research on Audio information hiding Technology LSB DCT IEEE
下载PDF
A Distributed Secret Sharing Method with QR Code Based on Information Hiding
8
作者 Pengcheng Jiang Yu Xue 《Journal of Cyber Security》 2021年第4期217-225,共9页
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ... QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof. 展开更多
关键词 QR code image encryption information hiding secret sharing
下载PDF
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence
9
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 information hiding neural style transfer robustness
下载PDF
Provably Secure Information Hiding via Short Text in Social Networking Tools 被引量:2
10
作者 Wei Ren Yuliang Liu Junge Zhao 《Tsinghua Science and Technology》 EI CAS 2012年第3期225-231,共7页
Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for... Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for personal covert communication because it can hide information in a very short carrier text, and this concealment is hard to detect due to the diversity of normal traffic. However, designing appropriate schemes confronts several challenges: they need to be provably secure, and their performance needs to maintain high efficiency and handy usability due to the short length of OLST messages. In this paper, we propose a family of customized schemes known as HiMix, HiCod, HiOpt, and HiPhs for text steganography in OLST. These schemes are evaluated in terms of their security and their performance with regard to two metrics that address the particular characteristics of OLST: hiding rate and hiding ease. All proposed schemes are proved to be at least computationally secure, and their performance in terms of hiding rate and hiding ease justifies their applicability in social networking tools that utilize OLST. 展开更多
关键词 information hiding provable security text steganography covert communication
原文传递
LPC parameters substitution for speech information hiding 被引量:1
11
作者 WU Zhi-jun GAO Wei YANG Wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第6期103-112,共10页
Information hiding techniques adopted in secret communication should meet the requirements of high hiding capacity,real-time and high robustness.For the purpose of real-time speech secure communication,an information ... Information hiding techniques adopted in secret communication should meet the requirements of high hiding capacity,real-time and high robustness.For the purpose of real-time speech secure communication,an information hiding algorithm based on the analysis-by-synthesis(ABS) speech coding scheme is presented in this article.This algorithm substitutes secret speech data bits for linear predictive coefficients(LPCs) in linear predictive coding(LPC).Statistics show that the change of voiced signal track is slow and the codebook for LPCs vector is large in ABS coding scheme.Therefore,a new concept,filter similarity,is proposed to determine the LPC parameters for substituting with secret speech information,and to generate multi-codebook for saving storage space to store secret speech information.To achieve the best effects of information hiding,a dynamic threshold is built to make an optimal trade-off among hiding-capacity,security,robustness,transparence and real time.Experiments show that the proposed approach meets the requirements of information hiding and secret communication speech quality.The test results indicate that this approach reaches high hiding capacity with an excellent speech quality and complicating speakers' recognition. 展开更多
关键词 ABS LPC LPCs information hiding filter similarity
原文传递
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy
12
作者 Chin-Feng Lee Kuo-Chung Chan 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1551-1566,共16页
Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being e... Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being easily noticed.The recipient of the image must receive the two stego-images before the secret message can be completely retrieved.Imperceptibility is one of the main advantages of data hiding technology;to increase the imperceptibility,the quality requirements of the stego-images are relatively important.A dual ste-ganographic image RDH method,called a DS-CF scheme that can achieve a bet-ter steganographic image quality using the center folding(CF)strategy.In this paper,we developed a translocation and switching strategy(TaS)to shorten the distances between the stego-pixel coordinates and the cover pixel coordinates after information being hidden.Compared with the DS-CF scheme,our proposed DS-TaS scheme can effectively improve the quality of the steganographic images at the same level of embedding capability.The experimental results show that the PSNR of our DS-TaS scheme at k=1 was 55.66 dB,which is an increase of 1.5 dB,and is 51.43 dB for k=2,46.66 dB for k=3,and 40.91 dB for k=4.In addition,the PSNR values of the stego images was increased by 1.5,0.29,0.29,and 0.19 dB,respectively.This shows that our proposed dual-image RDH method can optimize the visual quality of the stego-images and is better than many other dual-image RDH techniques. 展开更多
关键词 information hiding reversible data hiding(RDH) dual-image RDH center folding(CF)strategy
下载PDF
Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information 被引量:5
13
作者 ZHANGWei-ming LIShi-qu +1 位作者 CAOJia LIUJiu-fen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期315-318,共4页
The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extra... The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance ofstego-key, and the theoretic conclusion is used to analyze the actual extracting attack on LeastSignificant Bit(LSB) steganographic algorithms. 展开更多
关键词 information hiding STEGANOGRAPHY extracting attack difficulty ofextraction unicity distance
下载PDF
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
14
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
Fragile Watermarking Based on Robust Hidden Information 被引量:1
15
作者 张新鹏 王朔中 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期261-264,共4页
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked... Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark. 展开更多
关键词 digital watermarking information hiding fragile robust.
