计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240600024-8.doi: 10.11896/jsjkx.240600024

• 信息安全 • 上一篇    下一篇

电力系统网络通信安全中的高载荷信息隐藏算法研究

付佳佳1, 黄东海1, 卢建刚1, 邓晓智1, 亢中苗1, 刘云2   

  1. 1 广东电网电力调度控制中心 广州 510000
    2 安徽省量子安全工程技术研究中心 安徽 芜湖 241000
  • 出版日期:2025-06-16 发布日期:2025-06-12
  • 通讯作者: 刘云(liuyun@qasky.com)
  • 作者简介:(fujiajia@gd.csg.cn)
  • 基金资助:
    南方电网科技项目(036000KK52222047,GDKJXM20222494)

Study on High Payload Data Hiding Algorithm in Power System Network Communication Security

FU Jiajia1, HUANG Donghai1, LU Jiangang1, DENG Xiaozhi1, KANG Zhongmiao1, LIU Yun2   

  1. 1 Guangdong Power Grid Dispatching Control Center,Guangzhou 510000,China
    2 Anhui ProvincialQuantum Security Engineering Technology Research Center,Wuhu,Anhui 241000,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:FU Jiajia,born in 1983,master,senior engineer.His main research interests include quantum cryptography and ima-ge security.
    LIU Yun,born in 1979,Ph.D candidate,professor-level senior engineer.His main research interests include image steganography,data communication security and smart grid.
  • Supported by:
    Science and Technology Project of China Southern Power Grid(036000KK52222047,GDKJXM20222494).

摘要: 随着电力网络通信系统的快速发展,大量数字化信息能够更加快捷有效地通过电力网络进行传输,但其在提高通信效率的同时,由于受网络攻击的风险日益增加因而也带来了隐私泄露、信息篡改等一系列安全性问题。在此背景下,特别是在无人巡检和设备远程监测等场景中,针对电力系统中相关缺陷信息的安全传输尤为重要。为确保信息传输的安全性,信息隐藏技术得到了广泛的研究与关注。针对目前信息隐藏技术普遍存在的低嵌入载荷、低安全性等问题,在综合考虑隐藏容量、隐写质量和安全性等因素后,提出了一种基于二阶数独矩阵的高载荷信息隐藏算法。该算法通过对原始数独进行扩展编码,旨在重构出新的二阶矩阵,其可引导每两位九进制数据以最小化失真的方式嵌入到原始图像的像素对中,从而实现高载荷信息隐藏的技术目标。其中,原始数独的选取由通信双方事先共享的密钥所决定,该密钥可通过量子密钥分发技术实现可靠传输,从而进一步提高算法的安全性。

关键词: 信息隐藏, 嵌入载荷, 电力系统, 安全通信, 量子密钥分发

Abstract: With the rapid development of power network communication systems,a large amount of digital information can be transmitted more efficiently through the power network.However,while improving communication efficiency,the increasing risk of network attacks brings a series of security issues such as privacy leakage and information tampering.In this context,especially in scenarios such as unmanned inspection and remote monitoring of equipment,secure transmission of relevant defect information in the power system is particularly important.Therefore,to ensure the security of information transmission,data hiding technology has received widespread research and attention.In view of the commonly existing problems of low embedding payload and low security in current data hiding technology,this paper proposes a high payload data hiding algorithm based on second-order Sudoku matrix after comprehensive consideration of factors such as hiding capacity,steganographic quality,and security.This algorithm extends and encodes the original Sudoku to reconstruct a new second-order matrix.It aims to guide every two nine-bit data to be embedded into pairs of pixels of the original image in a way that minimizes distortion,thus achieving the technical goal of high payload data hiding.The selection of the original Sudoku is determined by a secret key shared in advance by the communication parties,which can be reliably transmitted through quantum key distribution technology,further enhancing the security of the proposed algorithm.

Key words: Data hiding, Embedding payload, Power system, Secure communication, Quantum key distribution

中图分类号: 

  • TP391
[1]LIU Y,LIU S,WANG Y,et al.Video steganography:A review[J].Neurocomputing,2019,335:238-250.
[2]HUSSAIN M,WAHAB A W A,BIN IDRIS Y I,et al.Image steganography in spatial domain:A survey[J].Signal Processing-Image Communication,2018,65:46-66.
[3]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3.4):313-336.
[4]MIELIKAINEN J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285-287.
[5]TAVARES R,MADEIRO F.Word-Hunt:A LSB steganography method with low expected number of modifications per pixel[J].IEEE Latin America Transactions,2016,14(2):1058-1064.
[6]ELHARROUSS O,ALMAADEED N,AL-MAADEED S.Animage steganography approach based on k-least significant bits(k-LSB)[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:131-135.
[7]ZHANG X,WANG S.Efficient steganographic embedding byexploiting modification direction[J].IEEE Communications Letters,2006,10(11):781-783.
[8]KIM H J,KIM C,CHOI Y,et al.Improved modification direction methods[J].Computers & Mathematics with Applications,2010,60(2):319-325.
[9]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141.
[10]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modi-fication-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155.
[11]WU D C,TSAI W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24(9/10):1613-1626.
[12]YANG C H,WENG C Y,WANG S J,et al.Varied PVD+LSB evading detection programs to spatial domain in data embedding systems[J].Journal of Systems and Software,2010,83(10):1635-1643.
[13]KHODAEI M,FAEZ K.New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing[J].IET Image Processing,2012,6(6):677-686.
[14]HUSSAIN M,WAHAB A W A,JAVED N,et al.Recursive information hiding scheme through LSB,PVD Shift,and MPE[J].IETE Technical Review,2018,35(1):53-63.
[15]CHANG C,CHOU Y,KIEU T.An information hiding scheme using Sudoku[C]//Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control.IEEE,2008.
[16]CHANG C C,LIU Y J,NGUYEN T S.A novel Turtle Shell based scheme for data Hiding[C]//Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2014:89-93.
[17]XIA B B,WANG A H,CHANG C C,et al.An image steganography scheme using 3D-Sudoku[J].Journal of Information Hiding and Multimedia Signal Processing,2016,7(4):836-845.
[18]XIE X Z,LIN C C,CHANG C C.Data hiding based on a two-layer Turtle Shell matrix[J].Symmetry,2018,10(2):47.
[19]HE M,LIU Y,CHANG C,et al.A Mini-Sudoku matrix-based data embedding scheme with high payload[J].IEEE Access,2019,7:141414-141425.
[20]HORNG J H,XU S,CHANG C C,et al.An efficient data-hiding scheme based on multidimensional Mini-SuDoKu[J].Sensors,2020,20(9):2739.
[21]LIN J Y,CHEN Y,CHANG C C,et al.A novel high capacity turtle shell-based data hiding with location table free[J].International Journal of Computational Science and Engineering,2020,22(1):135-145.
[22]SREENIVAS K,KAMKSHI PRASAD V.Fragile watermarking schemes for image authentication:a survey[J].International Journal of Machine Learning and Cybernetics,2018,9(7):1193-1218.
[23]FELGENHAUER B,JARVIS F.Mathematics of Sudoku I[J].Mathematical Spectrum,2006,39:15-22.
[24]ALLAN W.The USC-SIPI Image Database[EB/OL].http://sipi.usc.edu/database/database.php.
[25]ZHANG X P,WANG S Z.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25(3):331-339.
[26]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[C]//Security and Watermarking of Multimedia Contents IV.SPIE,2002,4675:1-13.
[27]LIU Y,CHANG C C,NGUYEN T S.High capacity turtle shell-based data hiding[J].IET Image Processing,2016,10(2):130-137.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!