Information Hiding Algorithm with Strong Security Based on Run Length

Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communicat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information Technology Journal 2014, Vol.13 (5), p.895-903
Hauptverfasser: Xie, Jianquan, Fan, Xiaoping, Peng, Hui, Xie, Qing, Sun, Guang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 903
container_issue 5
container_start_page 895
container_title Information Technology Journal
container_volume 13
creator Xie, Jianquan
Fan, Xiaoping
Peng, Hui
Xie, Qing
Sun, Guang
description Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.
doi_str_mv 10.3923/itj.2014.895.903
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1530996684</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1530996684</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</originalsourceid><addsrcrecordid>eNo9kEFLwzAYhoMoOKd3jzl6af2StGlznGO6QUFwu4c0TbeMtplJi-zfmzHx8r0fLw_v4UHomUDKBGWvdjymFEiWliJPBbAbNCMloUnOM377_7PyHj2EcATIi5yQGVpthtb5Xo3WDXhtGzvs8aLbO2_HQ49_4sXb0bvYbo2eYnvGbyqYBkf8axpwZYb9eHhEd63qgnn6yznava92y3VSfX5slosq0ZQxlghNWq4Vr4WmHHKiIKMNqRnQsqSUtbwuGgO6aYE0RWFAQF1wXQthNM_iwhy9XGdP3n1PJoyyt0GbrlODcVOQJGcgBOdlFlG4otq7ELxp5cnbXvmzJCAvwmQUJi_CZBQmozD2C22OXhU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1530996684</pqid></control><display><type>article</type><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Science Alert</source><creator>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</creator><creatorcontrib>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</creatorcontrib><description>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</description><identifier>ISSN: 1812-5638</identifier><identifier>EISSN: 1812-5646</identifier><identifier>DOI: 10.3923/itj.2014.895.903</identifier><language>eng</language><subject>Algorithms ; Blinds ; Boundaries ; Computer information security ; Pixels ; Robustness ; Security</subject><ispartof>Information Technology Journal, 2014, Vol.13 (5), p.895-903</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</citedby><cites>FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4009,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>Xie, Jianquan</creatorcontrib><creatorcontrib>Fan, Xiaoping</creatorcontrib><creatorcontrib>Peng, Hui</creatorcontrib><creatorcontrib>Xie, Qing</creatorcontrib><creatorcontrib>Sun, Guang</creatorcontrib><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><title>Information Technology Journal</title><description>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</description><subject>Algorithms</subject><subject>Blinds</subject><subject>Boundaries</subject><subject>Computer information security</subject><subject>Pixels</subject><subject>Robustness</subject><subject>Security</subject><issn>1812-5638</issn><issn>1812-5646</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNo9kEFLwzAYhoMoOKd3jzl6af2StGlznGO6QUFwu4c0TbeMtplJi-zfmzHx8r0fLw_v4UHomUDKBGWvdjymFEiWliJPBbAbNCMloUnOM377_7PyHj2EcATIi5yQGVpthtb5Xo3WDXhtGzvs8aLbO2_HQ49_4sXb0bvYbo2eYnvGbyqYBkf8axpwZYb9eHhEd63qgnn6yznava92y3VSfX5slosq0ZQxlghNWq4Vr4WmHHKiIKMNqRnQsqSUtbwuGgO6aYE0RWFAQF1wXQthNM_iwhy9XGdP3n1PJoyyt0GbrlODcVOQJGcgBOdlFlG4otq7ELxp5cnbXvmzJCAvwmQUJi_CZBQmozD2C22OXhU</recordid><startdate>2014</startdate><enddate>2014</enddate><creator>Xie, Jianquan</creator><creator>Fan, Xiaoping</creator><creator>Peng, Hui</creator><creator>Xie, Qing</creator><creator>Sun, Guang</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2014</creationdate><title>Information Hiding Algorithm with Strong Security Based on Run Length</title><author>Xie, Jianquan ; Fan, Xiaoping ; Peng, Hui ; Xie, Qing ; Sun, Guang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2333-9c1f6ca6b9c26051a042d1b30288223f6b7de0cdf01d77e090b76cb99ec64233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Blinds</topic><topic>Boundaries</topic><topic>Computer information security</topic><topic>Pixels</topic><topic>Robustness</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Xie, Jianquan</creatorcontrib><creatorcontrib>Fan, Xiaoping</creatorcontrib><creatorcontrib>Peng, Hui</creatorcontrib><creatorcontrib>Xie, Qing</creatorcontrib><creatorcontrib>Sun, Guang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information Technology Journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xie, Jianquan</au><au>Fan, Xiaoping</au><au>Peng, Hui</au><au>Xie, Qing</au><au>Sun, Guang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information Hiding Algorithm with Strong Security Based on Run Length</atitle><jtitle>Information Technology Journal</jtitle><date>2014</date><risdate>2014</risdate><volume>13</volume><issue>5</issue><spage>895</spage><epage>903</epage><pages>895-903</pages><issn>1812-5638</issn><eissn>1812-5646</eissn><abstract>Imperceptibility, robustness, security and hiding capacity are important indexes in evaluating information hiding algorithms. Recently, in most case, only imperceptibility and robustness were considered rather than the security ability. The later one is highly required to guarantee secret communication. With fully consideration of this requirement, one kind of hiding information algorithm is proposed based on run length, the main idea of which is to separate the image into several binary images first. Then according to the parities of the run length of the binary images, one bit of information can be successfully embedded while no more than one pixel that located along black-white boundary of the binary image is modified. The blind extraction of the hiding information can be achieved. The algorithm neither obviously changes of distribution property of 0 and 1 in image's low plane, nor reduces the number of long run length. Hence it can successfully defend various detections that against Least Significant Bit (LSB) algorithm and improved LSB algorithm and it can also be applied in secret communication and other situations which require high security and large capacity.</abstract><doi>10.3923/itj.2014.895.903</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1812-5638
ispartof Information Technology Journal, 2014, Vol.13 (5), p.895-903
issn 1812-5638
1812-5646
language eng
recordid cdi_proquest_miscellaneous_1530996684
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Science Alert
subjects Algorithms
Blinds
Boundaries
Computer information security
Pixels
Robustness
Security
title Information Hiding Algorithm with Strong Security Based on Run Length
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T12%3A07%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20Hiding%20Algorithm%20with%20Strong%20Security%20Based%20on%20Run%20Length&rft.jtitle=Information%20Technology%20Journal&rft.au=Xie,%20Jianquan&rft.date=2014&rft.volume=13&rft.issue=5&rft.spage=895&rft.epage=903&rft.pages=895-903&rft.issn=1812-5638&rft.eissn=1812-5646&rft_id=info:doi/10.3923/itj.2014.895.903&rft_dat=%3Cproquest_cross%3E1530996684%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1530996684&rft_id=info:pmid/&rfr_iscdi=true