Local Binary Pattern Based Robust Coverless Information Hiding Approach

被引:0
作者
Sangeeta Gautam [1 ]
Manoj Kumar [1 ]
机构
[1] Department of Computer Science, Babasaheb Bhimrao Ambedkar University (A Central University), Vidya Vihar, Raebareli Road, U.P., Lucknow
关键词
Coverless information hiding; Hiding capacity; Local binary pattern; Paillier cryptosystem; Robustness; Security;
D O I
10.1007/s42979-024-03559-w
中图分类号
学科分类号
摘要
To address the drawbacks of existing secret data hiding techniques, such as their high computational demands for training deep neural networks or their limited hiding capacity, we present a new approach. Our proposed approach utilizes Local Binary Pattern codes to generate hash sequences for concealing secret data, offering a more efficient solution. These hash sequences are used to encode the secret information within the cover images. To enhance security, we encrypt the mapping file using a Paillier cryptosystem. The recipient can successfully extract the secret information once the mapping file is decrypted and reverse the hash sequence generation algorithm is applied. The effectiveness of the method is demonstrated through extensive experimentation and comparison with the existing approaches. Results indicate that the proposed method not only reduces the computational cost but also outperforms traditional methods in terms of security and robustness. Our method reports approximately 95% accuracy in data recovery after common image processing attacks, such as scaling, noise addition, and image filtering, and allows to hide 72 bits of secret data per image. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2024.
引用
收藏
相关论文
共 46 条
  • [41] Zhang C., Gao X., Liu X., Hou W., Yang G., Xue T., Wang L., Liu L., IDGAN: information-driven generative adversarial network of coverless image steganography, Electronics, 12, 13, (2023)
  • [42] Liu J., Tan L., Zhou Z., Li Y.P., A dynamic YOLO-based sequence-matching model for efficient coverless image steganography., (2024)
  • [43] Reyad Y.A., Berbar M.A., Hussain M., Comparison of statistical, LBP, and multi-resolution analysis features for breast mass classification, J Med Syst, 38, pp. 1-15, (2014)
  • [44] Jost C., Lam H., Maximov A., Smeets B., Encryption performance improvements of the Paillier cryptosystem, Cryptology Eprint Archive, (2015)
  • [45] Zhao J., Wang T., Yatskar M., Ordonez V., Chang K.-W., Men also like shopping: Reducing gender bias amplification using corpus-level constraints, (2017)
  • [46] Jegou H., Douze M., Schmid C., Hamming embedding and weak geometric consistency for large scale image search, In: Computer vision–ECCV 2008: 10Th European Conference on Computer Vision, pp. 304-317, (2008)