Data Hiding Based on Redundant Space of WeChat Mini Program Codes View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2022-01-21

AUTHORS

Jia Chen , Jiayu Wang , Yongjie Wang , Xuehu Yan

ABSTRACT

With the widespread use of mini program codes, research on data hiding based on mini program codes is necessary for protecting the copyright and security of the code. However, in the existing researches, the secret payload is low, which limits the practical application. In this paper, a data hiding scheme based on the redundant space of mini program codes is proposed, which embeds secret information into the uncoded redundant space. The redundant space includes adding extended modules outside each ray (also called rays extension) and adding fake rays (also called rays forgery). The proposed scheme has the advantages of large embedded capacity, good imperceptibility, and strong applicability. For the version v, and the number of modules expanded on the ray ne\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n_e$$\end{document}, the maximum embedding capacity is 112(4-v/18)+13(4-v/18)+56ne\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$112 (4 - v/18) + 13 (4 - v/18) +56 n_e $$\end{document}. Theoretical analysis and experiments show the feasibility and effectiveness of the proposed scheme. More... »

PAGES

243-257

Book

TITLE

Digital Forensics and Watermarking

ISBN

978-3-030-95397-3
978-3-030-95398-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-95398-0_17

DOI

http://dx.doi.org/10.1007/978-3-030-95398-0_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1144819962


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China", 
            "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chen", 
        "givenName": "Jia", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China", 
            "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Jiayu", 
        "id": "sg:person.012740033752.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740033752.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China", 
            "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Yongjie", 
        "id": "sg:person.012213076635.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012213076635.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China", 
            "Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yan", 
        "givenName": "Xuehu", 
        "id": "sg:person.010467364517.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2022-01-21", 
    "datePublishedReg": "2022-01-21", 
    "description": "With the widespread use of mini program codes, research on data hiding based on mini program codes is necessary for protecting the copyright and security of the code. However, in the existing researches, the secret payload is low, which limits the practical application. In this paper, a data hiding scheme based on the redundant space of mini program codes is proposed, which embeds secret information into the uncoded redundant space. The redundant space includes adding extended modules outside each ray (also called rays extension) and adding fake rays (also called rays forgery). The proposed scheme has the advantages of large embedded capacity, good imperceptibility, and strong applicability. For the version v, and the number of modules expanded on the ray ne\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$n_e$$\\end{document}, the maximum embedding capacity is 112(4-v/18)+13(4-v/18)+56ne\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$112 (4 - v/18) + 13 (4 - v/18) +56 n_e $$\\end{document}. Theoretical analysis and experiments show the feasibility and effectiveness of the proposed scheme.", 
    "editor": [
      {
        "familyName": "Zhao", 
        "givenName": "Xianfeng", 
        "type": "Person"
      }, 
      {
        "familyName": "Piva", 
        "givenName": "Alessandro", 
        "type": "Person"
      }, 
      {
        "familyName": "Comesa\u00f1a-Alfaro", 
        "givenName": "Pedro", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-95398-0_17", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-95397-3", 
        "978-3-030-95398-0"
      ], 
      "name": "Digital Forensics and Watermarking", 
      "type": "Book"
    }, 
    "keywords": [
      "program code", 
      "data hiding", 
      "redundant space", 
      "data hiding scheme", 
      "maximum embedding capacity", 
      "WeChat Mini Program", 
      "secret payload", 
      "good imperceptibility", 
      "secret information", 
      "hiding scheme", 
      "embedding capacity", 
      "Mini Program", 
      "extended modules", 
      "number of modules", 
      "hiding", 
      "strong applicability", 
      "code", 
      "scheme", 
      "module", 
      "imperceptibility", 
      "version V", 
      "practical applications", 
      "security", 
      "space", 
      "theoretical analysis", 
      "widespread use", 
      "information", 
      "payload", 
      "applications", 
      "effectiveness", 
      "research", 
      "advantages", 
      "applicability", 
      "feasibility", 
      "experiments", 
      "number", 
      "program", 
      "use", 
      "capacity", 
      "rays", 
      "analysis", 
      "copyright", 
      "paper"
    ], 
    "name": "Data Hiding Based on Redundant Space of WeChat Mini Program Codes", 
    "pagination": "243-257", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1144819962"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-95398-0_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-95398-0_17", 
      "https://app.dimensions.ai/details/publication/pub.1144819962"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_297.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-95398-0_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-95398-0_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-95398-0_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-95398-0_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-95398-0_17'


 

This table displays all metadata directly associated to this object as RDF triples.

