📚 Volume 25, Issue 2 📋 ID: C3IKHG0

Authors

Fang-Ming Yu, Ko-Wen Jwo, Yi Li, Yu-Lin Yang

Department of Electrical Engineering, St. John’s University

Abstract

With the prevalence of the Internet and the rapid development of information technology, secure transmissions of texts and images herewith attract a great deal of attention. Though traditional methods of encryption can maintain information security, encryptions can still be cracked after extensive computing, resulting in the decrypted information to be used in cybercrimes. Therefore, it is necessary to apply both time-varying and information-varying encryption/decryption methods to enhance information security.\nIn response to this situation, this paper hides confidential information by replacing the significant bit values generated from a key code and chaos scrambling computation, and then embed this encrypted information into a cover image. This method guarantees the secure transmission and receipt of confidential information. Finally, the user’s code is used to decrypt and extract the hidden information. We find that by embedding every bit of the hidden information into the cover image’s significant bits, the images generated show both high robustness and high adaptive.\nThe significant bit embedding technique provides great concealability, and since the PSNR value of its images are all above 30db, distortions are not easily detected. In the future, this technique can be widely applied in documents concerning bank security, copyright and visas.
🔐

Login to Download PDF

Please login with your Paper ID and password to access the full PDF.

🔑 Login to Download

📝 How to Cite

Fang-Ming Yu, Ko-Wen Jwo, Yi Li, Yu-Lin Yang (2018). "Robust Multi-Encryption of Hidden Information Technology". Wulfenia, 25(2).