期刊文献+

基于图像分类的动态阈值位平面复杂度分割密写算法

Steganography algorithm of dynamic threshold bit-plane complexity segmentation based on image classification
在线阅读 下载PDF
导出
摘要 为提高位平面复杂度分割(BPCS)密写算法的安全性,提出了一种抗统计分析的BPCS密写算法。首先,将载体图像分块,计算图像块的信息熵和小波对比度;然后,利用模糊C-均值(FCM)对其进行分类,根据分类结果及随机数确定每个位面小块的复杂度阈值;最后,将载体和秘密数据位面小块相似程度小于0.5的秘密数据位面小块取反,再替换载体位面小块。实验结果表明,该方法能有效地抵抗复杂度直方图统计分析的检测,同时载密图像视觉不可感知性有了很大的提高。 To improve the security of Bit-Plane Complexity Segmentation(BPCS) steganography algorithm,the authors proposed a BPCS steganography algorithm against statistical analysis.Firstly,an image was divided into blocks to calculate the information entropy and the wavelet contrast.Then the blocks were classified by Fuzzy C-Means(FCM) and each bit-plane block was set different complexity thresholds based on the classification result and a random number.Finally,if the similarity of secret data and carrier bit-plane block was less than 0.5,the secret data bit-plane block was negated to replace the carrier bit-plane block.The experimental results show that the proposed algorithm can effectively resist the detection of statistical analysis of the complexity histogram.Furthermore,the visual imperceptibility of stego image has been greatly improved.
作者 马林 赖惠成
出处 《计算机应用》 CSCD 北大核心 2011年第8期2183-2186,2195,共5页 journal of Computer Applications
关键词 密写 位平面复杂度分割 模糊C-均值 复杂度直方图 小波对比度 steganography Bit-Plane Complexity Segmentation(BPCS) Fuzzy C-Means(FCM) complexity histogram wavelet contrast
  • 相关文献

参考文献9

二级参考文献45

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2杨志,毛士艺,陈炜.一种新的基于小波对比度的图像融合算法[J].系统工程与电子技术,2005,27(2):209-211. 被引量:15
  • 3张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 4Jiang Xiaoyu,SPIE.2898,1996年,35页
  • 5Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 6Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 7Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13
  • 8Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3,4): 313~336
  • 9FridrichJ, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia,Special Issue on Security, 2001, 8(4): 22~28
  • 10Westfeld A, Pfitzm A. Attacks on steganographic systems [A]. In: The 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science 1768 [C].Dresden: Springer-Verlag, 1999. 61~76

共引文献129

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部