A Reversible Data Hiding Techniques For Improved Embedding Capacity Using Image Interpolation

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

High capacity steganography is still challenging today in the field of information security. The demandfor the exact retrieval of the cover media from stego-image after the extraction of secret data is also increasing.Using reversible information hiding techniques, the cover image can be recovered at the time of extraction ofsecret messages. Two techniques are proposed in this paper. In the first technique, the image is interpolated usinga new interpolation technique and the second technique uses a High Capacity Reversible Steganography usingMulti-layer Embedding (CRS) method for image interpolation. In both the techniques, the secret data areembedded in the cover image by Exclusive OR (XOR) operation. The proposed techniques give high embeddingcapacity and preserve image quality. The experimental results show that the proposed techniques offer betterresults over the existing techniques.

Similar Papers
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 1
  • 10.22394/2073-2929-2022-01-119-127
Cooperation Prospects between the EAEU Member States in the Field of Information Security
  • Mar 29, 2022
  • EURASIAN INTEGRATION: economics, law, politics
  • M Yu Ilyina

The article examines the global challenges facing the Eurasian Economic Union (EAEU) associated with significant progress in the development of information and communication technologies (ICT) and tools that form the international information space, and suggests directions for integration to overcome them. The rapid build-up by the countries of the world of their potential in the field of ICT predetermines the strategic nature of the advanced cooperation of the EAEU member states in the field of information security.Aim. Determine the opportunities and prospects for cooperation between the EAEU Member States in the field of information security in the context of unprecedented digitalization of all spheres of life, due to the rapid development of ICT, while the Treaty on the EAEU of May 29, 2014 does not provide for information security issues.Tasks. Consider the existing regulatory framework for bilateral and multilateral relations of the EAEU countries in the field of information security, determine the vector, priorities of the EAEU countries in building their national policies in the field of international information security with integration partners and the world community.Methods. In this paper, using the methods of logical and deductive analysis, possible conditions for cooperation between the EAEU countries in the field of international information security are identified to overcome global challenges and threats and ensure the post-cuperation development of Eurasian integration.Results. The study showed that today information security is not only a necessary condition for ensuring national sovereignty in the economic sphere, but these are issues of ensuring the independence of the state in the social, cognitive, military and political spheres. When considering the EAEU as one of the leading centers of power in the polycentric world, it is necessary to improve the existing paradigm for the development of Eurasian integration, laid down by the Treaty on the EAEU of May 29, 2014, in order not to be in conditions of unjustified expectations, providing for the involvement of issues of a new quality and character.Conclusion. Considering that information policy issues are not regulated by the Treaty on the EAEU of May 29, 2014, seems justified and a very timely launch of the process of considering the possibility of creating a high-level working group on the formation of the Eurasian agenda in the field of international information security.

  • Research Article
  • Cite Count Icon 1
  • 10.3390/sym16081059
Separable Reversible Data Hiding for Encrypted 3D Meshes Based on Self-Organized Blocking and Most Significant Bit Prediction
  • Aug 16, 2024
  • Symmetry
  • Liansheng Sui + 3 more

As a booming technique that allows secret data extraction and information carrier recovery without any loss, reversible data hiding in different carriers has attracted more and more concerns in the field of information security. In this paper, a separable reversible data hiding technique for encrypted 3D meshes is proposed based on self-organized blocking and most significant bit (MSB) prediction. The content-owner traverses all faces of the mesh in the ascending index order. Through self-organized blocking, adjacent vertices are concentrated in different small sets. The central vertex is considered as the reference and the others as embedded vertices in each set. Then, multiple most significant bits between the central vertex and others are adaptively predicted and reserved as embeddable bits for secret data embedding. Because vertex coordinates in each set have a high space correlation and most vertices participate in the prediction process, a huge number of most significant bits can be marked as embeddable bits to embed secret data. Experimental results demonstrate that the proposed method can obtain the highest embedding rate compared with representative methods. To our best knowledge, the average embedding rate of the proposed method is about 28 bits per vertex (bpv) higher than the recently proposed method. Most importantly, instead of recovering meshes with higher quality, original meshes with high visual symmetry/quality can be recovered.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 16
  • 10.1177/1550147720911006
Reversible data hiding scheme based on pixel-value differencing in dual images
  • Jul 1, 2020
  • International Journal of Distributed Sensor Networks
  • Pyung-Han Kim + 2 more

In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying the ceil function and floor function. On the receiver side, the secret data extraction and the cover image restoration can be performed by using the correlation between two stego-images. After recovering the cover image from two stego-images, the secret data can be extracted using the maximum difference value and the log function. The experimental results show that the proposed scheme has a higher embedding capacity and the proposed scheme differs in embedding the secret data depending on the characteristics of the cover image with less distortion. Also, the proposed scheme maintains the degree of image distortion that cannot be perceived by the human visual system.

