روش ساخت شبکه الکترونیکی
ترجمه نشده

روش ساخت شبکه الکترونیکی

عنوان فارسی مقاله: یک روش ساخت شبکه الکترونیکی بر اساس پد بازی
عنوان انگلیسی مقاله: An Electronic Lattice Construction Method Based on Game Padding
مجله/کنفرانس: دسترسی – IEEE Access
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های تحصیلی مرتبط: شبکه های کامپیوتری
کلمات کلیدی فارسی: پنهان سازی اطلاعات، پنهان نگاری متن بدون پوشش، پد بازی، شبکه الکترونیکی، مسیرهای پنهان
کلمات کلیدی انگلیسی: Information hiding, coverless text steganography, padding game, electronic lattice, hidden paths
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1109/ACCESS.2019.2946299
دانشگاه: College of Computer Science and Technology, Qingdao University, Qingdao 266071, China
صفحات مقاله انگلیسی: 10
ناشر: آی تریپل ای - IEEE
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 4.641 در سال 2018
شاخص H_index: 56 در سال 2019
شاخص SJR: 0.609 در سال 2018
شناسه ISSN: 2169-3536
شاخص Quartile (چارک): Q2 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E13846
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

I. Introduction

II. Related Works

III. Steganography Algorithm Based on an Electronic Lattice

IV. The Analyses

V. Conclusion

Authors

Figures

References

بخشی از مقاله (انگلیسی)

Abstract

The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity problems to some extent. We propose an electronic lattice construction method based on a padding game to hide a secret message. This method first computes the length of a secret message and a key is worked out based on the length; the walking rule, the constraints to a hidden path, the initial size of a grid and the starting cell are determined based on the key and a unique hidden path can be figured out for the given secret; then the secret message is stored in the cells along the unique path and all the remaining cells in the grid are filled according to the padding game rules, which helps to obscure that secret message; finally, elements in some cells are removed to get the crossword that will be shared with the receiver. To extract the message, the receiver fills the crossword according to the same game rules as the sender does, and calculates that unique hidden path based on the shared key. The experimental results and analyses show that its concealment is prominent, its steganography success rate is 100%, and it has a high steganographic capacity. It also has no readability issue as the steganography by generation usually does.

Introduction

With the rapid development of Internet technology, the dissemination of digital audio-visual products and other electronic publications become more and more convenient. Just as a coin has two sides, besides such facilitation, the new technologies also bring a lot of problems, such as information theft and disclosure, and other serious infringements. It has become a problem of great concern on how to make people not only enjoy the convenience but also effectively protect information security and digital rights. Information hiding technology [1] is one of potential approaches to these issues, one branch of which, i.e. steganography, is the practice of communicating a secret message by hiding it in a popular cover object. This approach can avoid the secret transmission to be noticed by an attacker and is attracting more and more attention. It plays an important role in protecting the information from uncovering, such as the secret communication. Based on the cover types, steganography can be divided into five categories: image steganography [2], [3], video steganography [4], [5], audio steganography [6]–[8], text steganography [9] and network steganography [10]. As the most important and predominant media, a text is widely used in our daily life and work. This makes it difficult to arouse suspicion when a text is used as a cover, which conforms to the principal characteristics of a cover [11]. The text steganography was invented in ancient times. The most typical ones were the Tibetan head poems and the Tibetan tail poems [12].