Skip to main content

Advertisement

Log in

A strong-robust covert communication scheme based on geo-coordinate

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The combination of spatial information services, wireless mobile services, and social network services has generated massive social media geographic data, enriching the types of covert communication carriers. However, the imperceptibility and robustness of steganography methods based on geographic data still need to be improved. To this end, this paper proposes a steganography method, which hides secret messages into geo-coordinates. In this method, the sender analyzes the correlation between digit planes of geo-coordinate and positioning accuracy and divides digit planes into A-grade, B-grade, and C-grade according to significance. Then, secret messages are priority embedded in C-grade using the MLSBR algorithm to increase embedding capacity, and the rest are embedded into B-grade using STC adaptive steganography algorithm to enhance the imperceptibility. The receiver uses shared parameters to achieve the correct extraction of secret messages, and the extraction steps are obtaining stego geo-coordinates, dividing digit planes, and matching the steganography algorithm. Experimental results demonstrate that compared with the existing geo-coordinate steganography methods, the proposed method can realize the complete extraction of secret messages, the average embedding capacity is increased by 20.53 bits per geo-coordinate, the extraction error rate is reduced by 50.65%, the trajectory similarity is improved by 94.29%, and the PSNR is raised by 15.55 dB, which all show that the proposed method performs better under the comprehensive measure of average embedding capacity, imperceptibility, and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Availability of data and materials

The datasets analyzed during the current study are available at https://github.com/lym003/geocoordinate-steganography.

Code Availability

Code availability: The code is available at https://github.com/lym003/geocoordinate-steganography.

References

  1. Guan Q, Liu P, Zhang W, Lu W, Zhang X (2022) Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. IEEE T Inf Foren Sec 18:501–516

    Article  Google Scholar 

  2. Zhang X, Qian Z, Li S (2016) Prospect of digital steganography research. J Appl Sci 34(5):476–484

    Google Scholar 

  3. Mor N (2011) Geographic information from georeferenced social media data. ACM Sigspatial Special 3(2):54–61

    Article  Google Scholar 

  4. Peng X, Huang Z (2014) A novel popular tourist attraction discovering approach based on geo-tagged social media big data. Isprs Int J Geo-Inf 6:216

    Article  Google Scholar 

  5. Pei T, Huang Q, Wang X et al (2021) Big geodata aggregation: Connotation, classification, and framework. Natl. Remote. Sens. Bull. 25:2153–2156

    Article  Google Scholar 

  6. Liu Y, Liu Q, Deng M, Shi Y (2022) Recent advance and challenge in geospatial big data mining. Acta Geodaetica et Cartographica Sinica 51(7):1544–1560

    Google Scholar 

  7. Yershov A, Zabiniako V, Semenchuk P (2012) Using concatenated steganography for visual analysis in GIS SOA. Appl Comput Syst 13(1):74–82

    Article  Google Scholar 

  8. L Hebbes, F Y Janjua, D Livingstone, J Orwell (2006) A steganographic method for the secure embedding of GIS data streams into aerial photography. In: Joint IST Workshop on Mobile Future and the Symposium on Trends in Communications, pp 97–100

  9. Wu M, Hsu C, Jia J (2009) A GeoTagging scheme using image steganography and GPS information authentication. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 1245–1248

  10. M Jayachandran, J Manikandan (2010) SAR image compression using steganography. In: 2010 International Conference on Advances in Computer Engineering, pp 203–206

  11. Guo J, Xue S, Zhu R, Chen K (2016) An improved digital raster map data hiding algorithm based on H.264/AVC intra prediction. Geomat Inf Sci Wuhan Univ 41(6):825–831

  12. M Rajeesh, A R.Ram (2021) Tree monitoring system using geotagging and steganography. In: 2021 International Conference on Communication, Control and Information Sciences (ICCISc), pp 1–6

  13. M Diehl (2008) Geographic data and steganography - Using google earth and KML files for high-capacity steganography. In: International Conference on Security and Cryptography, pp 381–387

  14. Li A, Li S, Lv G (2012) Disguise and reduction methods of gis vector data based on difference expansion principle. Procedia Eng 29:1344–1350