  • Research Article
  • 10.36871/ek.up.p.r.2024.05.05.032
ИССЛЕДОВАНИЯ В СФЕРЕ ОБРАЗОВАНИЯ В ОБЛАСТИ КОМПЬЮТЕРНОЙ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ
  • Jan 1, 2024
  • EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA
  • Hava S Khalieva + 2 more

In the modern era of big data, obtaining information has become more convenient and hidden. Therefore, the information security of networks is becoming increasingly important in the national security strategy. In the learning process, teachers should pay attention to strengthening the penetration of education in the field of network information security in order to better raise students’ awareness of preventing network information security in order to further form good quality, as well as increase information literacy on the Internet among students of educational institutions. This article first analyzes the importance of penetration of education in the field of network information security, and then analyzes the current state of education in the field of network information security in teaching computer networks, and finally, focuses on the study of specific strategies for penetration of education in the field of network information security, in the hope of contributing to the development of the country’s network. The practice of education in the field of information security provides certain suggestions and ideas.

  • Research Article
  • Cite Count Icon 20
  • 10.1007/s11042-018-7130-y
Reversible data hiding in compressed and encrypted images by using Kd-tree
  • Jan 8, 2019
  • Multimedia Tools and Applications
  • Nasrullah Nasrullah + 5 more

In this paper, a joint scheme and a separable scheme for reversible data hiding (RDH) in compressed and encrypted images by reserving room through Kd-tree were proposed. Firstly, the plain cover image was losslessly compressed and encrypted with lifting based integer wavelet transform (IWT) and set partition in hierarchical tree (SPIHT) encoding. Then, several shift operations were performed on the generated SPIHT bit-stream. The shifted bit-stream was restructured into small chunks and packed in the form of a large square matrix. The binary square matrix was exposed to Kd-tree with random permutations and reserving uniform areas of ones and zeros for secret data hiding. After that, a joint or a separable RDH scheme can be performed in these reserved spaces. In the joint RDH scheme, the secret data were embedded in the reserved spaces before encrypting with multiple chaotic maps. Thus, secret data extraction and cover image recovery were achieved together. In the separable RDH scheme, the secret data were embedded in the reserved spaces after encrypting with multiple chaotic maps. Since message extraction and cover image recovery are performed separately, anyone who has the embedding key can extract the secret message from the marked encrypted copy, while cannot recover the cover image. A complete encoding and decoding procedure of RDH for compressed and encrypted images was elaborated. The imperceptibility analysis showed that the proposed methods bring no distortion to the cover image because there was no change to the original cover image. The experimental results showed that the proposed schemes can perform better for secret data extraction and can restore the original image with 100% reversibility with much more embedding capacity and security. The proposed schemes significantly outperform the state-of-the-art RDH methods in the literature on compressed and encrypted images.

  • Research Article
  • Cite Count Icon 84
  • 10.1016/j.ins.2009.05.021
A path optional lossless data hiding scheme based on VQ joint neighboring coding
  • Jun 8, 2009
  • Information Sciences
  • Jun-Xiang Wang + 1 more

A path optional lossless data hiding scheme based on VQ joint neighboring coding

  • PDF Download Icon
  • Research Article
  • 10.24833/2071-8160-2022-olf6
Emerging international regime of information security
  • Dec 22, 2022
  • MGIMO Review of International Relations
  • S V Shitkov + 2 more

The article examines burning issues of the formation of an international regime in the field of ensuring international information security in the context of geopolitical transformations and turbulence. The theory of international regimes developed by Russian and foreign researchers is used as a theoretical and methodological basis for the study.Based on the classical definition of the international regime, the authors focus on the norms and principles in the field of international information security. The norms and principles in the field of international information security as the rules of responsible behavior in the global information space were first proposed by Russia and its SCO partners in 2011 as part of a discussion of the UN General Assembly. However, Russian initiatives met with resistance from the United States, resulting in a fragmentation of the existing regulatory regime in the field of international information security. Currently, the relevant norms and principles, which are based on the fundamental principles of international law, enshrined in the UN Charter, are presented in the resolutions of the UN General Assembly, and are also enshrined in the reports of the Group of Governmental Experts on achievements in the field of informatization and telecommunications in the context of international security.The norms fixed in the documents are not mandatory, but they make an important contribution to ensuring international stability by structuring the expectations of various actors in the field of information security. However, the lack of formal consolidation and institutionalization of these norms within the framework of international treaties reduces their legitimacy.

