999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Coverless Information Hiding Based on the Molecular Structure Images of Material

2018-03-13 02:02:33YiCaoZhiliZhouXingmingSunandChongzhiGao
Computers Materials&Continua 2018年2期

Yi Cao, Zhili Zhou,, Xingming Sun and Chongzhi Gao

1 Introduction

Information hiding has been a crucial research area in the field of information security.According to different application scenarios, information hiding can be divided into digital watermarking [Wang, Lian and Shi (2017)] and steganography [Xiong, Xu and Shi (2017)]. With the rapid development of network and electronic technology, the number of digital files has exploded, which provides a rich carrier for information hiding.Traditional steganography embeds secret information by modifying digital carriers such as images, videos, audio, text, in accordance with certain rules [Fridrich (2009)]. For example, there are two types of information hiding methods based on images. One is Spatial Domain methods, such as Yang’s adaptive LSB (least significant bit) method which uses pixel-value difference (PVD) to embed secret information [Yang, Weng and Wang (2008)]. The other is the transform domain methods which embed information by modifying the coefficients of the image frequency domain transform, such as DWT(discrete wavelet transform) [Lin, Horng and Kao (2008)], DCT (discrete cosine transform) [Pevny and Fridrich (2013)] and DFT (discrete Fourier transform) [Ruanaidh,Dowling and Boland (2008)]. However, in this way, it is unavoidable to leave traces on the stego-carrier, so these methods cannot effectively resist the detection of steganalysis algorithms.

In order to fundamentally resist the steganalysis, coverless information hiding came into being [Chen, Sun and Tobe (2015); Chen, Chen and Wu (2017); Zhou, Sun and Harit(2015)]. Coverless information hiding does not mean that the carrier is not needed.However, compared with the traditional methods, coverless information hiding method directly utilize the contents of the carrier itself to represent the secret information. The development of big data and cloud computing technology has facilitated the coverless information hiding [Li, Zhang, Chen et al. (2018); Li, Li, Huang et al. (2017); Gao,Cheng, Li et al. (2018)]. Recently, the existing coverless information hiding can be categorized into two kinds of methods: text-based methods and image-based ones,depending on the type of carrier transmitted. For text-based coverless information hiding,current methods mainly search for the texts containing the secret information according to a certain rule as the stego-texts, and determine the location of the secret information by using labels. For example, Chen’s method uses Chinese mathematical expression as labels to determine the location of secret information in stego-texts, and then retrieves the eligible texts from the text big data as stego-texts [Chen, Sun and Tobe (2015)]. This method is resistant to steganalysis algorithms that rely on detecting traces of modifications as Chen's method uses unmodified natural text to convey confidential information. After that, a number of similar methods emerged. Such as Chen’s another method utilizes the LSBs of the character’s Unicode as labels [Chen, Chen and Wu(2017)] and in Zhou’s method, a stego-text can contain more than one secret messages[Zhou, Sun and Harit (2015)]. In addition, H. Sun et al. proposed an approach that uses named entities to represent secret information [Sun, Grishman and Wang (2017)], and Zhang's method utilizes rank map to obtain the stego-texts [Zhang, Shen and Wang(2017)]. The current image-based coverless information hiding methods are similar to image retrieval and fingerprint liveness detection techniques [Zhou, Wu, Huang et al.(2017); Zhou, Wu and Sun (2017); Zhou, Yang, Chen et al. (2016); Zhou, Wang, Wu et al. (2017); Yuan (2017)]. These methods use the natural images retrieved from the image library to express the secret information. For example, the hash sequence of the original images in Zhou’s method is used to represent the secret information [Zhou, Sun and Harit(2015)]. After that, Yuan’s method [Yuan, Xia and Sun (2017)] hashes the SIFT features clustered by Bag of feather to get a binary string that can represent the secret information.Nowadays, the latest method is to hash the direction of the SIFT feature to obtain the same binary sequence as the secret information [Zheng, Wang and Ling (2017)]. Because the inherent characteristics of the image are used to represent the secret information and they do not modify the image, these methods can also resist the attack of the steganalysis algorithm.

However, as shown in Tab. 1, there is little hidden capacity for current coverless information hiding. The main reason is that an image can only generate a fixed-length binary string, and the selected image features are not evenly distributed. Although Zhang’s approach increased capacity, it required a modified image to convey additional information.

