Information Hiding Algorithm with Strong Security Based on Run Length
Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communicat...
Gespeichert in:
Veröffentlicht in: | Information Technology Journal 2014, Vol.13 (5), p.895-903 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 903 |
---|---|
container_issue | 5 |
container_start_page | 895 |
container_title | Information Technology Journal |
container_volume | 13 |
creator | Xie, Jianquan Fan, Xiaoping Peng, Hui Xie, Qing Sun, Guang |
description | Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity. |
doi_str_mv | 10.3923/itj.2014.895.903 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1530996684</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1530996684</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</originalsourceid><addsrcrecordid>eNo9kEFLwzAYhoMoOKd3jzl6af2StGlznGO6QUFwu4c0TbeMtplJi-zfmzHx8r0fLw_v4UHomUDKBGWvdjymFEiWliJPBbAbNCMloUnOM377_7PyHj2EcATIi5yQGVpthtb5Xo3WDXhtGzvs8aLbO2_HQ49_4sXb0bvYbo2eYnvGbyqYBkf8axpwZYb9eHhEd63qgnn6yznava92y3VSfX5slosq0ZQxlghNWq4Vr4WmHHKiIKMNqRnQsqSUtbwuGgO6aYE0RWFAQF1wXQthNM_iwhy9XGdP3n1PJoyyt0GbrlODcVOQJGcgBOdlFlG4otq7ELxp5cnbXvmzJCAvwmQUJi_CZBQmozD2C22OXhU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1530996684</pqid></control><display><type>article</type><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Science Alert</source><creator>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</creator><creatorcontrib>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</creatorcontrib><description>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</description><identifier>ISSN: 1812-5638</identifier><identifier>EISSN: 1812-5646</identifier><identifier>DOI: 10.3923/itj.2014.895.903</identifier><language>eng</language><subject>Algorithms ; Blinds ; Boundaries ; Computer information security ; Pixels ; Robustness ; Security</subject><ispartof>Information Technology Journal, 2014, Vol.13 (5), p.895-903</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</citedby><cites>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4009,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>Xie, Jianquan</creatorcontrib><creatorcontrib>Fan, Xiaoping</creatorcontrib><creatorcontrib>Peng, Hui</creatorcontrib><creatorcontrib>Xie, Qing</creatorcontrib><creatorcontrib>Sun, Guang</creatorcontrib><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><title>Information Technology Journal</title><description>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</description><subject>Algorithms</subject><subject>Blinds</subject><subject>Boundaries</subject><subject>Computer information security</subject><subject>Pixels</subject><subject>Robustness</subject><subject>Security</subject><issn>1812-5638</issn><issn>1812-5646</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNo9kEFLwzAYhoMoOKd3jzl6af2StGlznGO6QUFwu4c0TbeMtplJi-zfmzHx8r0fLw_v4UHomUDKBGWvdjymFEiWliJPBbAbNCMloUnOM377_7PyHj2EcATIi5yQGVpthtb5Xo3WDXhtGzvs8aLbO2_HQ49_4sXb0bvYbo2eYnvGbyqYBkf8axpwZYb9eHhEd63qgnn6yznava92y3VSfX5slosq0ZQxlghNWq4Vr4WmHHKiIKMNqRnQsqSUtbwuGgO6aYE0RWFAQF1wXQthNM_iwhy9XGdP3n1PJoyyt0GbrlODcVOQJGcgBOdlFlG4otq7ELxp5cnbXvmzJCAvwmQUJi_CZBQmozD2C22OXhU</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Xie, Jianquan</creator><creator>Fan, Xiaoping</creator><creator>Peng, Hui</creator><creator>Xie, Qing</creator><creator>Sun, Guang</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2014</creationdate><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><author>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Blinds</topic><topic>Boundaries</topic><topic>Computer information security</topic><topic>Pixels</topic><topic>Robustness</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Xie, Jianquan</creatorcontrib><creatorcontrib>Fan, Xiaoping</creatorcontrib><creatorcontrib>Peng, Hui</creatorcontrib><creatorcontrib>Xie, Qing</creatorcontrib><creatorcontrib>Sun, Guang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information Technology Journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xie, Jianquan</au><au>Fan, Xiaoping</au><au>Peng, Hui</au><au>Xie, Qing</au><au>Sun, Guang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information Hiding Algorithm with Strong Security Based on Run Length</atitle><jtitle>Information Technology Journal</jtitle><date>2014</date><risdate>2014</risdate><volume>13</volume><issue>5</issue><spage>895</spage><epage>903</epage><pages>895-903</pages><issn>1812-5638</issn><eissn>1812-5646</eissn><abstract>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</abstract><doi>10.3923/itj.2014.895.903</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1812-5638 |
ispartof | Information Technology Journal, 2014, Vol.13 (5), p.895-903 |
issn | 1812-5638 1812-5646 |
language | eng |
recordid | cdi_proquest_miscellaneous_1530996684 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Science Alert |
subjects | Algorithms Blinds Boundaries Computer information security Pixels Robustness Security |
title | Information Hiding Algorithm with Strong Security Based on Run Length |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T12%3A07%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20Hiding%20Algorithm%20with%20Strong%20Security%20Based%20on%20Run%20Length&rft.jtitle=Information%20Technology%20Journal&rft.au=Xie,%20Jianquan&rft.date=2014&rft.volume=13&rft.issue=5&rft.spage=895&rft.epage=903&rft.pages=895-903&rft.issn=1812-5638&rft.eissn=1812-5646&rft_id=info:doi/10.3923/itj.2014.895.903&rft_dat=%3Cproquest_cross%3E1530996684%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1530996684&rft_id=info:pmid/&rfr_iscdi=true |