B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism

Dongchi Li, Pushpendu Kar
{"title":"B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism","authors":"Dongchi Li, Pushpendu Kar","doi":"10.13052/jmm1550-4646.18610","DOIUrl":null,"url":null,"abstract":"In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Mobile Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13052/jmm1550-4646.18610","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
B-Spot:基于区块链和隐写术的健壮和安全的照片传输机制
本文提出了一种基于隐写和区块链的稳健安全的图像传输机制——B-Spot。在发送端,首先使用3-3-2 LSB图像隐写算法将秘密照片隐藏为封面照片。因此,秘密照片的存在是隐藏的。然后将隐写图像分解成像素并嵌入到块中。块通过形成区块链的哈希值连接。对区块的任何修改都会通过链的断裂来反映,这使得该机制具有明显的篡改性。区块链的另一个副本存储在散列表中,以供后一个恢复过程使用。区块链和哈希表可以通过任何网络传输。接收方收到数据后,首先执行验证过程,检查区块链的完整性。然后通过引用哈希表恢复丢失和篡改的块,使机制对噪声具有更强的鲁棒性。最后,从恢复的区块链中重建隐写图像。然后,根据提取算法,接收方可以获得秘密照片。仿真结果表明,该机制具有数据容量大、不可感知性好、计算时间合理、对噪声的鲁棒性强等优点。这种机制为现有方案增加了一层额外的安全性和健壮性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Disruptive Innovation Potential and Business Case Investment Sensitivity of Open RAN Live Streaming Contents Influencing Game Playing Behavior Among Thailand Gamers Hyperledger Fabric-based Reliable Personal Health Information Sharing Model A Conceptual Model of Personalized Virtual Reality Trail Running Gamification Design Protein Prediction using Dictionary Based Regression Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1