Table 1: The capacity of current methods

In order to improve the capacity while ensuring the security and anti-steganalysis, this paper proposes a novel coverless information hiding method based on the molecular structure images of material (MSIM). As shown in Fig. 1, we divide the image into several blocks, and then the average pixel values of the sub-images are used to represent secret information fragment. Because the MSIM consists of atoms of various colors, and the average pixel values of sub-images of these model images can effectively convey the secret information.

Figure 1: Secret information represented by the molecular structure image of material

Compared with the previous methods, the average values of MSIM pixels is more general.So that, it is easier to use multiple sub-images in one image to express the secret information fragments. This method not only improves the hidden capacity of each carrier while ensuring the security and anti-steganalysis, but also reduces the difficulty of retrieval. What’s more, the proposed method can also be used for other natural images.However, if we use other natural images to deliver confidential information, we need to classify the images using machine learning [Gurusamy and Subramaniam (2017); Yang and Wu (2016); Yang and Wu (2016)] to ensure that similar images are used in communications.

The rest of this article is organized as follows. The proposed method is described in detail in the section 2. The results of the experiment and analysis are shown in section 3. The section 4 is a conclusion.

2 The proposed coverless information hiding method

The framework of proposed method is illustrated as Fig. 2.

Figure 2: The framework of proposed method

Compared with the traditional information hiding methods, we do not make any modification to the stego-images. We search the appropriate images to express the secret information. The proposed method transforms secret information into a binary string at first. Then, the binary string is segmented according to the mapping relationship to obtain a binary sequence that can be represented by the average pixel value of the sub-images.In this article, we use a sub-image to represent 4-bit binary. We utilize labels to determine the location of the sub-images that represent the binary sequence. In addition,we use a multi-level inverted index structure to improve search efficiency. In the process of indexing, the bag of words model (BOW) [Li and Perona (2005); Zhou (2017)] is used to cluster the SIFT features [Lowe (2004)] of the image to get the frequency histogram of visual words. Moreover, considering that each communication may convey more than one image, we use the peak of the frequency histogram of visual words to rank the images. Finally, we use the visual word’s ID corresponding to the peak of the frequency histogram to determine the number of sub-images that represent the binary sequence in an image.

2.1 Representation of secret information

In order to represent the secret information with the natural images, we need to establish the mapping between the binary sequences and the average pixel values of the subimages. The mapping relationship is not unique and can be set according to actual needs.For example, if the pixel values are divided into two parts, it can represent 0 and 1,respectively; If the pixel values is divided into four parts, it can represent 00, 01, 10 and 11 respectively. And so on. As shown in Tab. 2, we set up an initial mapping relationship,marked as M. In this paper, we divide the pixel values of 0-255 into 16 intervals, so each interval can correspond to a 4-bit binary sequence.

Table 2: Mapping relationship

Since we use the average pixel values of the sub-images to represent the secret information, we need to determine which sub-images represent the secret information in an image. In our framework, images are divided into x×y blocks, and these blocks are marked as {1,2,3,… ,x×y}, which is the label of this method, in the order of raster scanning. Then, we define an initial label sequence, denoted by L={l1,l2,l3,…,lk},lk∈{1,2,3,… ,x×y}. Next, we can use natural images to represent the secret information.As shown in Fig. 3, we can represent the binary sequence using the molecular structure image of material. As we can see, label sequences are pseudo-randomly selected during communication. In the process of transmission, to ensure the security of the proposed method, the mapping relationship and label sequence will be pseudo-randomized according to the user identity.

Figure 3: Representation of binary sequence

2.2 Multi-level inverted index structure

The core of coverless information hiding is to search the stego-images quickly. However,it would be very time-consuming if we retrieve qualified stego-images in the image database directly. In order to improve the retrieval efficiency, we establish the multi-level inverted index structure as shown in Fig. 4.

Figure 4: Multi-level inverted index structure

The first level of the index is the peak of the frequency histogram of visual words,denoted as R={r1,r2,r3,…,rp}. We first calculate the peak values of the frequency histogram of the images in the database and divide them into p ranges. The second level is the visual word’s ID corresponding to the peak of the frequency histogram. In the index, we divide the visual word’s ID into q segments, denoted as V={v1,v2,v3,… ,vq}.The third level is labels, denoted as L={l1,l2,l3,…,lx×y}. The fourth level is the average pixel values interval, denoted as I={i1,i2,i3,…,i16}. The fifth level is the list of images that satisfy the condition (R,V,L,I). In addition, the images have been normalized in direction and scale before indexing.

