期刊文献+

基于Arnold变换的信息隐藏算法研究 被引量:1

Research on Information Hide Algorithm based on Arnold Transformation
在线阅读 下载PDF
导出
摘要 提出了一种利用Arnold对称性变换的图像信息隐藏算法,待隐藏的秘密信息以及公开的承载信息均为灰度级静止图像。首先对秘密图像进行Arnold置乱变换,形成秘密信息,然后对载体图像进行DCT变换,秘密信息通过量化处理嵌入到DCT域中。对提出的算法进行了各种攻击测试。实验表明,该算法对JPEG有损压缩、中值滤波攻击和高强度噪声攻击具有强稳健性,具有很好的透明性和鲁棒性,实用性也较高。 A picture information hide algorithm by Arnold Symmetrial transformation is proposed,where the secret information to be hided and carrying public information are static picture of grey level First,Arnold transformation makes the secret picture into disurdre to form secret information. After that DCT is transformed into picture of carrier ~ the secret information is embedded in DCT domain through quantization. Various attack tests for proposed algorithm are carried on. Test result shows that the algonthm has a strong firmness for JPEG lossy compression, medium value filtring attack and high strenghth noise attack,and very good transparency and robustness.
作者 张莉华 陈萍
机构地区 黄淮学院
出处 《电脑开发与应用》 2007年第11期5-7,共3页 Computer Development & Applications
基金 河南省科技攻关项目(0624220044)资助
关键词 ARNOLD变换 小波变换 信息隐藏 Arnold transformation,wavelet transform,information hiding
  • 相关文献

参考文献2

二级参考文献9

  • 1Petitculas F A P, Anderson R J, Kuhn M G. Information Hiding - A Survey. Proceeding of SPIE, 1999:123 - 125.
  • 2Anderson R J, Petitcolas F A P. On the limits of steganography. Proceeding of SPIE, 1998:214 -216.
  • 3Voyatzis G, Nikolaidis N, Pitas I. Ditigal watermarking: an overview. NEIC Technical Report, 1998; 52 - 56.
  • 4W Bender, D Gruhl, N. Morimoto, et al. Techniques for data hiding. IBM Systems Journal, 1996;35(3):313-33.
  • 5D Grahl, W Bender. Information hiding to foil the casual counterfeit et. Information hiding workshop' 98, Berlin: Spring - Verlag, 1998: 329 - 336.
  • 6Cox I J, Kilian J. A secure, robust watermark for multimedia. Work shop on information hiding, Cambridge, 1996:312 - 117.
  • 7Cox I J, Miller M L. A review of watermarking and rite impotance of peceptual modeling. Electronic Imaging'97, Berlin: Spring - Verlag, 1997: 186-191.
  • 8Piron L, Arnold M, Kutter M, et al. OCTALIS benchmarking: compar ison of four watermarking techniques. Security and watermarking of multimedia contents, Berlin: Spring - Verlng, 1999; 3657:262 - 231.
  • 9Kutter M, Voloshynovskiy S, Herrigel A. The watermark copy attack. proceedings of SPIE, Berlin: Spring - Verlag. 2000; 3971 : 375 - 380.

共引文献9

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部