A strong-robust covert communication scheme based on geo-coordinate

被引:0
|
作者
Liu, Yanmei [1 ,2 ]
Zhang, Mingliang [2 ]
Duan, Ying [1 ]
Zhang, Yi [2 ]
机构
[1] Zhengzhou Univ Aeronaut, Zhengzhou 450046, Peoples R China
[2] Zhengzhou Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Geographic data; Covert communication; Geo-coordinate; Positioning accuracy; Significant digit;
D O I
10.1007/s11042-023-16867-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The combination of spatial information services, wireless mobile services, and social network services has generated massive social media geographic data, enriching the types of covert communication carriers. However, the imperceptibility and robustness of steganography methods based on geographic data still need to be improved. To this end, this paper proposes a steganography method, which hides secret messages into geo-coordinates. In this method, the sender analyzes the correlation between digit planes of geo-coordinate and positioning accuracy and divides digit planes into A-grade, B-grade, and C-grade according to significance. Then, secret messages are priority embedded in C-grade using the MLSBR algorithm to increase embedding capacity, and the rest are embedded into B-grade using STC adaptive steganography algorithm to enhance the imperceptibility. The receiver uses shared parameters to achieve the correct extraction of secret messages, and the extraction steps are obtaining stego geo-coordinates, dividing digit planes, and matching the steganography algorithm. Experimental results demonstrate that compared with the existing geo-coordinate steganography methods, the proposed method can realize the complete extraction of secret messages, the average embedding capacity is increased by 20.53 bits per geo-coordinate, the extraction error rate is reduced by 50.65%, the trajectory similarity is improved by 94.29%, and the PSNR is raised by 15.55 dB, which all show that the proposed method performs better under the comprehensive measure of average embedding capacity, imperceptibility, and robustness.
引用
收藏
页码:32475 / 32496
页数:22
相关论文
共 38 条
  • [21] A Robust Power Allocation Scheme for Relay Communication Networks Based on Seller–Buyer Game
    Zhixin Liu
    Peng Zhang
    Yazhou Yuan
    Xinping Guan
    Hongxiang Li
    Wireless Personal Communications, 2017, 96 : 4675 - 4693
  • [22] Call Admission Control Scheme Based on Maximizing Throughput for the Multi-Beam GEO Satellite Communication System
    Yu, Jiawei
    Cui, Gaofeng
    Ma, Yinlong
    Li, Xiuhua
    He, Yizhou
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 789 - 793
  • [23] A Robust Power Allocation Scheme for Relay Communication Networks Based on Seller-Buyer Game
    Liu, Zhixin
    Zhang, Peng
    Yuan, Yazhou
    Guan, Xinping
    Li, Hongxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4675 - 4693
  • [24] Secure image encryption scheme based on a new robust chaotic map and strong S-box
    Zhu, Shenli
    Deng, Xiaoheng
    Zhang, Wendong
    Zhu, Congxu
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 207 : 322 - 346
  • [25] A Strong Robust Zero-Watermarking Scheme Based on Shearlets' High Ability for Capturing Directional Features
    Zhao, Jian
    Xu, Wensheng
    Zhang, Shunli
    Fan, Shuaishuai
    Zhang, Wanru
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [26] Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme
    Hassan N. Noura
    Reem Melki
    Rouwaida Kanj
    Ali Chehab
    Wireless Networks, 2021, 27 : 557 - 574
  • [27] Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme
    Noura, Hassan N.
    Melki, Reem
    Kanj, Rouwaida
    Chehab, Ali
    WIRELESS NETWORKS, 2021, 27 (01) : 557 - 574
  • [28] An effective updating scheme based DETM robust LFC under non-ideal communication network
    Zhang, Zhenzhen
    Chen, Hao
    Liu, Bin
    Zhang, Haorong
    Zhong, Shouming
    AUTOMATICA, 2024, 167
  • [29] A Robust Finite-Time Hyperchaotic Secure Communication Scheme Based on Terminal Sliding Mode Control
    Abooee, Ali
    Khorasani, Masoud Moravej
    Haeri, Mohammad
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 854 - 858
  • [30] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)