2.3 Process of information hiding

In this paper, we use the average pixel values of the sub-images to represent the binary sequence. The process of information hiding is illustrated in Fig. 5.

Figure 5: Process of information hiding

Step 1: We convert the secret message to a binary string at first. Since the average pixel value of each sub-image represents 4-bit binary, we divide the binary string into segments contain 4-bit binary, donated as B={b1,b2,b3,…,bn}. If the length of the binary string cannot be divisible by 4, then we add meaningless redundant information after the binary string.

Step 3: Considering that n may not be divisible by c, we useVto determine the number of sub-images that represent the secret information in the last stego-image. In addition to the last image, we use the condition(R,L′,I) to retrieve the index structure. We take the intersection of every c times retrieval, to get a stego-image. We use the same method,using condition (R,V,L′,I) to retrieve the last image containing the secret. Obviously, the peak values of the frequency histogram of the stego-images satisfies {r1<r2<r3<…<rn,n≤p}. Finally, all stego-images are sent to the receiver.

2.4 Process of information extraction

Information extraction is a hidden reverse process. The receiver first sorts the received stego-images. Next, the receiver uses hash function Hv(U) to determine the number of sub-images that represent confidential information in a stego-image and recalculates the number of binary fragments represented by the last image. In this way, n can be obtained.After that, the receiver obtains the label sequence and the mapping relationship in the same way. Finally, the receiver calculates the average pixel values of the label location sub-images and obtains the secret information according to the mapping relationship.

3 Experiment and Analysis

All the experiments in this paper have been done in the Visual Studio 2013. The experiment and analysis include hiding capacity, anti-detectability, security.

3.1 Capacity

This paper uses the average pixel value of the sub-images to represent binary bit sequences. In the experiment, we used 9 sub-images in a stego-image to represent the binary sequence. At the same time, each sub-image represents 4-bit binary. The experimental results are as follows.

Table 3: The capacity of proposed methods

As Tab. 3 shows, the hidden capacity of this article doubles compared to the state-of-thearts method. Moreover, the capacity of proposed method is not fixed, it can be adjusted according to actual needs. If the image database is large enough, each sub-image of the stego-images can represent more binary bits. Conversely, if the image database is relatively small, each sub-image can represent less binary for information hiding. The less the binary representation of each sub-image, the easier it is to retrieve matching images in the database.

3.2 Anti-detectability

In this paper, we convert the secret information into a binary string. Then, we use the average pixel value of the sub-images to represent the binary fragments, according to a mapping. This method, using unmodified natural images as stego-images, can fundamentally resist existing steganalysis algorithms. Moreover, stego-images of each communication are the same type,so it can resist the detection of the human eye.

3.3 Security

Prior to communication, we pseudo-randomized the mapping relationship and label sequence according to the receiver's identity. Therefore, for the same secret information,different recipients will get different stego-images. Even if an attacker suspects the image is a stego-image, it is difficult to extract it correctly. Finally, even if the attackers obtain the stego-images and the secret information at the same time, the attacker can hardly obtain the initial label sequence and the mapping relationship because of the one-way hash function. Therefore, the proposed method has high security.

4 Conclusion

This paper transforms the coverless information hiding into image retrieval through the mapping relationship between the binary fragment and the average pixel value of the subimage. The proposed coverless information hiding method utilizes the unmodified natural molecular structure images of material to express the secret information, so it can fundamentally resist the steganalysis algorithm. Compared with the image hash value, the average pixel values distribution of the sub-images is more general. In addition, the images have been normalized in direction and scale before indexing. Furthermore, we use random label sequences and mapping relationship based on the receiver's identity.Therefore, the method in this paper has good security and robustness. Experimental results show that the hidden capacity of proposed method doubles compared to the Zheng’s method that has the highest capacity. However, compared with the traditional methods, the capacity of coverless information hiding is still very low. In future work, we will strive to increase capacity while ensuring security and robustness.

