A Novel Method of Hiding Transmission of Mobile Phone Images

被引:0
|
作者
Zou, Jiancheng [1 ]
Li, Yanzhao [1 ]
机构
[1] North China Univ Technol, Beijing, Peoples R China
关键词
mobile phone images; Least Significant Bits steganography; hiding transmission;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network has become the most important channel for information transmission, However, insecurity of the network transmission makes information extremely leaky and intercepted, The security of network transmission has increasingly become the focus of attention. Information hiding technology provides a direction for solving this problem. What is called information hiding technology is to embed some important information into digital carriers (such as images, audios, videos, etc.) without damaging the original features of the digital carriersil 1. Mobile phones, as the advanced intelligent mobile terminal, photographing and sharing photos readily are its main functions, This paper mainly introduces a method to implement the hiding transmission of mobile phone images. Through the image format conversion, image Location Encryption-Least Significant Bits steganography[2] and mobile-side application development, we can achieve the realtime image hiding transmission function of mobile phone. Convert the image captured by mobile phone to bitmap for embedding secret images or other information expediently. Improvement in traditional LSB steganop-aphy: rearranging the secret image information, packing piecewise and taking Location Encryption-LSB steganography (LE-LSB) in specific pixels of the carrier image which can effectively increase the difficulty of cracking and improve the effect of steganography. The secret image information can be extracted and rearranged at the receiver and the secret image can be recovered. These steps are all implemented at the mobile terminal application. Through experiments, this method has better image hiding and transmission effect and protects secret image security. And it can complete this series of changes in real time in the mobile terminal, increasing the convenience which has a certain value of application.
引用
收藏
页码:86 / 89
页数:4
相关论文
共 50 条
  • [21] Mobile phone images and video in science teaching and learning
    Ekanayake, Sakunthala Yatigammana
    Wishart, Jocelyn
    LEARNING MEDIA AND TECHNOLOGY, 2014, 39 (02) : 229 - 249
  • [22] A Novel Quality Measure for Information Hiding in Images
    Navas, K. A.
    Aravind, M. L.
    SasiKumar, M.
    2008 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, VOLS 1-3, 2008, : 261 - +
  • [23] Accuracy and usefulness of mobile phone images in the diagnosis of leprosy
    Reyes, Katrina Angela
    Carait, Paula Karina
    Dofitas, Belen
    Frez, Maria Lorna
    Maano, Clarita Corazon
    JOURNAL OF THE AMERICAN ACADEMY OF DERMATOLOGY, 2016, 74 (05) : AB103 - AB103
  • [24] A Novel Information Hiding Algorithm for Binary Images
    Jiang, Bin
    Ping, Xijan
    Zhang, Tao
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 1107 - 1112
  • [25] A novel scheme of data hiding in binary images
    Ajetrao, Hema
    Kulkarni, P. J.
    Gaikwad, Navanath
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 70 - +
  • [26] Mobile phone data on human movement and malaria transmission
    Mellis, Craig
    JOURNAL OF PAEDIATRICS AND CHILD HEALTH, 2013, 49 (04) : 339 - 340
  • [27] EKG Monitoring on the Mobile Phone Using Bluetooth Transmission
    Munteanu, M.
    Balaban, R.
    Moga, D.
    Dumitrean, M.
    Rafiroiu, D.
    Neaga, F.
    INTERNATIONAL CONFERENCE ON ADVANCEMENTS OF MEDICINE AND HEALTH CARE THROUGH TECHNOLOGY, 2009, 26 : 53 - +
  • [28] A new data hiding method in binary images
    Li Zongqing
    Zhang Hongbin
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 66 - +
  • [29] Data hiding method for AMBTC compressed images
    Chen Y.-Y.
    Hsia C.-H.
    Jhong S.-Y.
    Lin H.-J.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) : 14785 - 14793
  • [30] A reversible data hiding method for encrypted images
    Puech, W.
    Chaumont, M.
    Strauss, O.
    SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819