Data Hiding Based on The Chinese Remainder Theorem

被引:0
作者
Wang, Chun-Cheng [1 ]
Lin, Tsung-Han [2 ]
Kuo, Wen-Chung [1 ]
机构
[1] National Yunlin University of Science & Technology, 123 University Road,Section 3, Douliu City,Yunlin County, Taiwan
[2] You-Shang Technical Corp, Guangfu Rd, Fengshan Dist,Kaohsiung City, Taiwan
关键词
Steganography;
D O I
10.6633/IJNS.20211123(6).19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At the time of rapid change, the advancement of the In-ternet and the ceaseless development of technologies al-lowed for the frequent use of the Internet for communi-cation and data transmission. Yet, these data can eas-ily be replicated and transmitted, given their distinctive characteristics. Therefore, the secure transmission and receiving of data with peace of mind is an issue worth our second thoughts. The purpose of this article is to apply the modulus of the Chinese Remainder Theorem (CRT) to the LSB replacement method and the GEMD method to decompose the confidential data under the binary sys-tem and embed the decomposed confidential data into the designated pixels of the image. Then, use the LSB Re-placement method or the GEMD hiding method in the carrier to form a hidden image. The receiver could then extract the designated pixel of the concealed image with the extraction of the LSB value or the GEMD data in the first place and compute the confidential data through the CRT with the same modulus value. The sorting of the modal value is the point of gravity and will affect the quantity for hiding and the PSNR value. Yet, this mod-ulus is used to enhance the level of security. © 2021. International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:1118 / 1125
相关论文
共 50 条
[21]   High Capacity Data Hiding Based on AMBTC and Interpolation [J].
Kim, Cheonshik ;
Shin, Dongkyoo ;
Yang, Ching-Nung .
SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 :858-867
[22]   Adjustable prediction-based reversible data hiding [J].
Lee, Chin-Feng ;
Chen, Hsing-Ling .
DIGITAL SIGNAL PROCESSING, 2012, 22 (06) :941-953
[23]   Improving Data Hiding Capacity Based on Hamming Code [J].
Kim, Cheonshik ;
Yang, Ching-Nung .
FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 :697-706
[24]   Steganalysis of Network Packet Length Based Data Hiding [J].
Arijit Sur ;
Anand S. Nair ;
Abhishek Kumar ;
Apul Jain ;
Sukumar Nandi .
Circuits, Systems, and Signal Processing, 2013, 32 :1239-1256
[25]   Survey on Data Hiding Based on Block Truncation Coding [J].
Kim, Cheonshik ;
Yang, Ching-Nung ;
Baek, Jinsuk ;
Leng, Lu .
APPLIED SCIENCES-BASEL, 2021, 11 (19)
[26]   Data Hiding Scheme Based on Octagon Shaped Shell [J].
Kurup, Sujitha ;
Rodrigues, Anjana ;
Bhise, Archana .
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, :1982-1986
[27]   Hiding biometric data [J].
Jain, AK ;
Uludag, U .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) :1494-1498
[28]   Data Hiding in Documents [J].
Lim, Se-Hyeon ;
Shin, Sang-Ho ;
Kumar, Rajeev ;
Jung, Ki-Hyun .
2019 34TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2019), 2019, :310-313
[29]   A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters [J].
Feng, Bin ;
Wang, Zhi-Hui ;
Wang, Duo ;
Chang, Ching-Yun ;
Li, Ming-Chu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (01) :269-281
[30]   A novel adaptive data hiding based on improved EMD and interpolation [J].
Shen, Shu-yuan ;
Huang, Li-hong ;
Yu, Song-sen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) :12563-12579