Coverless Information Hiding Based on the Molecular Structure Images of Material

被引:92
作者
Cao, Yi [1 ,2 ]
Zhou, Zhili [1 ,2 ,3 ]
Sun, Xingming [1 ,2 ]
Gao, Chongzhi [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Ning Liu Rd 219, Nanjing 210044, Jiangsu, Peoples R China
[2] Jiangsu Engn Ctr Network Monitoring, Ning Liu Rd 219, Nanjing 210044, Jiangsu, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
[4] Guangzhou Univ, Sch Comp Sci, Waihuanxi Rd 230, Guangzhou 510006, Guangdong, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 54卷 / 02期
基金
中国国家自然科学基金;
关键词
Coverless information hiding; molecular structure images of material; pixel value; inverted index; image retrieval; bag of words model; WATERMARKING;
D O I
10.3970/cmc.2018.054.197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm. To address this problem, the concept of coverless information hiding was proposed. Coverless information hiding can effectively resist steganalysis algorithm, since it uses unmodified natural stego-carriers to represent and convey confidential information. However, the state-of-the-arts method has a low hidden capacity, which makes it less appealing. Because the pixel values of different regions of the molecular structure images of material (MSIM) are usually different, this paper proposes a novel coverless information hiding method based on MSIM, which utilizes the average value of sub-image's pixels to represent the secret information, according to the mapping between pixel value intervals and secret information. In addition, we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method. And the histogram of the Bag of words model (BOW) is used to determine the number of sub images in the image that convey secret information. Moreover, to improve the retrieval efficiency, we built a multi-level inverted index structure. Furthermore, the proposed method can also be used for other natural images. Compared with the state-of-the-arts, experimental results and analysis manifest that our method has better performance in anti-steganalysis, security and capacity.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 27 条
[1]  
Boland F, 2008, INT C IM PROC P IEEE, V3, P239
[2]   Coverless Information Hiding Method Based on the Chinese Character Encoding [J].
Chen, Xianyi ;
Chen, Sheng ;
Wu, Yulei .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :313-320
[3]  
Fei-Fei L, 2005, PROC CVPR IEEE, P524
[4]  
Fridrich J., 2009, INFORM HIDING
[5]   Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network [J].
Gao, Chong-zhi ;
Cheng, Qiong ;
Li, Xuan ;
Xia, Shi-bing .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :1655-1663
[6]  
Gurusamy R, 2017, CMC-COMPUT MATER CON, V53, P91
[7]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12
[8]   Privacy-preserving outsourced classification in cloud computing [J].
Li, Ping ;
Li, Jin ;
Huang, Zhengan ;
Gao, Chong-Zhi ;
Chen, Wen-Bin ;
Chen, Kai .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01) :277-286
[9]   An efficient watermarking method based on significant difference of wavelet coefficient quantization [J].
Lin, Wei-Hung ;
Horng, Shi-Jinn ;
Kao, Tzong-Wann ;
Fan, Pingzhi ;
Lee, Cheng-Ling ;
Pan, Yi .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (05) :746-757
[10]   An integer wavelet transform based scheme for reversible data hiding in encrypted images [J].
Xiong, Lizhi ;
Xu, Zhengquan ;
Shi, Yun-Qing .
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2018, 29 (03) :1191-1202