期刊文献+
共找到122篇文章
< 1 2 7 >
每页显示 20 50 100
A Review on the Recent Trends of Image Steganography for VANET Applications
1
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 steganography image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Topic Controlled Steganography via Graph-to-Text Generation
2
作者 Bowen Sun Yamin Li +3 位作者 Jun Zhang Honghong Xu Xiaoqiang Ma Ping Xia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期157-176,共20页
Generation-based linguistic steganography is a popular research area of information hiding.The text generative steganographic method based on conditional probability coding is the direction that researchers have recen... Generation-based linguistic steganography is a popular research area of information hiding.The text generative steganographic method based on conditional probability coding is the direction that researchers have recently paid attention to.However,in the course of our experiment,we found that the secret information hiding in the text tends to destroy the statistical distribution characteristics of the original text,which indicates that this method has the problem of the obvious reduction of text quality when the embedding rate increases,and that the topic of generated texts is uncontrollable,so there is still room for improvement in concealment.In this paper,we propose a topic-controlled steganography method which is guided by graph-to-text generation.The proposed model can automatically generate steganographic texts carrying secret messages from knowledge graphs,and the topic of the generated texts is controllable.We also provide a graph path coding method with corresponding detailed algorithms for graph-to-text generation.Different from traditional linguistic steganography methods,we encode the secret information during graph path coding rather than using conditional probability.We test our method in different aspects and compare it with other text generative steganographic methods.The experimental results show that the model proposed in this paper can effectively improve the quality of the generated text and significantly improve the concealment of steganographic text. 展开更多
关键词 Information hiding linguistic steganography knowledge graph topic controlled text generation
下载PDF
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
3
作者 Al-Hussien Seddik Mohammed Salah +5 位作者 Gamal Behery Ahmed El-harby Ahmed Ismail Ebada Sokea Teng Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2023年第3期5087-5103,共17页
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t... The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods. 展开更多
关键词 Coverless steganography data hiding information security QR code maze game
下载PDF
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
4
作者 Asma Sajjad Humaira Ashraf +3 位作者 NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3881-3898,共18页
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive... The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab. 展开更多
关键词 Video steganography data encryption DNA embedding frame selection
下载PDF
Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification
5
作者 Jiangchuan Li Peisong He +2 位作者 Jiayong Liu Jie Luo Qiang Xia 《Computers, Materials & Continua》 SCIE EI 2023年第6期4893-4915,共23页
Steganography techniques,such as audio steganography,have been widely used in covert communication.However,the deep neural network,especially the convolutional neural network(CNN),has greatly threatened the security o... Steganography techniques,such as audio steganography,have been widely used in covert communication.However,the deep neural network,especially the convolutional neural network(CNN),has greatly threatened the security of audio steganography.Besides,existing adversarial attacks-based countermeasures cannot provide general perturbation,and the trans-ferability against unknown steganography detection methods is weak.This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues.Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation,which applies adversarial attack tech-niques,such as Deepfool.Moreover,the sample diversification strategy is designed to improve the transferability of adversarial perturbations in black-box attack scenarios,where two types of common audio-processing operations are considered,including noise addition and moving picture experts group audio layer III(MP3)compression.Furthermore,the perturbation ensemble method is applied to further improve the attacks’transferability by integrating perturbations of different detection networks with heterogeneous architec-tures.Consequently,the single universal adversarial perturbation can enhance different cover audios against a CNN-based detection network.Extensive experiments have been conducted,and the results demonstrate that the average missed-detection probabilities of the proposed method are higher than those of the state-of-the-art methods by 7.3%and 16.6%for known and unknown detection networks,respectively.It verifies the efficiency and transferability of the proposed methods for the cover enhancement of audio steganography. 展开更多
关键词 Audio steganography cover enhancement adversarial perturbations sample diversification
下载PDF
Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms
6
作者 Nizheen A.Ali Ramadhan J.Mstafa 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1451-1469,共19页
With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique ... With the widespread use of the internet,there is an increasing need to ensure the security and privacy of transmitted data.This has led to an intensified focus on the study of video steganography,which is a technique that hides data within a video cover to avoid detection.The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency.This paper proposes a new method to video steganography,which involves utilizing a Genetic Algorithm(GA)for identifying the Region of Interest(ROI)in the cover video.The ROI is the area in the video that is the most suitable for data embedding.The secret data is encrypted using the Advanced Encryption Standard(AES),which is a widely accepted encryption standard,before being embedded into the cover video,utilizing up to 10%of the cover video.This process ensures the security and confidentiality of the embedded data.The performance metrics for assessing the proposed method are the Peak Signalto-Noise Ratio(PSNR)and the encoding and decoding time.The results show that the proposed method has a high embedding capacity and efficiency,with a PSNR ranging between 64 and 75 dBs,which indicates that the embedded data is almost indistinguishable from the original video.Additionally,the method can encode and decode data quickly,making it efficient for real-time applications. 展开更多
关键词 Video steganography genetic algorithm advanced encryption standard SECURITY effective embedding
下载PDF
An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography
7
作者 Khalil Hamdi Ateyeh Al-Shqeerat 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2095-2107,共13页
Most remote systems require user authentication to access resources.Text-based passwords are still widely used as a standard method of user authentication.Although conventional text-based passwords are rather hard to ... Most remote systems require user authentication to access resources.Text-based passwords are still widely used as a standard method of user authentication.Although conventional text-based passwords are rather hard to remember,users often write their passwords down in order to compromise security.One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users.Graphical user authentication methods have recently been proposed to verify the user identity.However,the fundamental limitation of a graphi-cal password is that it must have a colorful and rich image to provide an adequate password space to maintain security,and when the user clicks and inputs a pass-word between two possible grids,the fault tolerance is adjusted to avoid this situation.This paper proposes an enhanced graphical authentication scheme,which comprises benefits over both recognition and recall-based graphical techniques besides image steganography.The combination of graphical authentication and steganography technologies reduces the amount of sensitive data shared between users and service providers and improves the security of user accounts.To evaluate the effectiveness of the proposed scheme,peak signal-to-noise ratio and mean squared error parameters have been used. 展开更多
关键词 SECURITY graphical authentication steganography peak signal to noise ratio mean squared error
下载PDF
Coverless Image Steganography System Based on Maze Game Generation
8
作者 Al Hussien Seddik Saad Mohammed S.Reda +4 位作者 GamalM.Behery Ahmed A.El-harby Mohammed Baz Mohamed Abouhawwash Ahmed Ismail Ebada 《Intelligent Automation & Soft Computing》 2023年第11期125-138,共14页
The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data ... The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data concealing has been suggested by researchers called coverless steganography.Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image.This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems.The system uses the secret message to generate the stego image in the form of one of the Intelligence Quotient(IQ)games,the maze.Firstly,a full grid is generated with several specific rows and columns determined from the number of bits of the secret message.Then,these bits are fed to the full grid to form the maze game stego image.Finally,the generated maze game stego image is sent to the recipient.The experimental results,using the Bit Error Rate(BER),were conducted,and confirmed the strength of this system represented by a high capacity,perfect performance,robustness,and stronger hiding system compared with existing coverless steganography systems. 展开更多
关键词 Coverless data hiding digital image steganography intelligence quotient games maze game
下载PDF
Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography 被引量:2
9
作者 Pranati Rakshit Sreeparna Ganguly +2 位作者 Souvik Pal Ayman AAly Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2021年第4期1207-1224,共18页
