{"title":"基于中国剩余定理的GEMD图像隐藏技术研究","authors":"Ke Luo, Wei-Xin Gao","doi":"10.1109/ICCSMT54525.2021.00055","DOIUrl":null,"url":null,"abstract":"In order to improve the efficiency of Generalized Exploiting Modification Direction (GEMD) image hiding and protect the private information from being leaked, an improved GEMD image hiding scheme based on the Chinese residual theorem is proposed. The main idea is to decompose the binary confidential information by the Chinese remainder theorem, and then combine the GEMD hiding algorithm to embed the decomposed confidential information into the carrier image to form a camouflaged image. The results of the experiments show that the improved GEMD hiding algorithm has significantly improved the embedding amount and PSNR value, and greatly enhanced its security performance.","PeriodicalId":304337,"journal":{"name":"2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on GEMD Image Hiding Technique Based on Chinese Remainder Theorem\",\"authors\":\"Ke Luo, Wei-Xin Gao\",\"doi\":\"10.1109/ICCSMT54525.2021.00055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to improve the efficiency of Generalized Exploiting Modification Direction (GEMD) image hiding and protect the private information from being leaked, an improved GEMD image hiding scheme based on the Chinese residual theorem is proposed. The main idea is to decompose the binary confidential information by the Chinese remainder theorem, and then combine the GEMD hiding algorithm to embed the decomposed confidential information into the carrier image to form a camouflaged image. The results of the experiments show that the improved GEMD hiding algorithm has significantly improved the embedding amount and PSNR value, and greatly enhanced its security performance.\",\"PeriodicalId\":304337,\"journal\":{\"name\":\"2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSMT54525.2021.00055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSMT54525.2021.00055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on GEMD Image Hiding Technique Based on Chinese Remainder Theorem
In order to improve the efficiency of Generalized Exploiting Modification Direction (GEMD) image hiding and protect the private information from being leaked, an improved GEMD image hiding scheme based on the Chinese residual theorem is proposed. The main idea is to decompose the binary confidential information by the Chinese remainder theorem, and then combine the GEMD hiding algorithm to embed the decomposed confidential information into the carrier image to form a camouflaged image. The results of the experiments show that the improved GEMD hiding algorithm has significantly improved the embedding amount and PSNR value, and greatly enhanced its security performance.