Data Hiding Based on The Chinese Remainder Theorem

被引:0
作者
Wang, Chun-Cheng [1 ]
Lin, Tsung-Han [2 ]
Kuo, Wen-Chung [1 ]
机构
[1] National Yunlin University of Science & Technology, 123 University Road,Section 3, Douliu City,Yunlin County, Taiwan
[2] You-Shang Technical Corp, Guangfu Rd, Fengshan Dist,Kaohsiung City, Taiwan
关键词
Steganography;
D O I
10.6633/IJNS.20211123(6).19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At the time of rapid change, the advancement of the In-ternet and the ceaseless development of technologies al-lowed for the frequent use of the Internet for communi-cation and data transmission. Yet, these data can eas-ily be replicated and transmitted, given their distinctive characteristics. Therefore, the secure transmission and receiving of data with peace of mind is an issue worth our second thoughts. The purpose of this article is to apply the modulus of the Chinese Remainder Theorem (CRT) to the LSB replacement method and the GEMD method to decompose the confidential data under the binary sys-tem and embed the decomposed confidential data into the designated pixels of the image. Then, use the LSB Re-placement method or the GEMD hiding method in the carrier to form a hidden image. The receiver could then extract the designated pixel of the concealed image with the extraction of the LSB value or the GEMD data in the first place and compute the confidential data through the CRT with the same modulus value. The sorting of the modal value is the point of gravity and will affect the quantity for hiding and the PSNR value. Yet, this mod-ulus is used to enhance the level of security. © 2021. International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:1118 / 1125
相关论文
共 50 条
[41]   Reversible data hiding based on geometric structure of pixel groups [J].
Wang, Zhi-Hui ;
Zhuang, Xu ;
Chang, Chin-Chen ;
Qin, Chuan ;
Zhu, Yan .
International Journal of Network Security, 2016, 18 (01) :52-59
[42]   Tree Structure Based Data Hiding for Progressive Transmission Images [J].
Tsai, Piyu .
FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) :257-275
[43]   A reversible acoustic data hiding method based on analog modulation [J].
Shiu, H. J. ;
Tang, S. Y. ;
Huang, C. H. ;
Lee, R. C. T. ;
Lei, C. L. .
INFORMATION SCIENCES, 2014, 273 :233-246
[44]   Hilbert Curve Based Steganographic Scheme for Large Data Hiding [J].
Ghosh, Sayantari ;
Bhattacharya, Saumik .
2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, :91-96
[45]   An Overview of Pixel Value Differencing based Data Hiding Techniques [J].
Singh, Akanksha ;
Rawat, Mukesh ;
Shukla, Awdhesh K. ;
Kumar, Amod ;
Singh, Balvinder .
2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, :374-376
[46]   Viewing Direction Based LSB Data Hiding in 360° Videos [J].
Tran, Dang Ninh ;
Zepernick, Hans-Jurgen ;
Chu, Thi My Chinh .
ELECTRONICS, 2021, 10 (13)
[47]   Image data hiding schemes based on metaheuristic optimization: a review [J].
Anna Melman ;
Oleg Evsutin .
Artificial Intelligence Review, 2023, 56 :15375-15447
[48]   A Discrete Wavelet Transform based technique for image data hiding [J].
Abdelwahab, Ahmed A. ;
Hassaan, Lobna A. .
PROCEEDINGS OF THE 25TH NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2008, 2008, :U199-U207
[49]   Data hiding based on overlapped pixels using hamming code [J].
Kim, Cheonshik ;
Yang, Ching-Nung .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) :15651-15663
[50]   Image data hiding schemes based on metaheuristic optimization: a review [J].
Melman, Anna ;
Evsutin, Oleg .
ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (12) :15375-15447