With the increasing need of sensitive or secret data transmission through public network,security demands using cryptography and steganography are becoming a thirsty research area of last few years.These two technique... With the increasing need of sensitive or secret data transmission through public network,security demands using cryptography and steganography are becoming a thirsty research area of last few years.These two techniques can be merged and provide better security which is nowadays extremely required.The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography.In this system,we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography.Each of the sub-images is then hidden within individual cover audio files using audio steganographic techniques.The cover audios are then sent to the required destinations where reverse steganography schemes are applied to them to get the incomprehensible component images back.At last,all the sub-images are superimposed to get the actual secret image.This method is very secure as it uses a two-step security mechanism to maintain secrecy.The possibility of interception is less in this technique because one must have each piece of correct sub-image to regenerate the actual secret image.Without superimposing every one of the sub-images meaningful secret images cannot be formed.Audio files are composed of densely packed bits.The high density of data in audio makes it hard for a listener to detect the manipulation due to the proposed time-domain audio steganographic method. 展开更多
关键词 Information security visual cryptography audio steganography secret image reverse steganography
下载PDF
Steganography in binary image by checking data-carrying eligibility of boundary pixels 被引量:6
10
作者 梁光岚 王朔中 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2007年第3期272-277,共6页
We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boundary pix... We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boundary pixels by checking each pixel of the cover image in a pseudo-random order for embedding eligibility. A set of rules ensures correct identification of data-carrying pixels in blind extraction. The proposed scheme does not generate isolated dots, and can incorporate various coding methods such as matrix encoding to further improve the embedding performance. It is shown that up to one fourth of the boundary pixels may be used to carry secret data. Experimental results indicate that the method can achieve good visual quality with fairly large data capacity. 展开更多
关键词 binary image steganography embedding eligibility boundary pixel.
下载PDF
Coverless Steganography for Digital Images Based on a Generative Model 被引量:4
11
作者 Xintao Duan Haoxian Song +1 位作者 Chuan Qin Muhammad Khurram Khan 《Computers, Materials & Continua》 SCIE EI 2018年第6期483-493,共11页
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ... In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability. 展开更多
关键词 Generative model coverless image steganography STEGANALYSIS steganographic capacity security.
下载PDF
Information hiding with adaptive steganography based on novel fuzzy edge identification 被引量:2
12
作者 Sanjeev Kumar Amarpal Singh Manoj Kumar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第2期162-169,共8页
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ... The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain. 展开更多
关键词 Information security ADAPTIVE steganography FUZZY EDGE detection PATTERN RECOGNITION
下载PDF
Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB 被引量:2
13
作者 Qili Zhou Yongbin Qiu +4 位作者 Li Li Jianfeng Lu Wenqiang Yuan Xiaoqing Feng Xiaoyang Mao 《Computers, Materials & Continua》 SCIE EI 2018年第4期151-163,共13页
Steganography technology has been widely used in data transmission with secret information.However,the existing steganography has the disadvantages of low hidden information capacity,poor visual effect of cover images... Steganography technology has been widely used in data transmission with secret information.However,the existing steganography has the disadvantages of low hidden information capacity,poor visual effect of cover images,and is hard to guarantee security.To solve these problems,steganography using reversible texture synthesis based on seeded region growing and LSB is proposed.Secret information is embedded in the process of synthesizing texture image from the existing natural texture.Firstly,we refine the visual effect.Abnormality of synthetic texture cannot be fully prevented if no approach of controlling visual effect is applied in the process of generating synthetic texture.We use seeded region growing algorithm to ensure texture’s similar local appearance.Secondly,the size and capacity of image can be decreased by introducing the information segmentation,because the capacity of the secret information is proportional to the size of the synthetic texture.Thirdly,enhanced security is also a contribution in this research,because our method does not need to transmit parameters for secret information extraction.LSB is used to embed these parameters in the synthetic texture. 展开更多
关键词 steganography texture synthesis LSB seeded region growing algorithm information segmentation
下载PDF
Coverless Image Steganography Based on Jigsaw Puzzle Image Generation 被引量:2
14
作者 Al Hussien Seddik Saad M.S.Mohamed E.H.Hafez 《Computers, Materials & Continua》 SCIE EI 2021年第5期2077-2091,共15页
