Efficient Information Hiding Based on Theory of Numbers

نویسندگان

  • Yanjun Liu
  • Chin-Chen Chang
  • Peng-Cheng Huang
  • Cheng-Yi Hsu
چکیده

Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT) and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp) than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

A Fuzzy Goal Programming Model for Efficient Portfolio Selection.

This paper considers a multi-objective portfolio selection problem imposed by gaining of portfolio, divided yield and risk control in an ambiguous investment environment, in which the return and risk are characterized by probabilistic numbers. Based on the theory of possibility, a new multi-objective portfolio optimization model with gaining of portfolio, divided yield and risk control is propo...

متن کامل

Optimizing the Competency Model of University Administrators with Delphi-Fuzzy Technique and Grounded Theory Approach

Effective and efficient management of universities and higher education systems, which today have a significant role in the sustainable and comprehensive development of countries and are considered as one of the pillars of global competitiveness and development of countries, is an important principle and subject to its alignment with the upstream documents. In this way, according to the strateg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Symmetry

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2018