Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2014.2404.2410LiWangLuoGangXiangLingyun1220141315In practical applications, in order to extract data from the
stego, some data hiding encryption methods need to identify themselves. When
performing data hiding, they embed some specific logo for self-identification.
However, it is unavoidable to bring themselves the risk of exposure. Suppose
each hidden method has a corresponding logo S and the attacker has a logo set
Φ which consists of some hidden methods’ logos. Once he find the logo S
which matches a logo in Φ, he can easily recognize the very method. To
solve this problem, we propose a method based on synchronization to hide the
specific sign or logo. First, the sender generates a key using a public variable
parameter which is always changing from time to time. Then, we can calculate
the hidden data’s location in the cover from the key. According to the locations,
we can embed the logo into the cover. As the public parameter is changing from
time to time, each transmission of hidden data has a unique location sequence.
When the stego reaches its receiver, according to the public parameter, the
receiver could generate the key and get the hidden data’s location to extract
the secret data correctly. Experimental results verify that the data hiding
method performs well and hardly has impacts on the cover’s quality and has little
impacts on the robustness, imperceptibility and capacity of the original stego-cover.
Besides, it is able to recover the key with linear time complexity when the
critical information which is used to generate the key is missing.]]>Zhang, X.,2011Omoomi, M., S. Samavi and S. Dumitrescu,2011Geetha, S., V. Kabilan, S.P. Chockalingam and N. Kamaraj,2011Zeki, A.M., A.A. Manaf and S.S. Mahmod,2011Zanganeh, O. and S. Ibrahim,2011Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan,2014Wang, S., X. Zhang and T. Ma,2002Podilchuk, C.I. and W. Zeng,1998Cancellaro, M., F. Battisti, M. Carli, G. Boato, F.G.B. De Natale and A. Neri,2011Lian, S., Z. Liu, Z. Ren and H. Wang,2007Khan, M.I., V. Jeoti, A.S. Malik and M.F. Khan,2011Bouslimi, D., G. Coatrieux and C. Roux,2012Qiao, L. and K. Nahrstedt,1998Shi, C. and B. Bhargava,1998Wu, C.P. and C.C.J. Kuo,2005Qiu, J. and P. Wang,2012Chen, T.H., G. Horng and S.H. Wang,2003Abdulfetah, A.A., X. Sun, H. Yang and N. Mohammad,2010Bo, L., L. Wei, C. Yuan-Yuan, J. Dong-Dong and C. Ying-Zhi,2009Shahreza, M.S.,2006Cantrell, G. and D.D. Dampier,2004Liu, T.Y. and W.H. Tsai,2007Liu, Y., X. Sun, Y. Liu and C.T. Li,2008Schroder, B.,2005Xiang, T., K. Wong and X. Liao,2008Masuda, N. and K. Aihara,2001