Destructive Method with High Quality and Speed to Counter Information Hiding View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2019-09-13

AUTHORS

Feng Liu , Xuehu Yan , Yuliang Lu

ABSTRACT

Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have good detection for some specific information hiding algorithms. However, huge time consumption is needed and only suitable for offline usage with this method. In this paper, a destructive method with high quality and speed is proposed to counter information hiding. The experimental result presents that the extracting error rate of hiding information is around 50%, which means the method can destroy the possible covert communication completely. At the same time, the quality of covers after the destructive operation is good and the average time of operating an image is millisecond. More... »

PAGES

312-322

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-981-15-0118-0_24

DOI

http://dx.doi.org/10.1007/978-981-15-0118-0_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1120988689


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/grid.412110.7", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Feng", 
        "id": "sg:person.016600326533.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016600326533.28"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/grid.412110.7", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yan", 
        "givenName": "Xuehu", 
        "id": "sg:person.010467364517.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
          "id": "http://www.grid.ac/institutes/grid.412110.7", 
          "name": [
            "National University of Defense Technology, 230037, Hefei, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lu", 
        "givenName": "Yuliang", 
        "id": "sg:person.015112370271.93", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-09-13", 
    "datePublishedReg": "2019-09-13", 
    "description": "Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have good detection for some specific information hiding algorithms. However, huge time consumption is needed and only suitable for offline usage with this method. In this paper, a destructive method with high quality and speed is proposed to counter information hiding. The experimental result presents that the extracting error rate of hiding information is around 50%, which means the method can destroy the possible covert communication completely. At the same time, the quality of covers after the destructive operation is good and the average time of operating an image is millisecond.", 
    "editor": [
      {
        "familyName": "Cheng", 
        "givenName": "Xiaohui", 
        "type": "Person"
      }, 
      {
        "familyName": "Jing", 
        "givenName": "Weipeng", 
        "type": "Person"
      }, 
      {
        "familyName": "Song", 
        "givenName": "Xianhua", 
        "type": "Person"
      }, 
      {
        "familyName": "Lu", 
        "givenName": "Zeguang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-981-15-0118-0_24", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-981-15-0117-3", 
        "978-981-15-0118-0"
      ], 
      "name": "Data Science", 
      "type": "Book"
    }, 
    "keywords": [
      "huge time consumption", 
      "illegal information", 
      "steganalysis methods", 
      "offline usage", 
      "covert communication", 
      "time consumption", 
      "information behavior", 
      "high quality", 
      "error rate", 
      "destructive methods", 
      "experimental results", 
      "specific information", 
      "information", 
      "better detection", 
      "same time", 
      "algorithm", 
      "speed", 
      "images", 
      "destructive operations", 
      "communication", 
      "quality", 
      "usage", 
      "method", 
      "detection", 
      "operation", 
      "time", 
      "average time", 
      "consumption", 
      "behavior", 
      "results", 
      "cover", 
      "rate", 
      "paper"
    ], 
    "name": "Destructive Method with High Quality and Speed to Counter Information Hiding", 
    "pagination": "312-322", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1120988689"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-981-15-0118-0_24"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-981-15-0118-0_24", 
      "https://app.dimensions.ai/details/publication/pub.1120988689"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_92.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-981-15-0118-0_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-981-15-0118-0_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-981-15-0118-0_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-981-15-0118-0_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-981-15-0118-0_24'


 

This table displays all metadata directly associated to this object as RDF triples.

