Abstract

Information hiding can be seen everywhere in our daily life, and this technology improves the security of information. The requirements for information security are becoming higher and higher. The coverless information hiding with the help of mapping relationship has high capacity, but there is still a problem in which the secret message cannot find the mapping relationship and the process requires extra storage burden during the transmission. Therefore, on the basis of symmetric reversible watermarking, the paper introduces the two-level mechanism and novel arrangements to solve the problem of sufficient diversity of features and has better capacity and image quality as a whole. Besides, for the security of secret message, this paper designs a new encryption model based on Logistic mapping. This method only employs coverless information hiding of one carrier image to transmit secret message with the help of the two-level mechanism and look-up table. Reversible information hiding is applied to embed the generated location table on the original image so that ensures storage and security. The experiment certifies that the diversity of hash code is increased by using the two-level image mechanism and the quality of the image is excellent, which proves the advantages of the proposed symmetric method over the previous algorithm.

Highlights

  • The development of network technology has greatly promoted the security need in daily life [1,2]

  • Our daily life is inseparable from the application of network transmission, so there are many technologies used to solve the problem of network transmission security

  • The information hiding needs to conceal the existence of the secret message with the help of the carrier, that is, it is hidden in multimedia data

Read more

Summary

Introduction

The development of network technology has greatly promoted the security need in daily life [1,2]. The digital media transmitted by the network mainly includes video, audio, pictures, and text. The most commonly used methods to protect digital media are mainly grouped by encryption and information hiding. The former is that the sender applies the encryption algorithm to directly encrypt the multimedia information, and the receiver with the key can obtain the secret information in view of the encryption method. The information hiding needs to conceal the existence of the secret message with the help of the carrier, that is, it is hidden in multimedia data. The receiver exploits the corresponding extraction method to extract the secret message

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.