A Robust Text Information Hiding Model Based On Quick Response Code

被引:0
|
作者
Wang, Jingyu [1 ]
Yao, Zhijie [1 ]
Jing, Xiaojun [1 ]
Mu, Junsheng [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing, Peoples R China
关键词
QR Code; DL; Information Hiding; Information Security;
D O I
10.1109/IWCMC58020.2023.10183264
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As an important direction in the field of information hiding, steganography is a significant means to realize secret communication. With the development of artificial intelligence, researchers have tried to use Deep Learning (DL) to design automated information hiding schemes, but the existing schemes still have shortcomings in security, hiding capacity, and robustness. To solve this problem, this paper designs a set of safe and robust image information hiding schemes by using a DL network, Quick Response (QR) coding, and introducing a noise layer mechanism. In addition, this scheme makes information hiding technology get rid of the dependence on human operation and prior professional knowledge, breaks the dilemma that information hiding needs to choose the appropriate hidden carrier and modify the carrier to embed information, and also proves that it has great potential in the field of information security.
引用
收藏
页码:1238 / 1243
页数:6
相关论文
共 50 条
  • [21] Robust RDWT-ICA based information hiding
    Hien, Thai Duy
    Nakao, Zensho
    Chen, Yen-Wei
    SOFT COMPUTING, 2006, 10 (12) : 1135 - 1144
  • [22] Coverless Information Hiding Based on Robust Image Hashing
    Zheng, Shuli
    Wang, Liang
    Ling, Baohong
    Hu, Donghui
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2017, PT III, 2017, 10363 : 536 - 547
  • [23] Robust RDWT-ICA based information hiding
    Thai Duy Hien
    Zensho Nakao
    Yen-Wei Chen
    Soft Computing, 2006, 10 : 1135 - 1144
  • [24] Fusing Deep Quick Response Code Representations Improves Malware Text Classification
    Ravikiran, Manikandan
    Madgula, Krishna
    PROCEEDINGS OF THE ACM WORKSHOP ON CROSSMODAL LEARNING AND APPLICATION (WCRML'19), 2019, : 11 - 18
  • [25] Text coverless information hiding based on compound and selection of words
    Chen, Xianyi
    Chen, Sheng
    SOFT COMPUTING, 2019, 23 (15) : 6323 - 6330
  • [26] An algorithm of binary text image authentication based on information hiding
    Gao, Baojian
    Huang, Meiru
    Wang, Jun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 894 - 899
  • [27] Text Coverless Information Hiding Based on BERT Entity Recognition
    Xiang, Lin
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2024, 14
  • [28] Text Coverless Information Hiding Method Based on Hybrid Tags
    Wu, Yulei
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 649 - 655
  • [29] Text coverless information hiding based on compound and selection of words
    Xianyi Chen
    Sheng Chen
    Soft Computing, 2019, 23 : 6323 - 6330
  • [30] Coverless Text Information Hiding Method Based on the Rank Map
    Zhang, Jianjun
    Wang, Lucai
    Lin, Haijun
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 427 - 434