Acknowledgement:This work is supported, in part, by the National Natural Science Foundation of China under grant numbers U1536206, U1405254, 61772283, 61602253,61672294, 61502242; in part, by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; in part, by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund;in part, by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

Chen, X.; Chen, S.; Wu, Y.(2017): Coverless information hiding method based on the chinese character encoding.Journal of Internet Technology, vol. 18, no. 2, pp.133-143.

Chen, X.; Sun, H.; Tobe, Y.(2015): Coverless information hiding method based on the chinese mathematical expression.International Conference on Cloud Computing and Security, pp.133-143.

Fridrich, J.(2009):Steganography in digital media: principles, algorithms, and applications, Cambridge University Press.

Gao, C.; Cheng, Q.; Li, X.; Xia, S.(2018): Cloud-assisted privacy-preserving profilematching scheme under multiple keys in mobile social network.Cluster Computing, DOI:10.1007/s10586-017-1649-y.

Gurusamy, R.; Subramaniam, V.(2017): A machine learning approach for mri brain tumor classification.Computers, Materials & Continua, vol. 53, no. 2, pp. 91-108.

Li, F.; Perona, P.(2005): A bayesian hierarchical model for learning natural scene categories.IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 2, pp. 524-531.

Li, J.; Zhang, Y.; Chen, X.; Xiang, Y.(2018): Secure attribute-based data sharing for resourcelimited users in cloud computing.Computers & Security, doi: 10.1016/j.cose.2017.08.007.

Li, P.; Li, J.; Huang, Z.; Gao, C.; Chen, W.; Chen, K.(2017): Privacy-preserving outsourced classification in cloud computing.Cluster Computing, doi: 10.1007/s10586-017-0849-9.

Lin, W.; Horng, S.; Kao, T.(2008): An efficient watermarking method based on significant difference of wavelet coefficient quantization.IEEE Transactions on Multimedia, vol. 10, no. 5, pp.746-757.

Lowe, D.(2004): Distinctive image features from scale-invariant keypoints.International Journal of Computer Vision, vol. 60, no. 2, pp. 91-110.

Pevny, T.; Fridrich, J.(2013): Merging markov and DCT features for multi-class JPEG steganalysis.Proceedings of SPIE-The International Society for Optical Engineering, vol.3, pp. 650503-650503.

Ruanaidh, J.; Dowling, W.; Boland, F.(2008): Phase watermarking of digital images.International Conference on Image Processing.Proceedings (IEEE),vol. 3, pp. 239-242.

Sun, H.; Grishman, R.; Wang, Y.(2017): Active learning based named entity recognition and its application in natural language coverless information hiding.Journal of Internet Technology, vol. 18, no. 2, pp.443-451.

Wang, J.; Lian, S.; Shi, Y.(2017): Hybrid multiplicative multi-watermarking in DWT domain.Multidimensional Systems and Signal Processing, vol. 28, no. 2, pp. 617-636.

Xiong, L.; Xu, Z.; Shi, Y.(2017): An integer wavelet transform based scheme for reversible data hiding in encrypted images.Multidimensional Systems and Signal Processing, DOI: 10.1007/s11045-017-0497-5.

Yang, Y.; Wu, Q.(2016): Extreme learning machine with subnetwork hidden nodes for regression and classification.IEEE Transactions on Cybernetics, vol. 46, no. 12, pp.2885-2898.

Yang, Y.; Wu, Q.(2016): Multilayer extreme learning machine with subnetwork nodes for representation learning.IEEE Transactions on Cybernetics, vol. 46, no. 11, pp. 2570-2583.

Yang, C.; Weng, C.; Wang, S.(2008): Adaptive data hiding in edge areas of images with spatial lsb domain systems.IEEE Transactions on Information Forensics & Security,vol. 3, no. 3, pp. 488-497.

Yuan, C.; Li, X.; Wu, Q.; Li, J.; Sun, X.(2017): Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis.Computers, Materials & Continua, vol. 53, no. 3, pp. 357-371.

Yuan, C.; Xia, Z.; Sun, X.(2017): Coverless image steganography based on SIFT and BOF.Journal of Internet Technology, vol. 18, no. 2, pp. 435-442.

Zhang, J.; Shen, J.; Wang, L.(2017): Coverless text information hiding method based on the word rank map.Journal of Internet Technology, vol. 18, no. 2, pp. 427-434.

