基于聚合数学序列的双层图像安全方案

M. Elkandoz, Wassim Alexan, Hisham H. Hussein
{"title":"基于聚合数学序列的双层图像安全方案","authors":"M. Elkandoz, Wassim Alexan, Hisham H. Hussein","doi":"10.1109/COMMNET.2019.8742370","DOIUrl":null,"url":null,"abstract":"Information security has been a major concern since the evolution of technology. Nowadays, internet users' are increasing and their information is being shared almost every second. Two possible information security techniques are cryptography and steganography. This paper proposes a hybrid use of both of these techniques. As a first security layer, one of the following cryptography techniques is used: AES-128, AES-192, AES-256, Blowfish or a Logistic Map, to encrypt the secret message. The second layer is steganographic, employing a number of complex mathematical sequences that determine the color in which the enciphered bits would be embedded in. Visual representation of the stego and the cover images after embedding is presented and the performance of the proposed scheme is measured in terms of the mean squared error (MSE), peak signal to noise ratio (PSNR), structural similarity index metric (SSIM), image fidelity, embedding capacity, $R$ measurement, and entropy values of the cover and stego images.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Double-Layer Image Security Scheme with Aggregated Mathematical Sequences\",\"authors\":\"M. Elkandoz, Wassim Alexan, Hisham H. Hussein\",\"doi\":\"10.1109/COMMNET.2019.8742370\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security has been a major concern since the evolution of technology. Nowadays, internet users' are increasing and their information is being shared almost every second. Two possible information security techniques are cryptography and steganography. This paper proposes a hybrid use of both of these techniques. As a first security layer, one of the following cryptography techniques is used: AES-128, AES-192, AES-256, Blowfish or a Logistic Map, to encrypt the secret message. The second layer is steganographic, employing a number of complex mathematical sequences that determine the color in which the enciphered bits would be embedded in. Visual representation of the stego and the cover images after embedding is presented and the performance of the proposed scheme is measured in terms of the mean squared error (MSE), peak signal to noise ratio (PSNR), structural similarity index metric (SSIM), image fidelity, embedding capacity, $R$ measurement, and entropy values of the cover and stego images.\",\"PeriodicalId\":274754,\"journal\":{\"name\":\"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMMNET.2019.8742370\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMMNET.2019.8742370","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

自技术发展以来,信息安全一直是人们关注的主要问题。如今,互联网用户正在增加,他们的信息几乎每秒钟都在被分享。两种可能的信息安全技术是密码学和隐写术。本文提出了这两种技术的混合使用。作为第一个安全层,使用以下加密技术之一:AES-128、AES-192、AES-256、Blowfish或Logistic Map来加密秘密消息。第二层是隐写术,采用许多复杂的数学序列来确定加密比特嵌入的颜色。给出了嵌入后的隐去图像和掩蔽图像的视觉表示,并通过均方误差(MSE)、峰值信噪比(PSNR)、结构相似度指标(SSIM)、图像保真度、嵌入容量、$R$度量以及掩蔽图像和掩蔽图像的熵值来衡量所提方案的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Double-Layer Image Security Scheme with Aggregated Mathematical Sequences
Information security has been a major concern since the evolution of technology. Nowadays, internet users' are increasing and their information is being shared almost every second. Two possible information security techniques are cryptography and steganography. This paper proposes a hybrid use of both of these techniques. As a first security layer, one of the following cryptography techniques is used: AES-128, AES-192, AES-256, Blowfish or a Logistic Map, to encrypt the secret message. The second layer is steganographic, employing a number of complex mathematical sequences that determine the color in which the enciphered bits would be embedded in. Visual representation of the stego and the cover images after embedding is presented and the performance of the proposed scheme is measured in terms of the mean squared error (MSE), peak signal to noise ratio (PSNR), structural similarity index metric (SSIM), image fidelity, embedding capacity, $R$ measurement, and entropy values of the cover and stego images.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信