Computer Science ›› 2014, Vol. 41 ›› Issue (3): 172-175.

Previous Articles     Next Articles

Image Information Hiding Algorithm with High Security Based on Run-length

XIE Jian-quan,XIE Qing and HUANG Da-zu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at the problem that most information hiding algorithms are not secure enough to afford secret communication,a kind of hiding information algorithm based on Run Length was proposed.The main idea of this algorithm is separating the image into several binary images.Through utilizing the parities of the Run Length of the binary images,one bit of information can be successfully embedded while even one pixel that is located along black-white boundary of the binary image is modified.The blind extraction of the hiding information can be achieved.The algorithm neither obviously changes distribution property of 0and 1in image’s low plane,nor reduces the Length of Run.Hence it can defend various detections against LSB and its improved method.The simulation result shows that the algorithm has high security,good imperceptibility and large embedding capacity.Furthermore,it can be applied in secret communication and other situation that requires high security and large capacity.

Key words: Information hiding,Run-length,Embedding capacity,Imperceptibility,Security

[1] Nezhadarya E,Wang J,Ward R K.Image watermarking based on multiscale gradient direction quantization[J].IEEE Transactions on Information Forensics and Security,2011,6(4):1200-1213
[2] 姜传贤,陈孝威,李智.基于文本重要内容的鲁棒水印算法[J].自动化学报,2010,36(9):1250-1256
[3] Zhou X M,Wang S C,Xiong S C,et al.Attack model and performance evaluation of text digital watermarking[J].Journal of Computers,2010,5(12):1933-1941
[4] 陈够喜,陈俊杰.多载体信息隐藏安全性研究[J].小型微型计算机系统,2011,32(4):644-646
[5] Ker A D.Steganalysis of embedding in two least-significant bits [J].IEEE Transitions on Information Forensics and Security,2007,1(2):46-54
[6] 雷雨,杨晓元,潘晓中,等.基于局部随机性的YASS隐写分析方法[J].计算机学报,2010,3(10):1997-2002
[7] Fillatre L.Adaptive Steganalysis of Least Significant Bit Re-placement in Grayscale Natural Images[J].IEEE Transactions on Signal Processing,2012,60(2):556-569
[8] 张湛,刘光杰,戴跃伟,等.基于Markov链安全性的二阶统计保持隐写算法[J].中国图象图形学报,2010,5(8):1175-1181
[9] Samir K B,Avishek R,Tuhin U P.A palette based approach for invisible digital watermarking using the concept of run-length[A]∥2010International Conference on Computational Intelligence and Communication Networks,CICN 2010[C].2010:83-87
[10] 继军,杨义先.图像LSB隐藏游程检测算法[J].西安邮电学院学报,2005,0(1):1-5
[11] 李航,路羊,崔慧娟,等.基于频域的结构相似度的图像质量评价方法[J].清华大学学报:自然科学版,2009,49(4):559-562
[12] 罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(10):463-473
[13] 谢建全,谢勍,黄大足.图像信息隐藏不可感知性指标研究[J].小型微型计算机系统,2011,32(5):953-957
[14] 刘春庆,梁光岚,王朔中,等.应用二值图像信息隐藏技术实现彩色图像中的安全隐写[J].应用科学学报,2007,5(4):342-347
[15] 马秀莹,林家骏.信息隐藏性能评价方法[J].中国图象图形学报,2011,6(2):209-214

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!