Abstract

Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing is proposed. Firstly, the angle structure descriptor feature vector was used to preprocess and classify the image carrier set. Secondly, the GHM multiwavelet transform was applied to different types of image carriers to obtain the secret information hiding area which can balance the invisibility and robustness. Thirdly, the secret image was processed by compressed sensing, the resulting observation matrix was decomposed by singular value, and the chaotic scrambling was encoded by logistic mapping. Finally, the secret information was embedded in the image singular value to complete the information hiding of different types of multi-quantity image carriers. Combined with the angle structure descriptor of the image, the algorithm proposed an effective way to organize multiple carriers, which improved the embedding quality and efficiency of secret information. The verification data and segmented secret information classification and embedding strategy made the proposed algorithm have a keen ability to detect tampering and effectively improve the efficiency and integrity of secret information extraction. Experimental results show that compared with image sharing information hiding algorithm and the single-carrier information hiding algorithm based on compressed sensing, the invisibility and robustness of our algorithm are significantly improved. At the same time, the proposed algorithm has strong anti-analysis ability, can effectively resist most image processing attacks, and is suitable for large capacity secret communication and high-security applications.

Highlights

  • In the network communication environment with no boundary and low-security threshold, security problems related to digital media occur frequently

  • Based on the security problem of secret information preprocessing in the previous image information hiding algorithms and the difficulty in further improving the capacity and robustness of the single-carrier image information hiding algorithm, this paper proposes an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing

  • This paper proposes an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing, which effectively solves the security problem of secret information preprocessing existing in previous image information hiding algorithms, and breaks the limitation of single-carrier image information hiding algorithm in capacity and robustness

Read more

Summary

INTRODUCTION

In the network communication environment with no boundary and low-security threshold, security problems related to digital media occur frequently. S.REN et al.: Identifiable Tampering multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing mirroring ciphertext group (MCG) for data embedding, to avoid oversaturation of pixels in the plaintext domain, and extract hidden data directly from the encrypted domain This algorithm has low computational complexity, high-security performance, and good embedding performance. Based on the security problem of secret information preprocessing in the previous image information hiding algorithms and the difficulty in further improving the capacity and robustness of the single-carrier image information hiding algorithm, this paper proposes an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing. Our goal is to combine the correlation between multi-carrier image features to complete information hiding, avoid image distortion, make human senses unable to perceive the existence of secret information, and ensure the invisibility of the algorithm.

RELATED THEORIES
INFORMATION EXTRACTION
ALGORITHM PERFORMANCE ANALYSIS
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.