计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240600024-8.doi: 10.11896/jsjkx.240600024
付佳佳1, 黄东海1, 卢建刚1, 邓晓智1, 亢中苗1, 刘云2
FU Jiajia1, HUANG Donghai1, LU Jiangang1, DENG Xiaozhi1, KANG Zhongmiao1, LIU Yun2
摘要: 随着电力网络通信系统的快速发展,大量数字化信息能够更加快捷有效地通过电力网络进行传输,但其在提高通信效率的同时,由于受网络攻击的风险日益增加因而也带来了隐私泄露、信息篡改等一系列安全性问题。在此背景下,特别是在无人巡检和设备远程监测等场景中,针对电力系统中相关缺陷信息的安全传输尤为重要。为确保信息传输的安全性,信息隐藏技术得到了广泛的研究与关注。针对目前信息隐藏技术普遍存在的低嵌入载荷、低安全性等问题,在综合考虑隐藏容量、隐写质量和安全性等因素后,提出了一种基于二阶数独矩阵的高载荷信息隐藏算法。该算法通过对原始数独进行扩展编码,旨在重构出新的二阶矩阵,其可引导每两位九进制数据以最小化失真的方式嵌入到原始图像的像素对中,从而实现高载荷信息隐藏的技术目标。其中,原始数独的选取由通信双方事先共享的密钥所决定,该密钥可通过量子密钥分发技术实现可靠传输,从而进一步提高算法的安全性。
中图分类号:
[1]LIU Y,LIU S,WANG Y,et al.Video steganography:A review[J].Neurocomputing,2019,335:238-250. [2]HUSSAIN M,WAHAB A W A,BIN IDRIS Y I,et al.Image steganography in spatial domain:A survey[J].Signal Processing-Image Communication,2018,65:46-66. [3]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3.4):313-336. [4]MIELIKAINEN J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285-287. [5]TAVARES R,MADEIRO F.Word-Hunt:A LSB steganography method with low expected number of modifications per pixel[J].IEEE Latin America Transactions,2016,14(2):1058-1064. [6]ELHARROUSS O,ALMAADEED N,AL-MAADEED S.Animage steganography approach based on k-least significant bits(k-LSB)[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:131-135. [7]ZHANG X,WANG S.Efficient steganographic embedding byexploiting modification direction[J].IEEE Communications Letters,2006,10(11):781-783. [8]KIM H J,KIM C,CHOI Y,et al.Improved modification direction methods[J].Computers & Mathematics with Applications,2010,60(2):319-325. [9]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141. [10]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modi-fication-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155. [11]WU D C,TSAI W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24(9/10):1613-1626. [12]YANG C H,WENG C Y,WANG S J,et al.Varied PVD+LSB evading detection programs to spatial domain in data embedding systems[J].Journal of Systems and Software,2010,83(10):1635-1643. [13]KHODAEI M,FAEZ K.New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing[J].IET Image Processing,2012,6(6):677-686. [14]HUSSAIN M,WAHAB A W A,JAVED N,et al.Recursive information hiding scheme through LSB,PVD Shift,and MPE[J].IETE Technical Review,2018,35(1):53-63. [15]CHANG C,CHOU Y,KIEU T.An information hiding scheme using Sudoku[C]//Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control.IEEE,2008. [16]CHANG C C,LIU Y J,NGUYEN T S.A novel Turtle Shell based scheme for data Hiding[C]//Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2014:89-93. [17]XIA B B,WANG A H,CHANG C C,et al.An image steganography scheme using 3D-Sudoku[J].Journal of Information Hiding and Multimedia Signal Processing,2016,7(4):836-845. [18]XIE X Z,LIN C C,CHANG C C.Data hiding based on a two-layer Turtle Shell matrix[J].Symmetry,2018,10(2):47. [19]HE M,LIU Y,CHANG C,et al.A Mini-Sudoku matrix-based data embedding scheme with high payload[J].IEEE Access,2019,7:141414-141425. [20]HORNG J H,XU S,CHANG C C,et al.An efficient data-hiding scheme based on multidimensional Mini-SuDoKu[J].Sensors,2020,20(9):2739. [21]LIN J Y,CHEN Y,CHANG C C,et al.A novel high capacity turtle shell-based data hiding with location table free[J].International Journal of Computational Science and Engineering,2020,22(1):135-145. [22]SREENIVAS K,KAMKSHI PRASAD V.Fragile watermarking schemes for image authentication:a survey[J].International Journal of Machine Learning and Cybernetics,2018,9(7):1193-1218. [23]FELGENHAUER B,JARVIS F.Mathematics of Sudoku I[J].Mathematical Spectrum,2006,39:15-22. [24]ALLAN W.The USC-SIPI Image Database[EB/OL].http://sipi.usc.edu/database/database.php. [25]ZHANG X P,WANG S Z.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25(3):331-339. [26]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[C]//Security and Watermarking of Multimedia Contents IV.SPIE,2002,4675:1-13. [27]LIU Y,CHANG C C,NGUYEN T S.High capacity turtle shell-based data hiding[J].IET Image Processing,2016,10(2):130-137. |
|