  • Research Article
  • Cite Count Icon 1
  • 10.37313/2413-9645-2021-23-79(2)-194-201
ФОРМИРОВАНИЕ ПРОФЕССИОНАЛЬНЫХ КОМПЕТЕНЦИЙ В ОБЛАСТИ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КАК ФАКТОР УСПЕШНОЙ ПОДГОТОВКИ БУДУЩЕГО СПЕЦИАЛИСТ
  • Jan 1, 2021
  • Izvestiya of the Samara Science Centre of the Russian Academy of Sciences. Social, Humanitarian, Medicobiological Sciences
  • E.V Dudina + 2 more

The subject of the article is the formation of professional competencies in the field of information security. Object of the article: training of specialists, ensuring the formation of professional competencies in the field of information security. The purpose of the study is to identify the level of formation of professional competencies in the field of information security among students in the process of their preparation. The methodology of the work is to substantiate and actualize the problem of information security of future specialists in the online space. Research of the process of formation of competences in the field of information security as a component of professional competence in the conditions of inclusive education, as well as identification of the stage-by-stage level of their formation. opportunities for health and people with disabilities; determining the conditions for increasing motivation, developing skills to assess, analyze, effectively organize their own activities in the field of information security in vocational training; development of criteria and identification of the levels of formation of professional competencies in the field of information security among students in the process of their education. The field of application of the results is the training of future specialists, aimed at the formation of professional competencies in the field of information security in the process of educational activities. Conclusion: the formation of the ability / readiness to live safely when performing future work functions in the specialty acquires special significance in the training of future specialists with disabilities. The implementation of the experimental methodology testifies to a steady growth in the rate of mastering by students of professional competencies in the field of information security.

  • Research Article
  • Cite Count Icon 36
  • 10.1016/j.csi.2008.09.014
High-capacity reversible data hiding in binary images using pattern substitution
  • Oct 28, 2008
  • Computer Standards & Interfaces
  • Yu-An Ho + 3 more

High-capacity reversible data hiding in binary images using pattern substitution

  • Conference Article
  • 10.1109/imws-amp54652.2022.10106902
Photonic exclusive logical OR operator achieved by photonic topological insulator
  • Nov 27, 2022
  • Longzhen Fan + 5 more

A novel topological photonic logic operator is proposed in this paper. By utilizing the magnetic photonic crystal, we realize a two-mode topological chiral edge state and separate them freely by adjusting the sources. Basing on phase cellulation, we realize photonic exclusive OR operation in a high accuracy due to topological protection. Our work paves a new way for future optical device and photo-communications.

  • Research Article
  • Cite Count Icon 41
  • 10.1007/s11831-020-09512-3
A Comprehensive Study of Reversible Data Hiding (RDH) Schemes Based on Pixel Value Ordering (PVO)
  • Oct 25, 2020
  • Archives of Computational Methods in Engineering
  • Gurjinder Kaur + 3 more

Reversible data hiding (RDH) plays a significant role in the field of information security which allows safe transmission of secret data inside a cover media. Additionally, RDH allows extraction of secret data and lossless recovery of the cover media at the decoding end which makes it applicable for the applications like medical imaging and military services. In recent years, variety of RDH techniques such as lossless compression, histogram shifting, difference expansion, prediction error expansion and pixel value ordering (PVO) have been proposed. Among all of them, PVO is one of the most researched RDH techniques as it provides high-fidelity images with decent data hiding capacity. So, to thoroughly understand the evolution of PVO based RDH schemes along with their advantages and disadvantages, this paper presents a comprehensive study of all the existing PVO based RDH schemes with an aim to provide research guidance to the researchers who are interested to work in the field of PVO based reversible data hiding. For this, the working of PVO based schemes is discussed and explained by using suitable examples. Additionally, the challenges being faced by reversible data hiding technique for increasing the data hiding capacity along with image quality, are comprehensively presented. Furthermore, comparative analysis of different PVO-based RDH scheme (after categorizing them based on their working style) using two key parameters—embedding capacity and marked image quality, is presented.

  • Research Article
  • Cite Count Icon 11
  • 10.1021/acsnano.3c10723
Switchable Two-Dimensional AND and Exclusive OR Operation Based on Dual-Wavelength Metasurfaces.
  • Jan 26, 2024
  • ACS Nano
  • Chang Peng + 7 more

Logic operation serves as the foundation and core element of computing networks; it will bring huge vitality to advanced information processing with its adaptation in the optical domain. As fundamental logic operations, AND and exclusive OR (XOR) operations serve a multitude of purposes, such as their ability to cooperate in enabling image processing and interpretation. Here, we propose and experimentally demonstrate a wavelength multiplexed AND and XOR function based on metasurfaces. By combining two cosine gratings with distinct frequencies and an initial phase difference of π/2, we extract the similarities and differences between two input images simultaneously by illuminating them with 445 and 633 nm wavelengths. Additionally, we explore its potential in information encryption, where overall security is enhanced by distributing distinct parts of initial information and encoded keys to different receivers. This design possesses the benefits of convenient mode switching and high-quality imaging, facilitating advanced applications in pattern recognition, machine vision, medical diagnosis, etc.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 3
  • 10.3390/e25121632
Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images.
  • Dec 7, 2023
  • Entropy
  • Ruihua Liu + 5 more