121 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-981-15-0118-0_24 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N61239bcb5129498b889aa9a91f15bdc1
4 schema:datePublished 2019-09-13
5 schema:datePublishedReg 2019-09-13
6 schema:description Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have good detection for some specific information hiding algorithms. However, huge time consumption is needed and only suitable for offline usage with this method. In this paper, a destructive method with high quality and speed is proposed to counter information hiding. The experimental result presents that the extracting error rate of hiding information is around 50%, which means the method can destroy the possible covert communication completely. At the same time, the quality of covers after the destructive operation is good and the average time of operating an image is millisecond.
7 schema:editor N950c6925bc3c44dc9bb0fdf00c2d9130
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N805132d26ae64f4c8ddde42cbb9d7193
11 schema:keywords algorithm
12 average time
13 behavior
14 better detection
15 communication
16 consumption
17 cover
18 covert communication
19 destructive methods
20 destructive operations
21 detection
22 error rate
23 experimental results
24 high quality
25 huge time consumption
26 illegal information
27 images
28 information
29 information behavior
30 method
31 offline usage
32 operation
33 paper
34 quality
35 rate
36 results
37 same time
38 specific information
39 speed
40 steganalysis methods
41 time
42 time consumption
43 usage
44 schema:name Destructive Method with High Quality and Speed to Counter Information Hiding
45 schema:pagination 312-322
46 schema:productId N04dff1412dd54fdeb1e19074d069fb83
47 Na85560b6be5845d691977fb3a45dfa90
48 schema:publisher Nc9dea1a25da548dabf235e3678a69bf8
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1120988689
50 https://doi.org/10.1007/978-981-15-0118-0_24
51 schema:sdDatePublished 2022-12-01T06:55
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N4a1dc19b5d8c463fa057be6b47fb2840
54 schema:url https://doi.org/10.1007/978-981-15-0118-0_24
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N04dff1412dd54fdeb1e19074d069fb83 schema:name dimensions_id
59 schema:value pub.1120988689
60 rdf:type schema:PropertyValue
61 N22f7104c6e944f2ebf7331060bdc6847 rdf:first sg:person.015112370271.93
62 rdf:rest rdf:nil
63 N4a1dc19b5d8c463fa057be6b47fb2840 schema:name Springer Nature - SN SciGraph project
64 rdf:type schema:Organization
65 N58a9eca1d20d4404a4dcf10f7b4bdfaa schema:familyName Jing
66 schema:givenName Weipeng
67 rdf:type schema:Person
68 N61239bcb5129498b889aa9a91f15bdc1 rdf:first sg:person.016600326533.28
69 rdf:rest Nc09eea14b5334d12b5ba7ba0afd5493f
70 N761508d5f72f499cae9b2ba8c1c33afd schema:familyName Cheng
71 schema:givenName Xiaohui
72 rdf:type schema:Person
73 N805132d26ae64f4c8ddde42cbb9d7193 schema:isbn 978-981-15-0117-3
74 978-981-15-0118-0
75 schema:name Data Science
76 rdf:type schema:Book
77 N8944f334d2ea4511912956870baa011e schema:familyName Lu
78 schema:givenName Zeguang
79 rdf:type schema:Person
80 N950c6925bc3c44dc9bb0fdf00c2d9130 rdf:first N761508d5f72f499cae9b2ba8c1c33afd
81 rdf:rest Nf785158df14344a486ee56f561a0cb44
82 Na85560b6be5845d691977fb3a45dfa90 schema:name doi
83 schema:value 10.1007/978-981-15-0118-0_24
84 rdf:type schema:PropertyValue
85 Nc09eea14b5334d12b5ba7ba0afd5493f rdf:first sg:person.010467364517.31
86 rdf:rest N22f7104c6e944f2ebf7331060bdc6847
87 Nc0b7f8423a86402eb2d3f3cf5cad23b4 rdf:first Nc31f0b579e9a45f890c8a9c0ef2c593d
88 rdf:rest Ne7eaf24a14234065a0b7f7fa8c6d150f
89 Nc31f0b579e9a45f890c8a9c0ef2c593d schema:familyName Song
90 schema:givenName Xianhua
91 rdf:type schema:Person
92 Nc9dea1a25da548dabf235e3678a69bf8 schema:name Springer Nature
93 rdf:type schema:Organisation
94 Ne7eaf24a14234065a0b7f7fa8c6d150f rdf:first N8944f334d2ea4511912956870baa011e
95 rdf:rest rdf:nil
96 Nf785158df14344a486ee56f561a0cb44 rdf:first N58a9eca1d20d4404a4dcf10f7b4bdfaa
97 rdf:rest Nc0b7f8423a86402eb2d3f3cf5cad23b4
98 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
99 schema:name Information and Computing Sciences
100 rdf:type schema:DefinedTerm
101 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
102 schema:name Artificial Intelligence and Image Processing
103 rdf:type schema:DefinedTerm
104 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.412110.7
105 schema:familyName Yan
106 schema:givenName Xuehu
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
108 rdf:type schema:Person
109 sg:person.015112370271.93 schema:affiliation grid-institutes:grid.412110.7
110 schema:familyName Lu
111 schema:givenName Yuliang
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93
113 rdf:type schema:Person
114 sg:person.016600326533.28 schema:affiliation grid-institutes:grid.412110.7
115 schema:familyName Liu
116 schema:givenName Feng
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016600326533.28
118 rdf:type schema:Person
119 grid-institutes:grid.412110.7 schema:alternateName National University of Defense Technology, 230037, Hefei, China
120 schema:name National University of Defense Technology, 230037, Hefei, China
121 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...