Zheng, S.; Wang, L.; Ling, B.(2017): Coverless information hiding based on robust image hashing.International Conference on Cloud Computing and Security, pp. 536-547.

Zhou, Z.; Sun, H.; Harit, R.(2015): Coverless image steganography without embedding.International Conference on Cloud Computing and Security, pp. 123-132.

Zhou, Z.; Wang, Y.; Wu, Q.; Yang, C.; Sun, X.(2017): Effective and efficient global context verification for image copy detection.IEEE Transactions on Information Forensics and Security, vol. 12 no. 1, pp. 48-63.

Zhou, Z.; Wu, Q.; Huang, F.; Sun, X.(2017): Fast and accurate near-duplicate image elimination for visual sensor networks.International Journal of Distributed Sensor Networks, vol. 13, no. 2.

Zhou, Z.; Wu, Q.; Sun, X.(2017): Encoding multiple contextual clues for partial-duplicate image retrieval.Pattern Recognition Letters, doi: https://doi.org/10.1016/j.patrec.2017.08.01.

Zhou, Z.; Yang, C.; Chen, B.; Sun, X.; Liu, Q. et al.(2016): Effective and efficient image copy detection with resistance to arbitrary rotation.IEICE Transactions on information and systems, no. 6, pp. 1531-1540.

主站蜘蛛池模板: 亚洲欧洲日韩国产综合在线二区| 一级毛片无毒不卡直接观看| 久久综合丝袜日本网| 一级香蕉人体视频| 国产一区二区丝袜高跟鞋| 超碰精品无码一区二区| AV不卡在线永久免费观看| 国产无码制服丝袜| 在线精品亚洲一区二区古装| 亚洲综合色区在线播放2019| 久久精品国产免费观看频道| 亚洲AⅤ综合在线欧美一区| 日韩在线欧美在线| 国产精品自拍合集| 婷婷五月在线视频| 99伊人精品| 亚洲国产日韩一区| 亚洲色成人www在线观看| 亚洲色无码专线精品观看| 91精品啪在线观看国产| 无码免费视频| aⅴ免费在线观看| 91色综合综合热五月激情| 国产人碰人摸人爱免费视频| 福利姬国产精品一区在线| 综合色婷婷| 国产不卡在线看| 一级毛片高清| 日韩精品欧美国产在线| 天天躁日日躁狠狠躁中文字幕| 午夜精品久久久久久久2023| 国内精自线i品一区202| 国产一二三区视频| 国产成人精品免费视频大全五级| 午夜福利免费视频| 亚洲性视频网站| 亚洲AV电影不卡在线观看| 国产成人高清精品免费| 首页亚洲国产丝袜长腿综合| 中字无码av在线电影| 国产一区二区三区免费观看| 亚洲欧美一级一级a| 欧美成人午夜视频免看| 天天色天天操综合网| 亚洲中文字幕久久无码精品A| 中文字幕亚洲综久久2021| 欧美国产日韩一区二区三区精品影视| 日本亚洲欧美在线| 国内精品自在自线视频香蕉| 欧美日本不卡| 无码久看视频| 免费国产好深啊好涨好硬视频| 亚洲国产欧美目韩成人综合| 国产一级精品毛片基地| 国产欧美另类| 国产视频欧美| 亚洲啪啪网| 国产极品粉嫩小泬免费看| 露脸国产精品自产在线播| 欧美三级自拍| 国产真实乱子伦精品视手机观看| 美女裸体18禁网站| 欧美日韩成人在线观看| 九九久久99精品| 欧美在线一二区| 五月丁香伊人啪啪手机免费观看| 国产精品手机视频| 最新无码专区超级碰碰碰| 国产v欧美v日韩v综合精品| 国产一级在线播放| 深爱婷婷激情网| 精品视频一区二区三区在线播| 国产福利微拍精品一区二区| 色悠久久久久久久综合网伊人| 国产丝袜精品| 秘书高跟黑色丝袜国产91在线 | 四虎永久在线视频| 亚洲欧美综合精品久久成人网| 成人小视频在线观看免费| 国产69精品久久久久孕妇大杂乱| 无码AV高清毛片中国一级毛片| 国产微拍精品|