It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Study on Airspace Covert Communication Algorithm of Covert Communication System | Zhang | Journal of Networks
Journal of Networks, Vol 7, No 4 (2012), 730-737, Apr 2012
doi:10.4304/jnw.7.4.730-737

Study on Airspace Covert Communication Algorithm of Covert Communication System

Yinpu Zhang

Abstract


Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system including image steganalysis, Arnold transformation and scrambling of carrier image, embedding of secret information, generation of encrypted image and recovering of carrier image by image-based covert communication technology. The simulation result shows: in order to ensure there is no serious degrading problem after embedding the secret information, the carrier image must have a large capacity; the larger the scrambling times is, the better the scrambling and encrypting effect is. Therefore, the airspace covert communication algorithm based on spread-spectrum communication technology well achieves safe transmission of information and has good application prospect.


Keywords


spread-spectrum communication; encryption algorithm; channel covertness; information hiding; airspace covert communication algorithm

References


 

[1] L. L. WU.J. W. Zhang and Q. Ge, “Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm,” Control&Automation,2010, vol. 26, pp. 206–208.

[2] X. Y. Yan, “On Information Hiding System,” E-commerce,2010, vol. 26, pp. 312.

[3] Y. T. Han and Q. S. Wang, “Research on Binary Image Information Hiding Algorithm Based on Arnold,” Development and application of computer,2010, vol. 24, pp. 9–11.

[4] T. Liu and L. Q. Min, “The Cryptanalysis of animage Scrambling Algorithm Based on Arnold Transformation,” J. Wuhan Univ,2011, vol. 57, pp. 444–448.

[5] Q. L. Wang and F. M. Bai, “Blind Digital Watermarking Algorithm for Color Image Based on Arnold and DWT,” Journal of Jilin University,2011, vol. 29, pp. 304–310.

[6] L. S. Pan, “Arnold Transformation and Chaos Sequence Based on the Gray Image Hashing Algorithm,” Science Technology and Engineering,2011, vol. 11, pp. 4618–4622.

[7] L. Q. Guo,X. R. Zhang and Z. Li, “Rertoration Algorithm of Image Scrambling Based on Arnold Inverse Transformation,” Computer Applications and Software,2010, vol. 27, pp. 265–267.

[8] F. Liu O. Cao and B. X. Li, “Research of the DCT Arnold Shifts the Video Watermark,” Computer & Digital Engineering,2011, vol. 39, pp. 102–105.

[9] H. Q. Huang and S. X. Wu, “An Image Encryption Algorithm Based on 2D Discrete Chaotic Maps and Arnold,” Journal of Kashgar Teachers College,2010, vol. 31, pp. 17–19.

[10] D. M. Zhang and Z. K. Lei, “A digital watermarking algorithm based on Logistic mapping and arnold scrambling,” Electronic Design Engineering,2011, vol. 19, pp. 126–128.

[11] J. Yang and M. Jing, “Scheme of Information Hiding based on New Anti-Arnold Transformation and DCT Coefficient Blending,” Journal of Nanjing Institute of Technology,2010, vol. 8, pp. 38–44.

[12] C. Liu, “Covert communication of digital image on internet and the implementation of MATLAB,” Journal of Guizhou Normal College,2010, vol. 26, pp. 19–22.

[13] T. Zhang, “Two Pictures Hiding Arithmetic,” Western China Science and Technology,2009, vol. 8, pp. 26–27.

[14] C. M. Wu and X. P. Tian, “3-Dimensional Non-equilateral Arnold Transformation and its Application in Image Scrambling,” Journal of Computer-Aided Design & Computer Graphics,2010, vol. 22, pp. 1831–1840.

[15] Y. J. Ding,X. F. Zheng and G. R. Yu, “A Security Scheme Based on ARQ Technology for Image Hidden Communication,” Microcomputer Application,2009, vol. 30, pp. 8–13.

[16] Y. J. Ding,X. F. Zheng and G. R. Yu, “Security Model for Image Hidden Communication,” Computer Science,2010, vol. 37, pp. 120–130.


Full Text: PDF


Journal of Networks (JNW, ISSN 1796-2056)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.