位平面复杂度分割的Vernam共轭操作

A. Siahaan
{"title":"位平面复杂度分割的Vernam共轭操作","authors":"A. Siahaan","doi":"10.14257/ijsia.2017.11.9.01","DOIUrl":null,"url":null,"abstract":"Steganography has no protection to make the information hidden is safe from theft. This technique only tries to store information in the image purely. There are many ways to steal information from pixels stored in RGB colors. Bit-Plane Complexity Segmentation (BPCS) is one of the steganography technique is often performed to conceal data. But in BPCS method, a used pattern is not a classified anymore. It breaks down and changes the plain text structure into square information. BPCS has two types of area, informative and noise-like region. This division depends on the threshold value. The noise-like region is the only area that can store confidential information. It is an 8 x 8 matrix pattern. The plain text is turned into bits and finally kept in the matrix. Converting the bit-plane information is a technique for increasing the security of the vessel image. Vernam cipher can easily be occupied to modify the bit-plane structure with the predetermined blocks conjugation. The cipher block contains a new set of unbreakable characters. It increases the security level.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Vernam Conjugated Manipulation of Bit-plane Complexity Segmentation\",\"authors\":\"A. Siahaan\",\"doi\":\"10.14257/ijsia.2017.11.9.01\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography has no protection to make the information hidden is safe from theft. This technique only tries to store information in the image purely. There are many ways to steal information from pixels stored in RGB colors. Bit-Plane Complexity Segmentation (BPCS) is one of the steganography technique is often performed to conceal data. But in BPCS method, a used pattern is not a classified anymore. It breaks down and changes the plain text structure into square information. BPCS has two types of area, informative and noise-like region. This division depends on the threshold value. The noise-like region is the only area that can store confidential information. It is an 8 x 8 matrix pattern. The plain text is turned into bits and finally kept in the matrix. Converting the bit-plane information is a technique for increasing the security of the vessel image. Vernam cipher can easily be occupied to modify the bit-plane structure with the predetermined blocks conjugation. The cipher block contains a new set of unbreakable characters. It increases the security level.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijsia.2017.11.9.01\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.9.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

隐写术没有任何保护措施,使隐藏的信息不被窃取。这种技术只尝试将信息纯粹地存储在图像中。有许多方法可以从RGB颜色存储的像素中窃取信息。位平面复杂度分割(BPCS)是一种常用的隐写技术,用于隐藏数据。但是在BPCS方法中,使用的模式不再是分类的。它分解并将纯文本结构更改为方形信息。BPCS有两种类型的区域,信息区域和类噪声区域。这种划分取决于阈值。类似噪声的区域是唯一可以存储机密信息的区域。它是一个8 × 8的矩阵模式。纯文本被转换成位,最后保存在矩阵中。位平面信息的转换是提高船舶图像安全性的一种技术。利用预先确定的块共轭,可以很容易地利用Vernam密码修改位平面结构。密码块包含一组新的不可破解字符。它提高了安全级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Vernam Conjugated Manipulation of Bit-plane Complexity Segmentation
Steganography has no protection to make the information hidden is safe from theft. This technique only tries to store information in the image purely. There are many ways to steal information from pixels stored in RGB colors. Bit-Plane Complexity Segmentation (BPCS) is one of the steganography technique is often performed to conceal data. But in BPCS method, a used pattern is not a classified anymore. It breaks down and changes the plain text structure into square information. BPCS has two types of area, informative and noise-like region. This division depends on the threshold value. The noise-like region is the only area that can store confidential information. It is an 8 x 8 matrix pattern. The plain text is turned into bits and finally kept in the matrix. Converting the bit-plane information is a technique for increasing the security of the vessel image. Vernam cipher can easily be occupied to modify the bit-plane structure with the predetermined blocks conjugation. The cipher block contains a new set of unbreakable characters. It increases the security level.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Security and Its Applications
International Journal of Security and Its Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-
自引率
0.00%
发文量
0
期刊介绍: IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security
期刊最新文献
Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures Mitigation of Wireless Body Area Networks Challenges using Cooperation Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm LTA: A Linked Timestamp based Authentication Protocol for Sensor Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1