133 TRIPLES      22 PREDICATES      67 URIs      60 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-95398-0_17 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N75aa119257854029934850b8cfd77f2e
4 schema:datePublished 2022-01-21
5 schema:datePublishedReg 2022-01-21
6 schema:description With the widespread use of mini program codes, research on data hiding based on mini program codes is necessary for protecting the copyright and security of the code. However, in the existing researches, the secret payload is low, which limits the practical application. In this paper, a data hiding scheme based on the redundant space of mini program codes is proposed, which embeds secret information into the uncoded redundant space. The redundant space includes adding extended modules outside each ray (also called rays extension) and adding fake rays (also called rays forgery). The proposed scheme has the advantages of large embedded capacity, good imperceptibility, and strong applicability. For the version v, and the number of modules expanded on the ray ne\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n_e$$\end{document}, the maximum embedding capacity is 112(4-v/18)+13(4-v/18)+56ne\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$112 (4 - v/18) + 13 (4 - v/18) +56 n_e $$\end{document}. Theoretical analysis and experiments show the feasibility and effectiveness of the proposed scheme.
7 schema:editor Nceec7fdf3a134fed94801dd5a64e3234
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N8defee4e034c4d7ab00f580688feba42
11 schema:keywords Mini Program
12 WeChat Mini Program
13 advantages
14 analysis
15 applicability
16 applications
17 capacity
18 code
19 copyright
20 data hiding
21 data hiding scheme
22 effectiveness
23 embedding capacity
24 experiments
25 extended modules
26 feasibility
27 good imperceptibility
28 hiding
29 hiding scheme
30 imperceptibility
31 information
32 maximum embedding capacity
33 module
34 number
35 number of modules
36 paper
37 payload
38 practical applications
39 program
40 program code
41 rays
42 redundant space
43 research
44 scheme
45 secret information
46 secret payload
47 security
48 space
49 strong applicability
50 theoretical analysis
51 use
52 version V
53 widespread use
54 schema:name Data Hiding Based on Redundant Space of WeChat Mini Program Codes
55 schema:pagination 243-257
56 schema:productId Na553c0f0499a433c9c9eaa394160f33b
57 Nefb41ebca2484f6c99b8e517b56224cd
58 schema:publisher Nc54879f6d02846689a4b8e57e1c58185
59 schema:sameAs https://app.dimensions.ai/details/publication/pub.1144819962
60 https://doi.org/10.1007/978-3-030-95398-0_17
61 schema:sdDatePublished 2022-12-01T06:50
62 schema:sdLicense https://scigraph.springernature.com/explorer/license/
63 schema:sdPublisher N4ee59fbf28fa42b3a28202f57dc61e29
64 schema:url https://doi.org/10.1007/978-3-030-95398-0_17
65 sgo:license sg:explorer/license/
66 sgo:sdDataset chapters
67 rdf:type schema:Chapter
68 N065b8bfc654c449489609880953edaf0 rdf:first Nfb0832347a3048f49ffdbcf0497a0061
69 rdf:rest rdf:nil
70 N0bd0cd5e5ca54fe0bd3950096101c445 rdf:first sg:person.012740033752.90
71 rdf:rest Nac4a8a546a5b4981b95cc056e6630dab
72 N45322bc662c84f79940b3bc6837e20fd rdf:first N70e3ef7eb99f4b6b8158f9ae14b69fe7
73 rdf:rest N065b8bfc654c449489609880953edaf0
74 N4ee59fbf28fa42b3a28202f57dc61e29 schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 N59194b2949834d51bc62f5437c2c6489 rdf:first sg:person.010467364517.31
77 rdf:rest rdf:nil
78 N70e3ef7eb99f4b6b8158f9ae14b69fe7 schema:familyName Piva
79 schema:givenName Alessandro
80 rdf:type schema:Person
81 N75aa119257854029934850b8cfd77f2e rdf:first Nae679077e1e2456ba77a0fa709a0311b
82 rdf:rest N0bd0cd5e5ca54fe0bd3950096101c445
83 N8defee4e034c4d7ab00f580688feba42 schema:isbn 978-3-030-95397-3
84 978-3-030-95398-0
85 schema:name Digital Forensics and Watermarking
86 rdf:type schema:Book
87 Na553c0f0499a433c9c9eaa394160f33b schema:name doi
88 schema:value 10.1007/978-3-030-95398-0_17
89 rdf:type schema:PropertyValue
90 Nabef0de72a614e34bc6ae986f00f82f9 schema:familyName Zhao
91 schema:givenName Xianfeng
92 rdf:type schema:Person
93 Nac4a8a546a5b4981b95cc056e6630dab rdf:first sg:person.012213076635.53
94 rdf:rest N59194b2949834d51bc62f5437c2c6489
95 Nae679077e1e2456ba77a0fa709a0311b schema:affiliation grid-institutes:None
96 schema:familyName Chen
97 schema:givenName Jia
98 rdf:type schema:Person
99 Nc54879f6d02846689a4b8e57e1c58185 schema:name Springer Nature
100 rdf:type schema:Organisation
101 Nceec7fdf3a134fed94801dd5a64e3234 rdf:first Nabef0de72a614e34bc6ae986f00f82f9
102 rdf:rest N45322bc662c84f79940b3bc6837e20fd
103 Nefb41ebca2484f6c99b8e517b56224cd schema:name dimensions_id
104 schema:value pub.1144819962
105 rdf:type schema:PropertyValue
106 Nfb0832347a3048f49ffdbcf0497a0061 schema:familyName Comesaña-Alfaro
107 schema:givenName Pedro
108 rdf:type schema:Person
109 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
110 schema:name Information and Computing Sciences
111 rdf:type schema:DefinedTerm
112 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
113 schema:name Data Format
114 rdf:type schema:DefinedTerm
115 sg:person.010467364517.31 schema:affiliation grid-institutes:None
116 schema:familyName Yan
117 schema:givenName Xuehu
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
119 rdf:type schema:Person
120 sg:person.012213076635.53 schema:affiliation grid-institutes:None
121 schema:familyName Wang
122 schema:givenName Yongjie
123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012213076635.53
124 rdf:type schema:Person
125 sg:person.012740033752.90 schema:affiliation grid-institutes:None
126 schema:familyName Wang
127 schema:givenName Jiayu
128 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740033752.90
129 rdf:type schema:Person
130 grid-institutes:None schema:alternateName Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China
131 schema:name Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, 230037, Hefei, China
132 National University of Defense Technology, 230037, Hefei, China
133 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...