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these ... Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload.A coverless data hiding concept is proposed to solve this issue.Coverless does not mean that cover is not required,or the payload can be transmitted without a cover.Instead,the payload is embedded by cover generation or a secret message mapping between the cover file and the payload.In this paper,a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message.Firstly,the image is divided into equal rows then further divided into equal columns,creating blocks(i.e.,sub-images).Then,according to secret message bits and a proposed mapping function,each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image.After that,the generated jigsaw puzzle image is sent to the receiver.Experimental results and analysis show a good performance in the hiding capacity,security,and robustness compared with existing coverless image steganography methods. 展开更多
关键词 Coverless information hiding Jigsaw puzzle image image steganography data hiding
下载PDF
Block-Based Adaptive Image Steganography Using LSB Matching Revisited 被引量:2
15
作者 Wei Huang Yao Zhao Rong-Rong Ni 《Journal of Electronic Science and Technology》 CAS 2011年第4期291-296,共6页
Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate ... Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance. 展开更多
关键词 Index Terms---Block-based steganography least significant bit matching revisited pixel-pairs differences histogram steganalysis.
下载PDF
A secure image steganography algorithm based on least significant bit and integer wavelet transform 被引量:2
16
作者 ELSHAZLY Emad ABDELWAHAB Safey +3 位作者 ABOUZAID Refaat ZAHRAN Osama ELARABY Sayed ELKORDY Mohamed 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期639-649,共11页
The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a... The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms. 展开更多
关键词 image steganography image processing integer wavelet transform
下载PDF
Steganography based on wavelet transform and modulus function 被引量:1
17
作者 Kang Zhiwei Liu Jing He Yigang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期628-632,共5页
In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a nove... In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a novel steganographic method based on wavelet and modulus function is presented. First, an image is divided into blocks of prescribed size, and every block is decomposed into one-level wavelet. Then, the capacity of the hidden secret data is decided with the number of wavelet coefficients of larger magnitude. Finally, secret information is embedded by steganography based on modulus function. From the experimental results, the proposed method hides much more information and maintains a good visual quality of stego-image. Besides, the embedded data can be extracted from the stego-image without referencing the original image. 展开更多
关键词 steganography capacity wavelet transform modulus function HVS.
下载PDF
Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states 被引量:1
18
作者 叶天语 蒋丽珍 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期152-159,共8页
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by build... A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. 展开更多
关键词 quantum steganography quantum secure direct communication dense coding entanglementswapping
下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:1
19
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography QR code SECURITY ElGamal cryptosystem DWT
下载PDF
Coverless Image Steganography Based on Image Segmentation 被引量:1
20
作者 Yuanjing Luo Jiaohua Qin +3 位作者 Xuyu Xiang Yun Tan Zhibin He Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第8期1281-1295,共15页
To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based... To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based on whole feature mapping,which has poor robustness when facing geometric attacks,because the contents in the image are easy to lost.To solve this problem,we use ResNet to extract semantic features,and segment the object areas from the image through Mask RCNN for information hiding.These selected object areas have ethical structural integrity and are not located in the visual center of the image,reducing the information loss of malicious attacks.Then,these object areas will be binarized to generate hash sequences for information mapping.In transmission,only a set of stego-images unrelated to the secret information are transmitted,so it can fundamentally resist steganalysis.At the same time,since both Mask RCNN and ResNet have excellent robustness,pre-training the model through supervised learning can achieve good performance.The robust hash algorithm can also resist attacks during transmission.Although image segmentation will reduce the capacity,multiple object areas can be extracted from an image to ensure the capacity to a certain extent.Experimental results show that compared with other coverless image steganography methods,our method is more robust when facing geometric attacks. 展开更多
关键词 Coverless steganography semantic feature image segmentation Mask RCNN ResNet
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部