• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于最低块骑士巡游和最低有效位像素替换边缘的加密图像隐写术

Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.

作者信息

Shashikiran B S, Shaila K, Venugopal K R

机构信息

Department of Electronics and Communication Engineering, Vivekananda Institute of Technology, Bengaluru, Karnataka India.

Bangalore University, Bengaluru, Karnataka India.

出版信息

SN Comput Sci. 2021;2(3):139. doi: 10.1007/s42979-021-00542-7. Epub 2021 Mar 13.

DOI:10.1007/s42979-021-00542-7
PMID:33748775
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7955696/
Abstract

The data security of an information is predominant in the digital world and gaining lot of importance. Cryptography and steganography are widely used in providing security to an information. In the proposed algorithm, the image encryption and steganography are performed using Knight's move in the game of chess called Knight's Tour Algorithm. Minimum block or square required for a knight's tour to reach all the squares is 5 × 5 block. The 5 × 5 blocks' pattern generated is used for image encryption. The encrypted image is then embedded into another image and block shuffling is performed to obtain a crypto-stego image. Proposed algorithm is robust and provides high data security with a good PSNR and SSIM.

摘要

在数字世界中,信息的数据安全至关重要且日益受到重视。加密技术和隐写术被广泛用于保障信息安全。在所提出的算法中,图像加密和隐写术是通过国际象棋中的马步移动(即骑士周游算法)来实现的。骑士周游所有方格所需的最小方块或正方形是5×5的方块。生成的5×5方块图案用于图像加密。然后将加密后的图像嵌入到另一幅图像中,并进行块洗牌操作以获得加密隐写图像。所提出的算法具有鲁棒性,能提供高数据安全性,且具有良好的峰值信噪比(PSNR)和结构相似性(SSIM)。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/8aeb50f90d39/42979_2021_542_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/ad7edb429efe/42979_2021_542_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/57906e0e1d62/42979_2021_542_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/5f9989b97d7d/42979_2021_542_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/ea474a1d138c/42979_2021_542_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/d19590c84724/42979_2021_542_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/6a9220475c2b/42979_2021_542_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/8aeb50f90d39/42979_2021_542_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/ad7edb429efe/42979_2021_542_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/57906e0e1d62/42979_2021_542_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/5f9989b97d7d/42979_2021_542_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/ea474a1d138c/42979_2021_542_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/d19590c84724/42979_2021_542_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/6a9220475c2b/42979_2021_542_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bbe6/7955696/8aeb50f90d39/42979_2021_542_Fig7_HTML.jpg

相似文献

1
Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.基于最低块骑士巡游和最低有效位像素替换边缘的加密图像隐写术
SN Comput Sci. 2021;2(3):139. doi: 10.1007/s42979-021-00542-7. Epub 2021 Mar 13.
2
LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.基于最低有效位的预嵌入视频隐写术与旋转和移位多模式块矩阵。
PeerJ Comput Sci. 2022 Jan 6;8:e843. doi: 10.7717/peerj-cs.843. eCollection 2022.
3
Swap and fill algorithms in null model analysis: rethinking the knight's tour.空模型分析中的交换与填充算法:对骑士周游问题的重新思考
Oecologia. 2001 Oct;129(2):281-291. doi: 10.1007/s004420100717. Epub 2001 Oct 1.
4
Double layer security using crypto-stego techniques: a comprehensive review.使用加密隐写技术的双层安全:全面综述
Health Technol (Berl). 2022;12(1):9-31. doi: 10.1007/s12553-021-00602-1. Epub 2021 Oct 13.
5
An optimal and efficient data security technique through crypto-stegano for E-commerce.一种通过加密隐写术实现的用于电子商务的优化高效数据安全技术。
Multimed Tools Appl. 2023;82(14):21005-21018. doi: 10.1007/s11042-023-14526-7. Epub 2023 Feb 8.
6
Steganography-based voice hiding in medical images of COVID-19 patients.基于隐写术的新冠患者医学图像语音隐藏
Nonlinear Dyn. 2021;105(3):2677-2692. doi: 10.1007/s11071-021-06700-z. Epub 2021 Jul 22.
7
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.一种用于在安卓物联网设备的高效视频编码(HEVC)流中隐藏勒索软件的加密隐写术方法。
Sensors (Basel). 2022 Mar 16;22(6):2281. doi: 10.3390/s22062281.
8
A robust audio steganography technique based on image encryption using different chaotic maps.一种基于使用不同混沌映射的图像加密的稳健音频隐写技术。
Sci Rep. 2024 Sep 27;14(1):22054. doi: 10.1038/s41598-024-70940-3.
9
A new image steganography method with optimum pixel similarity for data hiding in medical images.一种新的图像隐写方法,用于在医学图像中进行数据隐藏,具有最佳的像素相似度。
Med Hypotheses. 2020 Jun;139:109691. doi: 10.1016/j.mehy.2020.109691. Epub 2020 Mar 26.
10
Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.基于混沌理论、线性反馈移位寄存器和Rabin密码系统的改进型对角线队列医学图像隐写术
Brain Inform. 2017 Jun;4(2):95-106. doi: 10.1007/s40708-016-0057-z. Epub 2016 Sep 9.