scispace - formally typeset
Search or ask a question
Author

Jiaojiao Yin

Bio: Jiaojiao Yin is an academic researcher from Hunan University. The author has contributed to research in topics: Steganalysis & Steganography. The author has an hindex of 5, co-authored 5 publications receiving 334 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A new method of separable data hiding in encrypted images are proposed by using CS and discrete fourier transform, which takes full advantage of both real and imaginary coefficients for ensuring great recovery and providing flexible payload.
Abstract: Reversible data hiding in encrypted images has become an effective and popular way to preserve the security and privacy of users’ personal images. Recently, Xiao et al. firstly presented reversible data hiding in encrypted images with use of the modern signal processing technique compressive sensing (CS). However, the quality of decrypted image is not great enough. In this paper, a new method of separable data hiding in encrypted images are proposed by using CS and discrete fourier transform, which takes full advantage of both real and imaginary coefficients for ensuring great recovery and providing flexible payload. Compared with the original work, the proposed method can obtain better image quality when concealing the same embedding capacity. Furthermore, image decryption and data extraction are separable in the proposed method, and the secret data can be extracted relatively accurately.

183 citations

Journal ArticleDOI
TL;DR: This article formulates adaptive payload distribution in multiple images steganography based on image texture features and provides the theoretical security analysis from the steganalyst's point of view and extensive experimental results show that the proposed payload distribution strategies could obtain better security performance.
Abstract: With the coming era of cloud technology, cloud storage is an emerging technology to store massive digital images, which provides steganography a new fashion to embed secret information into massive images Specifically, a resourceful steganographer could embed a set of secret information into multiple images adaptively, and share these images in cloud storage with the receiver, instead of traditional single image steganography Nevertheless, it is still an open issue how to allocate embedding payload among a sequence of images for security performance enhancement This paper formulates adaptive payload distribution in multiple images steganography based on image texture features and provides the theoretical security analysis from the steganalyst's point of view Two payload distribution strategies based on image texture complexity and distortion distribution are designed and discussed respectively The proposed strategies can be employed together with these state-of-the-art single image steganographic algorithms The comparisons of the security performance against the modern universal pooled steganalysis are given Furthermore, this paper compares the per image detectability of these multiple images steganographic schemes against the modern single image steganalyzer Extensive experimental results show that the proposed payload distribution strategies could obtain better security performance

141 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method.

133 citations

Journal ArticleDOI
TL;DR: In this paper, x-dimensional reference table framework is defined, which can be regarded as generalization of the prior works, and two novel RTB methods named CRT (cubic reference table) and CRT-PVD (cuba reference table and pixel value differencing) are presented.
Abstract: Tradition reference table based (RTB) methods employ two pixels to conceal a secret digit according to a two-dimensional reference table. In this paper, x-dimensional reference table framework is defined, which can be regarded as generalization of the prior works. The available pixels to be embedded are limited in two-dimensional space, so the proposed methods extend the dimensional space of reference table. Theoretical analyses are given to justify the effectiveness of the proposed construction. Two novel RTB methods named CRT (cubic reference table) and CRT-PVD (cubic reference table and pixel value differencing) are presented. The former is independent of image contents while embedding, and the latter is depended on the discriminated image smoothness. Experimental results show that two proposed methods can achieve better performance compared with the prior works.

64 citations

Journal ArticleDOI
TL;DR: This paper proposes a content-adaptive steganalysis strategy for color images that aims to extract spatial rich model features from each color channel and just extract color richmodel features from the pixels that may have been modified.
Abstract: Some steganography methods for gray-scale image can be extended to true RGB color image by treating each of its three color channels as a gray-scale image. In modern popular steganography, most embedding changes are highly concentrated on those complex textural regions with smaller embedding distortions. However, the existing steganalysis methods for color images directly extract steganalytic features from the whole image. In this paper, we propose a content-adaptive steganalysis strategy for color images. The new strategy aims to extract spatial rich model features from each color channel and just extract color rich model features from the pixels that may have been modified. In order to locate those suspected pixels, we first calculate the embedding costs of each channel, and then a subset of pixels with smaller embedding costs is selected. Experimental results show that the proposed strategy performs better than the state-of-the-art color image steganalysis method. Copyright © 2017 John Wiley & Sons, Ltd.

