Data Hiding Based on The Chinese Remainder Theorem

被引:0
作者
Wang, Chun-Cheng [1 ]
Lin, Tsung-Han [2 ]
Kuo, Wen-Chung [1 ]
机构
[1] National Yunlin University of Science & Technology, 123 University Road,Section 3, Douliu City,Yunlin County, Taiwan
[2] You-Shang Technical Corp, Guangfu Rd, Fengshan Dist,Kaohsiung City, Taiwan
关键词
Steganography;
D O I
10.6633/IJNS.20211123(6).19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At the time of rapid change, the advancement of the In-ternet and the ceaseless development of technologies al-lowed for the frequent use of the Internet for communi-cation and data transmission. Yet, these data can eas-ily be replicated and transmitted, given their distinctive characteristics. Therefore, the secure transmission and receiving of data with peace of mind is an issue worth our second thoughts. The purpose of this article is to apply the modulus of the Chinese Remainder Theorem (CRT) to the LSB replacement method and the GEMD method to decompose the confidential data under the binary sys-tem and embed the decomposed confidential data into the designated pixels of the image. Then, use the LSB Re-placement method or the GEMD hiding method in the carrier to form a hidden image. The receiver could then extract the designated pixel of the concealed image with the extraction of the LSB value or the GEMD data in the first place and compute the confidential data through the CRT with the same modulus value. The sorting of the modal value is the point of gravity and will affect the quantity for hiding and the PSNR value. Yet, this mod-ulus is used to enhance the level of security. © 2021. International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:1118 / 1125
相关论文
共 50 条
  • [1] An Image Hiding Algorithm Using Chinese Remainder Theorem with Reduced Distortion
    Ahmadi, K.
    Salari, E.
    2014 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2014, : 240 - 245
  • [2] PDF steganography based on Chinese Remainder Theorem
    Ekodeck, Stephane Gael R.
    Ndoundam, Rene
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 1 - 15
  • [3] Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
    Evsutin, Oleg
    Dzhanashia, Kristina
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 15
  • [4] A reversible extended secret image sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Xiong, Yan
    Chang, Chin-Chen
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 95
  • [5] Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem
    Wang, Chaoying
    Peng, Yong
    Liang, Zhibiao
    Wang, Yu
    Ke, Gang
    Jin, Zhiping
    HELIYON, 2023, 9 (04)
  • [6] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    SENSING AND IMAGING, 2021, 22 (01):
  • [7] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Dipak Bhayyaji Khadse
    Gandharba Swain
    Sensing and Imaging, 2021, 22
  • [8] A Data Hiding Technique Based on Magic Squares
    Kurup, Sujitha
    Rodrigues, Anjana
    Bhise, Archana
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), 2016, : 175 - 179
  • [9] Entropy Based Data Hiding for Document Images
    Kurup, Swetha
    Sridhar, G.
    Sridhar, V
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 5, 2005, 5 : 248 - 251
  • [10] Distortionless Data Hiding based on Slantlet Transform
    Kumar, Sushil
    Muttoo, S. K.
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 48 - +