期刊文献+

基于数位信息的信息隐藏方法 被引量:15

A Method of Information Hiding Based on the Digital-Position Information
在线阅读 下载PDF
导出
摘要 描述了一种基于数字位置信息的信息隐藏方法,给出了一个单位增广矩阵,并在此基础上给出了具体算法。该方法若用单个数位信息,在n=2m-1时,嵌入效率可达到m,有较高的数据嵌入效率;若用多个数位组合信息,可在保持嵌入效率不变的条件下,数据嵌入率近似等于1(n较大时),在相同比特数的宿主信息中,可嵌入较多的隐藏信息,可用于流媒体等信息量较大信息的隐藏。文中所述的方法,计算复杂度不高,易于硬件实现,已用微型计算机在局域网上进行了模拟实验,获得了较好的实验结果。 This paper presents a method of information hiding based on the digital-position information, bringing forward an augmented identity matrix and a definite arithmetic upon it. In this method, if the single digital-position information is used, embedding efficiency can achieve m when n = 2^m - 1. And if the multi-digital-position information is used, data embedding rate can almost reach 1 when n is big enough, with the condition of an unchanged embedding efficiency. So more information can be hided in the host information with same bits and it can be used in stream multimedia, hidings with great information, etc. The proposed method with low computing complexity can be realized easily. Satisfying experimental results are gained on PC and LAN
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第8期1304-1309,共6页 Journal of Electronics & Information Technology
关键词 单位增广矩阵 流媒体 嵌入效率 嵌入率 “异或”运算 Augmented identity matrix, Stream multimedia, Embedding efficiency, Embedding rate, XOR operation
  • 相关文献

参考文献5

  • 1Suhail M A, Obaidat M S. Digital watermarking-based DCT and JPEG model. IEEE Trans, on Instrumentation and Measurement,2003, 52(5): 1640- 1647.
  • 2陆红琳,程义民,王以孝,田源.一种基于ICA的汉字信息隐秘传输方法[J].中文信息学报,2003,17(4):59-65. 被引量:8
  • 3Tseng Yu-Chee, Chen Yu-Yuan, Pan Hsiang-Kuang. A secure data hiding scheme for binary images[J]. IEEE Trans. on Communications, 2002, 50(8): 1227 - 1231.
  • 4Galand F, Kabatiansky G. Information hiding by coverings.Information Theory Workshop, Paris, France, 2003, IEEE, 2003:151 - 154.
  • 5Digital cellular telecommunications systems (phase2+), Full rate speech, Transcoding[J]. GSM 06.10 Version 7.0.2 Release, 1998:58 - 59.

二级参考文献7

  • 1Hyvaerinen, A and Oja. E.. Independent Component Analysis: Algorithms and Applications[J]. Neural Networks, 2000,13 (4 - 5) : 411 - 430.
  • 2Hyvaerinen and Oja. E.. A Fast Fixed-Point Algorithm for Independent Component Analysis[J ]. Neural Computation, 1997,9(7) : 1483 - 1492.
  • 3Lee Y K,Chen L H. High capacity image stegonagraphic model[J], IEE Proc, Vis. Image Signal Process, 2000,147(3) :288 - 294.
  • 4Fabien A.P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Information HidingA Survey [J]. Proceedings of the IEEE,special issue on protection of multimedia content, July 1999, 87(7) : 1062 - 1078.
  • 5Solanki, K. ; Jacobsen, N;. Chandrasekaran, S. ; Madhow, U. ; Manjunath. B. S. ; High-Volume Data Hiding In Images: Introducing Perceptual Criteria into Quantization Based Embedding [C]. Acoustics, Speech and Signal Processing, 2002. Proceedings. (ICASSP' 02). IEEE International Conference on, Volume: 4, 2002: 3485-3488.
  • 6Voloshynovskiy S. ; Pun, T. ; Capacity-Security Analysis Of Data Hiding Technologies [C]. Multimedia and Expo, 2002. Proceedings, 2002 IEEE International. Conference on, Volume: 2, 2002: 447-480.
  • 7A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, C. Osborne. Electronic watermark[J ]. Proc DICTA, 1993,10:666 - 672.

共引文献7

同被引文献103

引证文献15

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部