Zobrazit minimální záznam

dc.contributor.authorPan, Jeng-Shyang
dc.contributor.authorSun, Xiao-Xue
dc.contributor.authorYang, Hongmei
dc.contributor.authorSnášel, Václav
dc.contributor.authorChu, Shu-Chuan
dc.date.accessioned2022-06-02T11:39:57Z
dc.date.available2022-06-02T11:39:57Z
dc.date.issued2022
dc.identifier.citationSymmetry. 2022, vol. 14, issue 2, art. no. 315.cs
dc.identifier.issn2073-8994
dc.identifier.urihttp://hdl.handle.net/10084/146240
dc.description.abstractInformation hiding can be seen everywhere in our daily life, and this technology improves the security of information. The requirements for information security are becoming higher and higher. The coverless information hiding with the help of mapping relationship has high capacity, but there is still a problem in which the secret message cannot find the mapping relationship and the process requires extra storage burden during the transmission. Therefore, on the basis of symmetric reversible watermarking, the paper introduces the two-level mechanism and novel arrangements to solve the problem of sufficient diversity of features and has better capacity and image quality as a whole. Besides, for the security of secret message, this paper designs a new encryption model based on Logistic mapping. This method only employs coverless information hiding of one carrier image to transmit secret message with the help of the two-level mechanism and look-up table. Reversible information hiding is applied to embed the generated location table on the original image so that ensures storage and security. The experiment certifies that the diversity of hash code is increased by using the two-level image mechanism and the quality of the image is excellent, which proves the advantages of the proposed symmetric method over the previous algorithm.cs
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesSymmetrycs
dc.relation.urihttps://doi.org/10.3390/sym14020315cs
dc.rights© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectlogistic mappingcs
dc.subjecttwo-level mechanismcs
dc.subjectlook-up tablecs
dc.subjectreversible information hidingcs
dc.titleInformation hiding based on two-level mechanism and look-up table approachcs
dc.typearticlecs
dc.identifier.doi10.3390/sym14020315
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume14cs
dc.description.issue2cs
dc.description.firstpageart. no. 315cs
dc.identifier.wos000764093000001


Soubory tohoto záznamu

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.