Abstract

ABSTRACTIn this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images and the random numbers is used to express the payload information. There are three steps for this algorithm. Firstly, the grayscale gradient co-occurrence matrix of cover image is calculated, in accordance with which a descriptor is introduced. Secondly, the descriptor is quantized into a binary sequence to construct a mapping relationship between the cover image and the binary random numbers. Finally, the binary secret information sequence is divided into many segments, and the correct images corresponding to those segments are selected from the image database according to the mapping relationship. Moreover, the secret information is encrypted by Turbo encoder to improve the security. The experimental results show that the proposed algorithm has a good tolerance towards JPEG compression attack and low-pass filter attack. This promising algorithm which can be applied into remote sensing satellites leads an applied value in covert communication with high-security.

Highlights

  • Nowadays, the satellite technology succeeds in longrange communication with the large cover area

  • We introduce a coverless information hiding algorithm based on coding the feature descriptor of remote sensing images

  • Robustness is a rational measurement of the steganography algorithm, representing the ability of resistance to the attacks of an adversary

Read more

Summary

Introduction

The satellite technology succeeds in longrange communication with the large cover area. The secure transmission of important data on the satellites mainly relies on encryption technology, which directly converses the original signal into meaningless cipher text through encryption keys and encryption functions. This technology results in the existence of the covert communication, which may attract the attention of the adversaries. If the covert communication is imperceptible to be detected, the security of the technology will be greatly improved. Due to the increasing demand on the communication security, information hiding technology has been shaping up. Different from the cryptography technology, information hiding technology utilizes the multimedia information as hosts to implement the concealment of digital signals

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call