Image Hiding Algorithm Based on Secure Steganography Mechanism

被引:0
作者
Zhao, Lian [1 ]
Zhang, Yingzhou [1 ]
Wang, Xing [1 ]
Chen, Xinghao [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing, Jiangsu, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) | 2017年
关键词
SVD decomposition; information; concealment; extraction;
D O I
10.1109/CyberC.2017.70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of computer network, security awareness increases. Therefore, information hiding technology has been played an important role in security protection. However, most information hiding algorithms don't do well in security. In this paper, we propose the image information hiding algorithm based on SVD (Singularly Valuable Decomposition), which applies the singular value decomposition technique to the information hiding process module. And double barriers protect the security of information transmission. In the first barrier, the preprocessing module is added for information to be hidden. Its main function is to encrypt and compress information to be hidden into ciphertext so as to increase the amount of information embedded and to enhance its security. In the second barrier, the optimal embedding position in the carrier image is found by SVD decomposition technique before the ciphertext is embedded in the optimal embedding position. The concealment of information hiding is improved because of the above operation. The experimental results show that the algorithm achieves the purpose of improving the security of secret information transmission and the embedding amount.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2009, P 2 WORKSH DAT MIN U
[2]  
[Anonymous], 2013, P 1 ACM WORKSH INF H, DOI DOI 10.1145/2482513.2482514
[3]  
Chaumont M., 2006, SIGN PROC C 2006 EUR, P1
[4]  
Ching-Te Wang, 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA 2012). Proceedings, P1048, DOI 10.1109/ICIEA.2012.6360878
[5]  
Chunying Gu, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P2035, DOI 10.1109/CECNet.2012.6201610
[6]  
Goudar R.M., 2011, Intl. Conf. and Workshop on Emerging Trends in Technology, P974
[7]  
Guo W, 2013, RES INFORM HIDING TE
[8]  
Jain Nitin, 2012, INT J SOFT COMPUTING, V2
[9]  
Kekre H B, 2011, INT C WORKSH EM TREN, P25
[10]  
Kekre H. B, 2010, ICWET C IND, P81, DOI [10.1145/1741906.1741921, DOI 10.1145/1741906.1741921]