Quantum steganography based on reflected gray code for color images

2020 ◽  
Vol 14 (3) ◽  
pp. 291-312
Author(s):  
Hong Xiao ◽  
Panchi Li

Digital steganography is the art and science of hiding information in covert channels, so as to conceal the information and prevent the detection of hidden messages. On the classic computer, the principle and method of digital steganography has been widely and deeply studied, and has been initially extended to the field of quantum computing. Quantum image steganography is a relatively active branch of quantum image processing, and the main strategy currently used is to modify the LSB of the cover image pixels. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel steganography using reflected Gray code for color quantum images, and the embedding capacity of this scheme is up to 6 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 6-bit segments. For 6 bits in each segment, the first 3 bits are embedded into the second LSB of RGB channels of the cover image, and the remaining 3 bits are embedded into the LSB of RGB channels of the cover image using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

2018 ◽  
Vol 16 (02) ◽  
pp. 1850020 ◽  
Author(s):  
Panchi Li ◽  
Xiande Liu

In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 50849-50857 ◽  
Author(s):  
Zhiguo Qu ◽  
Zhengyan Li ◽  
Gang Xu ◽  
Shengyao Wu ◽  
Xiaojun Wang

2019 ◽  
Vol 17 (04) ◽  
pp. 1950033
Author(s):  
Jia Luo ◽  
Ri-Gui Zhou ◽  
XingAo Liu ◽  
WenWen Hu ◽  
GuangZhong Liu

Based on the novel enhanced quantum representation for quantum image (NEQR), a new blind quantum steganography scheme is proposed. In this scheme, an improved quantum representation of text utilizing American Standard Code for Information Interchange (ASCII) is provided that uses two qubit sequences to store the same quantum text message. The general embedding process of the scheme is as follows: First, the cover image of size [Formula: see text] will be divided into eight blocks of size [Formula: see text] and the secret quantum text of size [Formula: see text] is scrambled by Gray code transform method. Then, the disorder quantum text is embedded into the eight blocks of cover image employing the Gray code as a judgment condition. Meanwhile, the corresponding quantum circuits are drawn. Through the analysis of all quantum circuits, it can be concluded that the scheme has a lower complexity that is [Formula: see text]. And the performance of the proposed scheme is analyzed in terms of simulation results of three items: visual quality, capacity and robustness.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 35684-35698 ◽  
Author(s):  
Zhiguo Qu ◽  
Zhenwen Cheng ◽  
Xiaojun Wang

Sign in / Sign up

Export Citation Format

Share Document