期刊文献+

基于互补矩阵数据隐藏算法研究 被引量:1

Complementary matrix–based algorithm for data hiding
在线阅读 下载PDF
导出
摘要 给出的基于互补矩阵数据隐藏算法在数据隐藏量和安全性两方面都有良好性能。算法可以在长为n bit的宿主数据嵌入[lb2n]bit的秘密数据,而对宿主数据的修改量平均为[(3/2)?(1/2m?1)]bit。互补矩阵H的多种取法及密钥k的引入增加了算法的安全性。 The complementary matrix-based algorithm for data hiding presented does a good job at capacity of data hiding and data security. The proposed algodthrn can conceal as many as [1b2n] bits data in n bits host data stream, by changing, averagely, [(3/2)-(1/2^m-1)] bits. There are so many kinds of complementary matrices, and the secret key is only shared by the sender and extractor, so the algodthrn is very secure.
出处 《通信学报》 EI CSCD 北大核心 2007年第11期38-43,共6页 Journal on Communications
关键词 数据隐藏 互补矩阵 矩阵理论 隐藏容量 安全性 data hiding complementary matrix matrix theory capacity of data hiding security
  • 相关文献

参考文献1

二级参考文献10

  • 1[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033.
  • 3[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276.
  • 4[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472.
  • 5[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112.
  • 6[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90.
  • 7[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396.
  • 8[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231.
  • 9汪春生,程义民,王以孝.一种基于块分类的自适应数字水印算法[J].计算机工程与应用,2002,38(21):106-109. 被引量:17
  • 10陆红琳,程义民,王以孝,田源.一种基于ICA的汉字信息隐秘传输方法[J].中文信息学报,2003,17(4):59-65. 被引量:8

共引文献23

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部