下载PDF
Cyclomatic Complexity-Based Encapsulation, Data Hiding, and Separation of Concerns
16
作者 Charles W. Butler Thomas J. McCabe 《Journal of Software Engineering and Applications》 2021年第1期44-66,共23页
<div style="text-align:justify;"> <span style="font-family:Verdana;">Three design principles are prominent in software development-encapsulation, data hiding, and separation of concerns... <div style="text-align:justify;"> <span style="font-family:Verdana;">Three design principles are prominent in software development-encapsulation, data hiding, and separation of concerns. These principles are used as subjective quality criteria for both procedural and object-oriented applications. The purpose of research is to quantify encapsulation, data hiding, and separation of concerns is quantified using cyclomatic-based metrics. As a result of this research, the derived design metrics, coefficient of encapsulation, coefficient of data hiding, and coefficient of separation of concerns, are defined and applied to production software indicating whether the software has low or high encapsulation, data hiding, and separation of concerns.</span> </div> 展开更多
关键词 Object-Oriented Design Methods RELIABILITY Complexity Measures Software Design ENCAPSULATION information hiding Separation of Concerns McCabe Metrics Coefficient of Encapsulation Coefficient of Data hiding Coefficient of Separation of Concerns
下载PDF
A QR Data Hiding Method Based on Redundant Region and BCH
17
作者 Ying Zhou Weiwei Luo 《Journal on Big Data》 2021年第3期127-133,共7页
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do... In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction. 展开更多
关键词 QR code image encryption information hiding secret sharing
下载PDF
Topic Controlled Steganography via Graph-to-Text Generation
18
作者 Bowen Sun Yamin Li +3 位作者 Jun Zhang Honghong Xu Xiaoqiang Ma Ping Xia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期157-176,共20页
Generation-based linguistic steganography is a popular research area of information hiding.The text generative steganographic method based on conditional probability coding is the direction that researchers have recen... Generation-based linguistic steganography is a popular research area of information hiding.The text generative steganographic method based on conditional probability coding is the direction that researchers have recently paid attention to.However,in the course of our experiment,we found that the secret information hiding in the text tends to destroy the statistical distribution characteristics of the original text,which indicates that this method has the problem of the obvious reduction of text quality when the embedding rate increases,and that the topic of generated texts is uncontrollable,so there is still room for improvement in concealment.In this paper,we propose a topic-controlled steganography method which is guided by graph-to-text generation.The proposed model can automatically generate steganographic texts carrying secret messages from knowledge graphs,and the topic of the generated texts is controllable.We also provide a graph path coding method with corresponding detailed algorithms for graph-to-text generation.Different from traditional linguistic steganography methods,we encode the secret information during graph path coding rather than using conditional probability.We test our method in different aspects and compare it with other text generative steganographic methods.The experimental results show that the model proposed in this paper can effectively improve the quality of the generated text and significantly improve the concealment of steganographic text. 展开更多
关键词 information hiding linguistic steganography knowledge graph topic controlled text generation
下载PDF
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network 被引量:7
19
作者 Chuanlong Li Yumeng Jiang Marta Cheslyar 《Computers, Materials & Continua》 SCIE EI 2018年第8期313-324,共12页
Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of... Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes. 展开更多
关键词 GAN CNN texture synthesis STEGANOGRAPHY WATERMARK image concealing information hiding
下载PDF
A Fusion Steganographic Algorithm Based on Faster R-CNN 被引量:5
20
作者 Ruohan Meng Steven G.Rice +1 位作者 Jin Wang Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2018年第4期1-16,共16页
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret ... The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret message should not be damaged on the process of the cover media.In order to ensure the invisibility of secret message,complex texture objects should be chosen for embedding information.In this paper,an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message.Firstly,complex texture regions are selected based on a kind of objects detection algorithm.Secondly,three different steganographic methods were used to hide secret message into the selected block region.Experimental results show that the approach enhances the security and robustness. 展开更多
关键词 Faster R-CNN fusion steganography object detection CNNS information hiding.
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部