Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 330-334.

• Information Security • Previous Articles     Next Articles

Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding

LIU Zhong-yi, SHEN Xiang-chen, NI Lu-lin, XU Chun-gen   

  1. School of Science,Nanjing University of Science and Technology,Nanjing 210094,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: In the process of embedding secret information into a limited large vector image,a pseudo-random sequence is generally used to select the position of the pixel to be embedded in the information.When the secret information is large enough,the pseudo-random number generated by the pseudo-random number generator would be repeated,thus resulting in collision.If we choose to skip all the duplicate locations,the amount of confidential information which had been embedded in a limited large vector image would be limited.Therefore,this paper proposed an improved algorithm.When the sequence generated by the pseudo-random number generator reoccurs,the repeated position will not be skipped and the embedded operation will be performed normally,and the operation process at the repeated position will be recorded and saved in some form.In reverse extraction,the key and this action record are used to extract the ciphertext.The improved algorithm,combined with cryptography and information hiding,greatly expands the amount of secret information hidden in a limited number of pictures and improves the security of information hiding.

Key words: Collusion, Cryptography, Image processing, Information hiding, Pseudo-random transform, Quantity of information hiding, Security, Stream cipher

CLC Number: 

  • TP309
[1]AL-DMOUR H,AL-ANI A.Quality optimized medical image information hiding algorithm that employs edge detection and data coding[J].Comput Methods Programs Biomed,2016,127:24-43.
[2]YUE X,ZHOU C,XING Y P,et al.Improved LSB Algorithm of Image Hiding Based on Randomness[J].Applied Mechanics & Materials,2015,733:926-930.
[3]JUNEJA M,SANDHU P S.Data Hiding with Enhanced LSB Steganography and Cryptography for RGB Color Images[J].Indian Journal of Applied Research,2011,3(5):118-120.
[4]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004.
[5]马文姬,张煜林.传统LSB图像隐藏算法的优化研究[J].电子产品世界,2016,23(9):61-63.
[6]陈铭,张茹,刘凡凡,等.基于区域相关性的LSB 匹配隐写分析[J].通信学报,2010,31(3):1-11.
[7]STINSON D R.Cryptography Theory and Practice (Third Edition)[M].北京:电子工业出版社,2009.
[8]柏森,朱桂斌,曹玉强.信息隐藏算法及应用[M].北京:北京国防工业出版社,2015.
[9]刘洁.信息隐藏技术及应用[J].现代情报,2004,24(6):204-205.
[10]奚玲,平西建,张涛.基于相邻灰度值对互补嵌入的LSB匹配隐写改进算法[J].计算机科学,2010,37(9):101-104.
[11]郭立甫,高媛,王嘉祯.图像LSB密写的信息隐藏量分析[J].计算机工程,2008,34(4):157-161.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[4] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[5] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[6] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[7] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[8] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[9] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[10] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[11] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[12] LAI Teng-fei, ZHOU Hai-yang, YU Fei-hong. Real-time Extend Depth of Field Algorithm for Video Processing [J]. Computer Science, 2022, 49(6A): 314-318.
[13] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[14] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[15] JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!