24 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: To guarantee the validity of EHRs encapsulated in blockchain, this paper presents an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it.
Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and restore management of their own medical data. The rapid development of blockchain technology promotes population healthcare, including medical records as well as patient-related data. This technology provides patients with comprehensive, immutable records, and access to EHRs free from service providers and treatment websites. In this paper, to guarantee the validity of EHRs encapsulated in blockchain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it. Furthermore, there are multiple authorities without a trusted single or central one to generate and distribute public/private keys of the patient, which avoids the escrow problem and conforms to the mode of distributed data storage in the blockchain. By sharing the secret pseudorandom function seeds among authorities, this protocol resists collusion attack out of $N$ from $N-1$ corrupted authorities. Under the assumption of the computational bilinear Diffie-Hellman, we also formally demonstrate that, in terms of the unforgeability and perfect privacy of the attribute-signer, this attribute-based signature scheme is secure in the random oracle model. The comparison shows the efficiency and properties between the proposed method and methods proposed in other studies.

373 citations

Journal ArticleDOI
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Abstract: This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing up-to-date techniques for researchers that are involved in the designing of image steganographic system. In this article, the general structure of the steganographic system and classifications of image steganographic techniques with its properties in spatial domain are exploited. Furthermore, different performance matrices and steganalysis detection attacks are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.

310 citations

Journal ArticleDOI
TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Abstract: The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.,Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.,Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.,Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.

252 citations

Journal ArticleDOI
TL;DR: This paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework, which results in energy-efficient and conserved transmission in the form of low error rate with low computational time.
Abstract: Two-way image communication in a wireless channel needs to be viable with channel properties such as transfer speed, energy-effective, time usage, and security because image capability consumes a huge space in the gadget and is quite effective. Is required in a manner. The figure goes through attacks. In addition, the quiesical issue for additional time of pressure is that the auxiliary interaction of pressure occurs through the dewar receiving extra time. To address these issues, compressed sensing emerges, which packs the image into hours of sensing, is generated in an expedient manner that reduces time usage and saves the use of data transfer capability, however Bomb in transmission. A variety of examinations cleared a way for dealing with security issues in compressive sensing (CS) through giving security as an alternative negotiation. In addition, univariate factors opted for CS as the issue of rearranging image quality is because of the aggregation of clutter. Along these lines related to the above issues, this paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework. Receives what was designated as the pack-protected plot. Impeccable entertainment with the famous arbitrary network conjecture in CS. The result of the test is that the practical module presents energy-efficient and conserved transmission in the form of low error rate with low computational time.

230 citations

Journal ArticleDOI
TL;DR: This research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.
Abstract: Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring tools that are widely used in image quality assessment. Especially in the steganography image, these two measuring instruments are used to measure the quality of imperceptibility. PSNR is used earlier than SSIM, is easy, has been widely used in various digital image measurements, and has been considered tested and valid. SSIM is a newer measurement tool that is designed based on three factors i.e. luminance, contrast, and structure to better suit the workings of the human visual system. Some research has discussed the correlation and comparison of these two measuring tools, but no research explicitly discusses and suggests which measurement tool is more suitable for steganography. This study aims to review, prove, and analyze the results of PSNR and SSIM measurements on three spatial domain image steganography methods, i.e. LSB, PVD, and CRT. Color images were chosen as container images because human vision is more sensitive to color changes than grayscale changes. Based on the test results found several opposing findings, where LSB has the most superior value based on PSNR and PVD get the most superior value based on SSIM. Additionally, the changes based on the histogram are more noticeable in LSB and CRT than in PVD. Other analyzes such as RS attack also show results that are more in line with SSIM measurements when compared to PSNR. Based on the results of testing and analysis, this research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.

204 citations