2020
DOI: 10.1109/access.2020.3040005
|View full text |Cite
|
Sign up to set email alerts
|

Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing

Abstract: Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing is proposed. Firstly, the angle structure descriptor feature vector was used to preprocess and classify the image carrier set. Secondly, the GHM multiwavelet transform was applied to different types of image carriers to obtain … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Information hiding technologies can help to solve the problem of secure transmission and effective recovery of secret information. Traditional steganography schemes mainly embed secret information by changing the specific features of the carrier [1][2][3][4]. However, due to the modification of carriers, this kind of algorithms has the risk of being detected by steganalysis.…”
Section: Introductionmentioning
confidence: 99%
“…Information hiding technologies can help to solve the problem of secure transmission and effective recovery of secret information. Traditional steganography schemes mainly embed secret information by changing the specific features of the carrier [1][2][3][4]. However, due to the modification of carriers, this kind of algorithms has the risk of being detected by steganalysis.…”
Section: Introductionmentioning
confidence: 99%
“…[33][34][35][36][37] However, the availability of versatile photo/video manipulation technologies allows illicit activities such as illegal duplication and deliberate editing of digital files, even though it is difficult to determine whether or not an image has been modified. [38][39][40][41] For the secret revival, parallel or distributed computing methods are widely deployed to overlaps the diverse hares spread over the computer network. 11 These illegal alterations are extremely troublesome for sensitive images like military and medical images, where image quality and legitimacy remain critical.…”
mentioning
confidence: 99%