    Article  Google Scholar 

  15. Hassan RF, Mohammed MS (2017) Information hiding using geographic information system (GIS) vector file. Eng Technol J 35(2):182–188

    Article  Google Scholar 

  16. Kurtuldu Ö, Demirci M (2019) StegoGIS: A new steganography method using the geospatial domain. Turk J Elec Eng Comp Sci 27(1):532–546

    Article  Google Scholar 

  17. Zhang Y, Luo X, Lu W, Yang C, Liu F (2022) Research progress on digital image robust steganography. J Image Graphics 27(01):0003–0026

    Google Scholar 

  18. Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. Proceedings of SPIE, Media Forensics and Security II:501–514

    Google Scholar 

  19. Du H, Liu J, Tian Y, Luo X (2022) Steganographic key recovery for adaptive steganography under "known-message attacks." Multimed Tools Appl 81(8):10981–11004

  20. Yue M, Peng Z, Zheng K, Peng Y (2014) Rights protection for trajectory streams. In: International Conference on Database Systems for Advanced Applications, pp 407–421

  21. Su H, Liu S, Zheng B, Zhou X, Zheng K (2020) A survey of trajectory distance measures and performance evaluation. The VLDB J 29:3–32

    Article  Google Scholar 

  22. Fahime K, Mohammad Reza M (2021) Trajectory Similarity Measurement: An Enhanced Maximal Travel Match Method. Trans in Gis 25(3):1485–1503

    Article  Google Scholar 

  23. Liu X (2022) Contributions to high accuracy snapshot GNSS positioning. Universitat Politècnica de Catalunya

  24. Qian C, Liu H, Tang J et al (2017) An integrated GNSS/INS/LiDAR-SLAM positioning method for highly accurate forest stem mapping. Remote Sens 9(1):3

    Article  ADS  Google Scholar 

  25. Li G, Geng J (2019) Characteristics of raw multi-GNSS measurement error from google android smart devices. GPS Solut 23:1–16

    Article  Google Scholar 

  26. Chang K, Kim K, Lee S, Kim J, Lee J, Kim H, Ko Y, Kim I, Bang S (2022) Technical challenges and solutions for 10 cm-level positioning accuracy towards 6G. ICT Express 9:492–506

    Article  Google Scholar 

  27. Li Z, Li J (2013) Quickly calculate the distance between two points and measurement error based on latitude and longitude. Geomat Spat Inf Technol 36:235–237

    Google Scholar 

  28. Esri E (1998) Shapefile technical description: An ESRI whitepaper, environmental systems research institute. Inc, Redlands, CA, USA

    Google Scholar 

  29. Peng Z, Zhang C (2004) The roles of geography markup language (GML), scalable vector graphics (SVG), and Web feature service (WFS) specifications in the development of Internet geographic information systems (GIS). J Geogr Syst 6:95–116

    Article  Google Scholar 

  30. T Wilson (2008) OGC® KML.Version 2.2.0. Open Geospatial Consortium

  31. Huang X, Chen Z (2021) Design and implementation of heterogeneous web platform based on JSON. Comput Technol Dev 31(03):120–125

    Google Scholar 

  32. Zheng Y, Zhang L, Xie X, Ma W (2009) Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th international conference on World wide web, pp 791–800

  33. Yuan H, Li G, Bao Z, Feng L (2021) An effective joint prediction model for travel demands and traffic flows. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp 348–359

  34. Hu D, Chen L, Fang H, Fang Z, Li T, Gao Y (2023) Spatio-Temporal Trajectory Similarity Measures: A Comprehensive Survey and Quantitative Study. arXiv:2303.05012

Download references

Funding

This work was supported by the National Natural Science Foundation of China (No.62202434, 62202495) and Henan Provincial Science and Technology Research Project (222102210079).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Zhang.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

1.1 A The List of Abbreviations

Table 8 The List of Abbreviations

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Zhang, M., Duan, Y. et al. A strong-robust covert communication scheme based on geo-coordinate. Multimed Tools Appl 83, 32475–32496 (2024). https://doi.org/10.1007/s11042-023-16867-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16867-9

Keywords