基于魔方原理的数字图像隐写加密

Sevierda Raniprima, Bambang Hidayat, N. Andini
{"title":"基于魔方原理的数字图像隐写加密","authors":"Sevierda Raniprima, Bambang Hidayat, N. Andini","doi":"10.1109/ICCEREC.2016.7814972","DOIUrl":null,"url":null,"abstract":"Information exchange between sender and receiver becomes very fast and easy. The quality of message transmission, especially the security, must be noticed. Data hiding is important for securing message. It can be done using cryptography and steganography. This paper describes the result of investigation on image steganography system using secret grayscale image and RGB image as a cover. Before the secret image is embedded into the cover, the encryption process is done to provide a more reliable security. The encryption method used is based on rubik's cube principle, by moving the pixels position in a digital image. The steganography uses LSB substitution method that works in spatial domain. The objective of this scheme is to obtain a high quality hidden secret image in order to keep message secret. Finally, effectiveness of the proposed scheme is tested using histogram analysis, Avalanche effect, Brute-Force attack, visual attack, statistical attack of Chi-Square analysis, and size and embedding position differences analysis.","PeriodicalId":431878,"journal":{"name":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Digital image steganography with encryption based on rubik's cube principle\",\"authors\":\"Sevierda Raniprima, Bambang Hidayat, N. Andini\",\"doi\":\"10.1109/ICCEREC.2016.7814972\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information exchange between sender and receiver becomes very fast and easy. The quality of message transmission, especially the security, must be noticed. Data hiding is important for securing message. It can be done using cryptography and steganography. This paper describes the result of investigation on image steganography system using secret grayscale image and RGB image as a cover. Before the secret image is embedded into the cover, the encryption process is done to provide a more reliable security. The encryption method used is based on rubik's cube principle, by moving the pixels position in a digital image. The steganography uses LSB substitution method that works in spatial domain. The objective of this scheme is to obtain a high quality hidden secret image in order to keep message secret. Finally, effectiveness of the proposed scheme is tested using histogram analysis, Avalanche effect, Brute-Force attack, visual attack, statistical attack of Chi-Square analysis, and size and embedding position differences analysis.\",\"PeriodicalId\":431878,\"journal\":{\"name\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEREC.2016.7814972\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEREC.2016.7814972","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

发送者和接收者之间的信息交换变得非常快速和容易。消息的传输质量,尤其是安全性,必须引起人们的注意。数据隐藏对于保护消息非常重要。它可以使用密码术和隐写术来完成。本文介绍了以秘密灰度图像和RGB图像为封面的图像隐写系统的研究结果。在秘密图像嵌入封面之前,加密过程已经完成,以提供更可靠的安全性。使用的加密方法是基于魔方原理,通过移动像素在数字图像中的位置。隐写采用的是在空间域中工作的LSB替代方法。该方案的目标是获得高质量的隐藏秘密图像,以保证消息的保密性。最后,通过直方图分析、雪崩效应、暴力攻击、视觉攻击、卡方分析的统计攻击以及大小和嵌入位置差异分析来验证该方案的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Digital image steganography with encryption based on rubik's cube principle
Information exchange between sender and receiver becomes very fast and easy. The quality of message transmission, especially the security, must be noticed. Data hiding is important for securing message. It can be done using cryptography and steganography. This paper describes the result of investigation on image steganography system using secret grayscale image and RGB image as a cover. Before the secret image is embedded into the cover, the encryption process is done to provide a more reliable security. The encryption method used is based on rubik's cube principle, by moving the pixels position in a digital image. The steganography uses LSB substitution method that works in spatial domain. The objective of this scheme is to obtain a high quality hidden secret image in order to keep message secret. Finally, effectiveness of the proposed scheme is tested using histogram analysis, Avalanche effect, Brute-Force attack, visual attack, statistical attack of Chi-Square analysis, and size and embedding position differences analysis.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Digital forensics study of internet messenger: Line artifact analysis in Android OS Web-based monitoring and control system for aeroponics growing chamber Configuring SmartGLCD as universal data logger for monitoring sound and movement Optimization of 6Slots-7Poles & 12Slots-14Poles flux-switching permanent magnet machines for plug-in HEV Implementation of PID controller and pre-filter to control non-linear ball and plate system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1