PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

被引:0
作者
Fang, Yixiang [1 ]
Tu, Kai [2 ]
Wu, Kai [1 ]
Peng, Yi [1 ]
Shi, Yunqing [3 ]
机构
[1] Jingdezhen Ceram Univ, Sch Mech & Elect Engn, Jingdezhen 333000, Peoples R China
[2] Penn State Univ, Dept Comp Sci & Engn, State Coll, PA USA
[3] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ USA
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2023年 / 17卷 / 02期
基金
中国国家自然科学基金;
关键词
information hiding; image segmentation; projection matrix; QR code; secret embedding logic;
D O I
10.3837/tiis.2023.02.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the privatemessage. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.
引用
收藏
页码:471 / 485
页数:15
相关论文
共 31 条
  • [1] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [2] [Anonymous], INFORM TECHNOLOGY AU
  • [3] [Anonymous], 2016, PROC IEEE INT C MULT
  • [4] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [5] A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models
    Chen, Changsheng
    Li, Mulin
    Ferreira, Anselmo
    Huang, Jiwu
    Cai, Rizhao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1056 - 1071
  • [6] Chen R., 2020, J INFORM HIDING PRIV, V2, P9
  • [7] Improved Visual Secret Sharing Scheme for QR Code Applications
    Cheng, Yuqiao
    Fu, Zhengxin
    Yu, Bin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2393 - 2403
  • [8] Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
    Chow, Yang-Wai
    Susilo, Willy
    Yang, Guomin
    Phillips, James G.
    Pranata, Ilung
    Barmawi, Ari Moesriami
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 409 - 425
  • [9] Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory
    Cogranne, Remi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2627 - 2642
  • [10] El Fishawy N. F., 2007, IJ NETWORK SECURITY, V5, P241