High security and effectiveness are critical performance metrics in the data transmission process for satellite remote sensing images, medical images, and so on. Previously, the receiver could gain a high-quality cover image (lossy) after decryption in a separable manner to balance embedding capacity (EC) and security. Completely separable, reversible data hiding in encrypted image (SRDH-EI) algorithms are proposed to address this issue. In this study, the cover image was preprocessed at the sender's end. The pre-embedded pixels and most significant bits (MSB) were compressed via two coding methods to reserve space. Additionally, the header data were embedded for marking. Finally, auxiliary data and secret data were embedded in a forward "Z" and reverse "Z" shape before and after encryption, respectively. The receiver could extract secret data and decrypt the cover image separately using the keys and markers. The experimental results demonstrate that the algorithm reached a high EC for remote sensing images by utilizing pixel correlation at multiple positions within the groups. The cover image could maintain its entropy during the data embedding process, ensuring security. The decrypted image could be recovered without distortion, furthermore, the receiver could achieve complete separability, so it has good application prospects for remote sensing images.

  • Research Article
  • 10.21686/1818-4243-2024-3-4-11
Formation of Competences in the Field of Information Security for Future Bachelors of Applied Informatics
  • Jun 18, 2024
  • Open Education
  • I V Gavrilova + 2 more

The purpose of the study is to develop a model for developing competencies in the field of information security for bachelors in the field of Applied Information Science. The relevance of this problem is determined by modern requirements for enterprise employees and, accordingly, the process of their training. Demand for qualified employees who have skills not only in their field of activity, but also in areas relevant to the information society, such as information culture and the ability to provide an information enterprise.Materials and research methods. To achieve this goal, a competency-based approach was used to activate the process of developing the readiness and ability of subjects to make independent decisions, express independent judgments and at the same time participate in a common cause, create relationships with other participants in joint activities. The following methods were used in the work: analysis of pedagogical, scientific, technical and methodological literature on the research problem, systematization and generalization and visual presentation of the results.Results. As part of the study, a tabular model for the formation of competencies in the field of information security was developed based on the competency-based approach. The article reflects a model for developing competence in the field of information security using the example of additional professional competencies - 2 (the ability to take part in project management, organizing IT infrastructure and information security management) in the process of studying the discipline “Information Security”. The component blocks of the developed model are described: diagnostic, motivational, theoretical, practical and control-analytical. In accordance with the stages of this process of developing competencies and the tasks to be solved at each stage, various innovative forms and methods are presented. The results of the paper show that the process of developing competencies in the field of information security among bachelors in the “Applied Information Science” area is complex and multifaceted. Even though bachelors of applied computer science will not perform the same job functions as information security specialists, their training should be sufficient to enable them to design and build safe and reliable information systems. The pedagogical search is not completed, but it has acquired the necessary boundaries, unique centers of crystallization around which the academic discipline is designed.Conclusion. We can conclude that training specialists in the field of information security is an urgent task of modern society, the solution of which is dependent on scientific justification and identification of a set of necessary competencies that a modern specialist should have. The components of competencies in the field of information security that we have identified, the generalized tabular model of these competencies that we have proposed, as well as the stages, methods and forms of developing these competencies among bachelors of Applied Information Science require additional study. The conducted research allows us to outline ways to solve the multifaceted and complex problem of forming students’ competencies in the field of information security, taking into account modern requirements for the training of specialists not only in the field of computer science and information technology.

  • Research Article
  • 10.36871/ek.up.p.r.2024.05.06.027
ТЕКУЩЕЕ СОСТОЯНИЕ И МЕРЫ ПРОТИВОДЕЙСТВИЯ ОБУЧЕНИЮ СЕТЕВОЙ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ СТУДЕНТОВ В УСЛОВИЯХ БОЛЬШИХ ДАННЫХ
  • Jan 1, 2024
  • EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA
  • Iman A Alisultanova + 2 more

With the advent of the era of big data, the Internet is becoming increasingly inseparable from the life, studies and practice of modern students. The Internet is a double–edged sword. By providing students with convenient opportunities to live and study, issues of online education in the field of information security, such as online intimidation, dissemination of false information, continue to attract people’s attention. Education in the field of network information security for students is associated with the healthy growth of students, the stability of the whole country, the economy and the livelihood of the whole society. Based on this, this article analyzes the current situation in the field of network information security of students’ education in the context of big data, and measures are being taken to strengthen the training of students’ network information security in the context of big data.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.