期刊文献+

抗统计分析的BPCS隐写算法 被引量:2

BPCS steganography algorithm against statistical analysis
在线阅读 下载PDF
导出
摘要 位平面复杂度分割(BPCS)隐写在复杂度较高的位面小块嵌入秘密信息,有较好的隐蔽性,但会引起图像位面小块复杂度的统计特性的变化。通过深入分析图像位平面上相邻像素之间的相关性,提出了一种改进的BPCS隐写法。它更好地利用人的视觉特性,结合图像的局部特征来嵌入秘密信息。实验结果表明,改进后的算法能够抵御针对原BPCS隐写的分析方法,有较大的嵌入量,并对原图像所作的改变具有更好的不可见性。 Bit-Plane Complexity Segmentation(BPCS) steganography replaces bit-plane blocks of high complexity with secret data. It provides good imperceptibility.But it would change the statistic characteristics of bit-plane block complexity.Through detailed analysis of the relativity of the consecutive pixels in digital image bit-plane,an improved BPCS steganography is proposed.The algorithm takes full advantages of human visual characteristics and incorporates the local feature of digital image while inserting secret data.Experimental results show that,improved algorithm can resist analysis of original BPCS and provide good capacity.It also has better invisibility for the change of original image.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第7期52-54,共3页 Computer Engineering and Applications
关键词 信息隐藏 隐写 位平面复杂度分割 视觉特性 住平面 information hiding steganography Bit-Plane Complexity Segmentation(BPCS) visual characteristics bit-plane
  • 相关文献

参考文献6

  • 1张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 2Provos N.Defending against statistical steganalysis[C/OL]//Proceeding10th Advenced Computing System Association,Security Symposium,Washington,DC,USA,2001.http://www.usenix.org/publication/library/proceedings/sec01/provos./html.
  • 3王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 4Hioki H.A data enbedding method using BPCS principle with new complexity measures[C]//Pacific Rim Workshop on Digital Steganography,2002.
  • 5王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
  • 6Kawaguchi E,Eason R.Principle and application of BPCS-Steganography[C]//Proceeding of SPIE:Multimedia Systems and Applications,1998,3528:464-472.

二级参考文献14

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 2Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 3Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13
  • 4Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3,4): 313~336
  • 5FridrichJ, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia,Special Issue on Security, 2001, 8(4): 22~28
  • 6Westfeld A, Pfitzm A. Attacks on steganographic systems [A]. In: The 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science 1768 [C].Dresden: Springer-Verlag, 1999. 61~76
  • 7Zhang Xinpeng, Wang Shuozhong, Zhang Kaiwen.Steganography with least histogram abnormality [A]. In:Computer Network Security, Lecture Notes in Computer Science 2776 [C]. St, Petersburg: Springer-Verlag, 2003. 395~ 406
  • 8Kawaguchi E, Eason R O. Principle and application of BPCSsteganography [A]. In: Multimedia Systems and Applications,Proceedings of SPIE 3528, Boston, 1998. 464~472
  • 9Nods H, Spaulding J, Shirazi M N, et al. Application of bitplane decomposition steganography to JPEG2000 encoded images [J]. IEEE Signal Processing Letters, 2002, 9(12): 410~413
  • 10SpauldingJ, NodaH, ShiraziMN, etal. BPCSsteganography using EZW lossy compressing images [J]. Pattern Recognition Letters, 2002, 23(13): 1579~ 1587

共引文献43

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部