Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600024-8.doi: 10.11896/jsjkx.240600024

• Information Security • Previous Articles     Next Articles

Study on High Payload Data Hiding Algorithm in Power System Network Communication Security

FU Jiajia1, HUANG Donghai1, LU Jiangang1, DENG Xiaozhi1, KANG Zhongmiao1, LIU Yun2   

  1. 1 Guangdong Power Grid Dispatching Control Center,Guangzhou 510000,China
    2 Anhui ProvincialQuantum Security Engineering Technology Research Center,Wuhu,Anhui 241000,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:FU Jiajia,born in 1983,master,senior engineer.His main research interests include quantum cryptography and ima-ge security.
    LIU Yun,born in 1979,Ph.D candidate,professor-level senior engineer.His main research interests include image steganography,data communication security and smart grid.
  • Supported by:
    Science and Technology Project of China Southern Power Grid(036000KK52222047,GDKJXM20222494).

Abstract: With the rapid development of power network communication systems,a large amount of digital information can be transmitted more efficiently through the power network.However,while improving communication efficiency,the increasing risk of network attacks brings a series of security issues such as privacy leakage and information tampering.In this context,especially in scenarios such as unmanned inspection and remote monitoring of equipment,secure transmission of relevant defect information in the power system is particularly important.Therefore,to ensure the security of information transmission,data hiding technology has received widespread research and attention.In view of the commonly existing problems of low embedding payload and low security in current data hiding technology,this paper proposes a high payload data hiding algorithm based on second-order Sudoku matrix after comprehensive consideration of factors such as hiding capacity,steganographic quality,and security.This algorithm extends and encodes the original Sudoku to reconstruct a new second-order matrix.It aims to guide every two nine-bit data to be embedded into pairs of pixels of the original image in a way that minimizes distortion,thus achieving the technical goal of high payload data hiding.The selection of the original Sudoku is determined by a secret key shared in advance by the communication parties,which can be reliably transmitted through quantum key distribution technology,further enhancing the security of the proposed algorithm.

Key words: Data hiding, Embedding payload, Power system, Secure communication, Quantum key distribution

CLC Number: 

  • TP391
[1]LIU Y,LIU S,WANG Y,et al.Video steganography:A review[J].Neurocomputing,2019,335:238-250.
[2]HUSSAIN M,WAHAB A W A,BIN IDRIS Y I,et al.Image steganography in spatial domain:A survey[J].Signal Processing-Image Communication,2018,65:46-66.
[3]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3.4):313-336.
[4]MIELIKAINEN J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285-287.
[5]TAVARES R,MADEIRO F.Word-Hunt:A LSB steganography method with low expected number of modifications per pixel[J].IEEE Latin America Transactions,2016,14(2):1058-1064.
[6]ELHARROUSS O,ALMAADEED N,AL-MAADEED S.Animage steganography approach based on k-least significant bits(k-LSB)[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:131-135.
[7]ZHANG X,WANG S.Efficient steganographic embedding byexploiting modification direction[J].IEEE Communications Letters,2006,10(11):781-783.
[8]KIM H J,KIM C,CHOI Y,et al.Improved modification direction methods[J].Computers & Mathematics with Applications,2010,60(2):319-325.
[9]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141.
[10]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modi-fication-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155.
[11]WU D C,TSAI W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24(9/10):1613-1626.
[12]YANG C H,WENG C Y,WANG S J,et al.Varied PVD+LSB evading detection programs to spatial domain in data embedding systems[J].Journal of Systems and Software,2010,83(10):1635-1643.
[13]KHODAEI M,FAEZ K.New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing[J].IET Image Processing,2012,6(6):677-686.
[14]HUSSAIN M,WAHAB A W A,JAVED N,et al.Recursive information hiding scheme through LSB,PVD Shift,and MPE[J].IETE Technical Review,2018,35(1):53-63.
[15]CHANG C,CHOU Y,KIEU T.An information hiding scheme using Sudoku[C]//Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control.IEEE,2008.
[16]CHANG C C,LIU Y J,NGUYEN T S.A novel Turtle Shell based scheme for data Hiding[C]//Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2014:89-93.
[17]XIA B B,WANG A H,CHANG C C,et al.An image steganography scheme using 3D-Sudoku[J].Journal of Information Hiding and Multimedia Signal Processing,2016,7(4):836-845.
[18]XIE X Z,LIN C C,CHANG C C.Data hiding based on a two-layer Turtle Shell matrix[J].Symmetry,2018,10(2):47.
[19]HE M,LIU Y,CHANG C,et al.A Mini-Sudoku matrix-based data embedding scheme with high payload[J].IEEE Access,2019,7:141414-141425.
[20]HORNG J H,XU S,CHANG C C,et al.An efficient data-hiding scheme based on multidimensional Mini-SuDoKu[J].Sensors,2020,20(9):2739.
[21]LIN J Y,CHEN Y,CHANG C C,et al.A novel high capacity turtle shell-based data hiding with location table free[J].International Journal of Computational Science and Engineering,2020,22(1):135-145.
[22]SREENIVAS K,KAMKSHI PRASAD V.Fragile watermarking schemes for image authentication:a survey[J].International Journal of Machine Learning and Cybernetics,2018,9(7):1193-1218.
[23]FELGENHAUER B,JARVIS F.Mathematics of Sudoku I[J].Mathematical Spectrum,2006,39:15-22.
[24]ALLAN W.The USC-SIPI Image Database[EB/OL].http://sipi.usc.edu/database/database.php.
[25]ZHANG X P,WANG S Z.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25(3):331-339.
[26]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[C]//Security and Watermarking of Multimedia Contents IV.SPIE,2002,4675:1-13.
[27]LIU Y,CHANG C C,NGUYEN T S.High capacity turtle shell-based data hiding[J].IET Image Processing,2016,10(2):130-137.
[1] LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8.
[2] LI Fei, CHEN Tong. Survivability Evaluation of National Defense Engineering Power System Grid Considering MultipleAttack Strategies [J]. Computer Science, 2024, 51(6A): 230700171-8.
[3] ZHOU Yiteng, TANG Xin, JIN Luchao. Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [J]. Computer Science, 2024, 51(12): 352-360.
[4] LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303.
[5] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[6] Renata WONG. Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields [J]. Computer Science, 2022, 49(6A): 645-648.
[7] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[8] GAO Ji-hang, ZHANG Yan. Fault Diagnosis of Shipboard Zonal Distribution Power System Based on FWA-PSO-MSVM [J]. Computer Science, 2022, 49(11A): 210800209-5.
[9] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[10] MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305.
[11] WU Shao-qian, LI Xi-ming. Authenticable Encrypted Secure Communication Based on Adversarial Network [J]. Computer Science, 2021, 48(5): 328-333.
[12] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[13] LIU Meng-jun, SHA Tao, LI Dan, LIU Shu-bo. Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things [J]. Computer Science, 2019, 46(4): 137-143.
[14] WU Zhong-zhi, WANG Lei, MA Jian-ping, TAN Si-yang, GUO Man-yi. Design of Typical Quadrotor UAV Based on System Architecture [J]. Computer Science, 2019, 46(11A): 575-579.
[15] LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua. Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain [J]. Computer Science, 2018, 45(8): 151-155.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!