Image Hiding Algorithm Based on Secure Steganography Mechanism

被引:0
|
作者
Zhao, Lian [1 ]
Zhang, Yingzhou [1 ]
Wang, Xing [1 ]
Chen, Xinghao [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing, Jiangsu, Peoples R China
关键词
SVD decomposition; information; concealment; extraction;
D O I
10.1109/CyberC.2017.70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of computer network, security awareness increases. Therefore, information hiding technology has been played an important role in security protection. However, most information hiding algorithms don't do well in security. In this paper, we propose the image information hiding algorithm based on SVD (Singularly Valuable Decomposition), which applies the singular value decomposition technique to the information hiding process module. And double barriers protect the security of information transmission. In the first barrier, the preprocessing module is added for information to be hidden. Its main function is to encrypt and compress information to be hidden into ciphertext so as to increase the amount of information embedded and to enhance its security. In the second barrier, the optimal embedding position in the carrier image is found by SVD decomposition technique before the ciphertext is embedded in the optimal embedding position. The concealment of information hiding is improved because of the above operation. The experimental results show that the algorithm achieves the purpose of improving the security of secret information transmission and the embedding amount.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 50 条
  • [1] Secure Image Steganography Approach for Hiding Compressed Data
    Abdul-Zaher, Khadija M.
    Sewesy, Adel Abo El-Magd
    Mohamed, Marghany Hassan
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 575 - 595
  • [2] A secure controlled quantum image steganography algorithm
    Zhiguo Qu
    Siyi Chen
    Xiaojun Wang
    [J]. Quantum Information Processing, 2020, 19
  • [3] Dual Layered Secure Algorithm for Image Steganography
    Gowda, Shreyank N.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 22 - 24
  • [4] A secure controlled quantum image steganography algorithm
    Qu, Zhiguo
    Chen, Siyi
    Wang, Xiaojun
    [J]. QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [5] A novel approach to Steganography using pixel-based algorithm in image hiding
    Kazi, Jawwad A. R.
    Kiratkar, Gunjan N.
    Ghogale, Sonali S.
    Kazi, Atiya R.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 35 - +
  • [6] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey
    Ashwin, S.
    Kumar, S. Aravind
    Ramesh, J.
    Gunavathi, K.
    [J]. 2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177
  • [7] A two-level secure data hiding algorithm for video steganography
    S. Manisha
    T. Sree Sharmila
    [J]. Multidimensional Systems and Signal Processing, 2019, 30 : 529 - 542
  • [8] A two-level secure data hiding algorithm for video steganography
    Manisha, S.
    Sharmila, T. Sree
    [J]. MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2019, 30 (02) : 529 - 542
  • [9] Image Steganography using RSA Algorithm for Secure Communication
    Preksha, B.
    Harish, Rishika
    Sreenivas, B.
    Vasanthalakshmi, M.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [10] A Novel Image Hiding Technique Based on Stratified Steganography
    Mani, M. Radhika
    Eswari, G. Suryakala
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 45 - 52