Skip to main content

Optimization of Location Information Hiding Algorithm for Anti Attack

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 950))

Abstract

The wireless communication network, often automatically positioning information about a user’s location, location privacy for the effective protection of the user, put forward a kind of position information hiding method based on Improved Genetic Algorithm for large data position information of a piecewise linear encoding processing, feature extraction of location information based on association rules, using vector quantization method for information fusion the data after encoding hidden design, improved genetic algorithm with location information encryption key construction, location information encryption and encoding processing, to achieve information hiding location optimization. The simulation results show that the design method of hiding location information, the location information of the good encryption performance, strong anti attack capability, improve the privacy protection performance of location information, and the encryption algorithm for the hidden cost is low, high real-time encoding of information hiding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, S.: A new information hiding method based on improved BPCS steganography. Adv. Multimed. 15(3), 1–7 (2015)

    Google Scholar 

  2. Liu, H., Wang, X., Chen, Y., et al.: Optimization lighting layout based on gene density improved genetic algorithm for indoor visible light communications. Opt. Commun. 390, 76–81 (2017)

    Article  Google Scholar 

  3. Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the Chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_12

    Chapter  Google Scholar 

  4. Gurung, S., Choudhury, K.P., Parmar, A., et al.: Multiple information hiding using cubical approach on random grids. J. Food Sci. 7(11), 54–63 (2015)

    Google Scholar 

  5. Lu, J.-H., Long, C.-P.: Optical wireless transmission under the hidden image simulation reversible information hiding method. Comput. Simul. 34(5), 201–204 (2017)

    Google Scholar 

  6. Zhang, X.-M., Yin, X.: Speech information hiding approach in wavelet domain based on chaotic sequence. J. Syst. Simul. 19(9), 2113–2117 (2007)

    Google Scholar 

  7. Wang, J.H., Wang, J.L., Wang, D.M., et al.: Neural network location based on weight optimization with genetic algorithm under the condition of less information. IEICE Trans. Commun. 99(11), 2323–2331 (2016)

    Article  Google Scholar 

  8. Zou, Y., Zhang, Y.: Improved multi-objective genetic algorithm based on parallel hybrid evolutionary theory. Environ. Sci. Technol. 34(3), 133–134 (2015)

    Google Scholar 

  9. Basu, A., Nandy, K., Banerjee, A., et al.: On the implementation of IP protection using biometrics based information hiding and firewall. Int. J. Electron. 103(2), 177–194 (2016)

    Article  Google Scholar 

  10. Mahboubi, H., Moezzi, K., Aghdam, A.G., et al.: Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors. IEEE Trans. Industr. Inf. 10(1), 163–174 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This research was supported by the National Science Foundation of Heilongjiang Province (Grant No. F2015022), the University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (project number: UNPYSCT-2017149), The Key Laboratory for Advanced Technology To Internet of Things (IOT2017A03), Guangxi Young And Mid Aged Teachers’ Basic Ability Promotion Project (2017KY0803), all support is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong-yang Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, B., Zhao, Ry., Zhang, Gy., Liang, JH. (2018). Optimization of Location Information Hiding Algorithm for Anti Attack. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics