基于无覆盖隐写技术的秘密数据共享研究

Sourabh Debnath, R. Mohapatra
{"title":"基于无覆盖隐写技术的秘密数据共享研究","authors":"Sourabh Debnath, R. Mohapatra","doi":"10.1109/AISP53593.2022.9760680","DOIUrl":null,"url":null,"abstract":"The basic fundamental of steganography is to conceal the confidential data in designated cover media which will carry the secret message in such a way that no one can suspect it. With the increase in multimedia content over the net, the probability of information being theft is increased. To make confidential communication secure, people choose different data hiding techniques. Recently, steganography has gained popularity in information hiding. Information hiding is a subject that manages the concealing of classified data from attackers and hackers. Though the secret messages are not visible to human eyes but can be noticeable under statistical representation of cover media. The coverless hiding technique doesn’t modify the cover object. However, the cover object is used to transfer confidential data. A mapping relationship is created among cover objects and confidential data by following the characteristics of cover media. The term “coverless” is without any modification in the cover image the confidential data can be sent. The prime advantage of using a coverless approach is, it cannot be detected under steganalysis as no embedding is performed in cover media. This technique has drawn more attention in the data hiding field. Currently, it has been observed that most of the research work in coverless hiding approaches selected text and image as cover media. A very few researchers have considered video as cover media in coverless approach which has plentiful contents and provides the opportunity to explore.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Study on Secret Data Sharing through Coverless Steganography\",\"authors\":\"Sourabh Debnath, R. Mohapatra\",\"doi\":\"10.1109/AISP53593.2022.9760680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The basic fundamental of steganography is to conceal the confidential data in designated cover media which will carry the secret message in such a way that no one can suspect it. With the increase in multimedia content over the net, the probability of information being theft is increased. To make confidential communication secure, people choose different data hiding techniques. Recently, steganography has gained popularity in information hiding. Information hiding is a subject that manages the concealing of classified data from attackers and hackers. Though the secret messages are not visible to human eyes but can be noticeable under statistical representation of cover media. The coverless hiding technique doesn’t modify the cover object. However, the cover object is used to transfer confidential data. A mapping relationship is created among cover objects and confidential data by following the characteristics of cover media. The term “coverless” is without any modification in the cover image the confidential data can be sent. The prime advantage of using a coverless approach is, it cannot be detected under steganalysis as no embedding is performed in cover media. This technique has drawn more attention in the data hiding field. Currently, it has been observed that most of the research work in coverless hiding approaches selected text and image as cover media. A very few researchers have considered video as cover media in coverless approach which has plentiful contents and provides the opportunity to explore.\",\"PeriodicalId\":6793,\"journal\":{\"name\":\"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)\",\"volume\":\"20 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AISP53593.2022.9760680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISP53593.2022.9760680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

隐写术的基本原理是将机密资料隐藏在指定的封面媒体上,而这些媒体将以一种没有人能怀疑的方式传播秘密信息。随着网络上多媒体内容的增加,信息被窃取的可能性也随之增加。为了保证保密通信的安全性,人们选择了不同的数据隐藏技术。最近,隐写术在信息隐藏中得到了广泛的应用。信息隐藏是一门管理对攻击者和黑客隐藏机密数据的学科。虽然人眼无法看到这些秘密信息,但在封面媒体的统计表示下却可以被注意到。无覆盖隐藏技术不修改覆盖对象。但是,覆盖对象用于传输机密数据。根据封面媒体的特点,在封面对象和保密数据之间建立映射关系。术语“无封面”是指在封面图像没有任何修改的情况下,机密数据可以发送。使用无覆盖方法的主要优点是,由于没有在覆盖介质中进行嵌入,因此在隐写分析中无法检测到它。该技术在数据隐藏领域受到越来越多的关注。目前,无覆盖隐藏方法的研究大多选择文本和图像作为覆盖媒介。很少有研究者将视频作为无覆盖方法的覆盖媒介,它内容丰富,提供了探索的机会。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Study on Secret Data Sharing through Coverless Steganography
The basic fundamental of steganography is to conceal the confidential data in designated cover media which will carry the secret message in such a way that no one can suspect it. With the increase in multimedia content over the net, the probability of information being theft is increased. To make confidential communication secure, people choose different data hiding techniques. Recently, steganography has gained popularity in information hiding. Information hiding is a subject that manages the concealing of classified data from attackers and hackers. Though the secret messages are not visible to human eyes but can be noticeable under statistical representation of cover media. The coverless hiding technique doesn’t modify the cover object. However, the cover object is used to transfer confidential data. A mapping relationship is created among cover objects and confidential data by following the characteristics of cover media. The term “coverless” is without any modification in the cover image the confidential data can be sent. The prime advantage of using a coverless approach is, it cannot be detected under steganalysis as no embedding is performed in cover media. This technique has drawn more attention in the data hiding field. Currently, it has been observed that most of the research work in coverless hiding approaches selected text and image as cover media. A very few researchers have considered video as cover media in coverless approach which has plentiful contents and provides the opportunity to explore.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A 5.80 GHz Harmonic Suppression Antenna for Wireless Energy Transfer Application Crack identification from concrete structure images using deep transfer learning Energy Efficient VoD with Cache in TWDM PON ring Blockchain-based IoT Device Security A New Dynamic Method of Multiprocessor Scheduling using Modified Crow Search Optimization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1