期刊文献+

基于Markov链安全性的二阶统计保持隐写算法 被引量:8

A Novel Second-order Distribution Maintained Steganographic Algorithm Based on Markov Chain Security
原文传递
导出
摘要 如何设计高阶统计安全的大容量隐写算法是当前隐写研究的难点和热点。该文基于Markov链安全性指标和动态补偿的思路,提出一种二阶统计保持的隐写算法。该算法在不降低嵌入量的前提下尽量保持了载体图像的二阶统计特性。实验结果表明,该算法在较大容量数据嵌入过程中,能较好保持二阶统计特性,取得隐写安全性的提高。 It has been a difficulty and hotspot in steganography research that how to design large payload steganographic algorithm while high-order statistical security is ensured. Based on the Markov Chain security benchmarking and dynamic compensating means, a novel second-order distribution maintained steganographic method was proposed, which preserves the second-order distribution of the cover image and the embedded payload is unreduced. Experimental results showed that the proposed algorithm can maintain the second-order distribution of cover image while larger secret information is embedded, and improve the steganographic security.
出处 《中国图象图形学报》 CSCD 北大核心 2010年第8期1175-1181,共7页 Journal of Image and Graphics
基金 江苏省自然科学基金项目(BK2008403)
关键词 信息隐藏 隐写 MARKOV链 统计二阶保持 information hiding, steganography, Markov Chain, second-order distribution maintain
  • 相关文献

参考文献3

二级参考文献19

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 3[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
  • 4[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
  • 5[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
  • 6[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
  • 7[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
  • 8[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html
  • 9Cover TM,Thomas JA.Elements of Information Theory. Journal of Women s Health . 1991
  • 10Liu N,Amin P,Subbalakshimi K.Secure quantization based data em-bedding[].IEEEthWorkshopon Multimedia Signal Processing.2005

共引文献41

同被引文献66

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部