期刊文献+

结合视觉感知特性和湿纸编码的视频隐写算法 被引量:3

Video steganography algorithm based on visual perception characteristics and wet paper codes
在线阅读 下载PDF
导出
摘要 利用双树复小波变换提取出视频图像的运动特征图、对比敏感图、纹理特征图和场景变化情况,综合确定视觉不敏感点,从而构造出用于嵌入秘密信息的隐写位置图,并结合湿纸编码实现了信息的隐写。算法不需要接收者知道具体的嵌入位置便能够实现信息的提取,避免了重复获得隐写位置图的大量运算,并且不必考虑增加冗余以修正隐写操作引起的隐写位置重新判断误差,提高了提取效率和安全性。实验表明,算法具有较高的嵌入容量和良好的隐写不可见性,可以满足隐蔽通信的要求。 By using the dual-tree complex wavelet transform(DT-CWT),this paper extracted video images'motion feature maps,contrast sensitivity maps,texture maps and scene changing points,and used all above to get the least sensitive points to compose the embedding location maps,and then uses wet paper coding to hide messages.The recipient did not need to know the specific location of the embedded information to achieve secret message extraction,and that avoided a large number of operational costs.More than that,it avoided increasing the redundancy to correct the error when determining the embedding position again.Therefore,the algorithm obtained a high safety and extraction efficiency.Experiments show that the algorithm can meet the requirements of steganography embedding capacity and the invisibility of covert communication.
出处 《计算机应用研究》 CSCD 北大核心 2012年第6期2228-2231,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60842006) 武警工程大学基础基金研究项目(wjy201127)
关键词 视频隐写 视觉感知特性 双树复小波变换 隐写位置图 湿纸编码 video steganography visual perception characteristics dual-tree complex wavelet transform(DT-CWT) embedding location map wet paper codes
  • 相关文献

参考文献9

  • 1DING Yang,HUANG Rong-sheng. A new secret sharing scheme from linear code [ J ]. Machine Learning and Cybernetics, 2009, 6 : 3204-3208.
  • 2QIN Hua-wang, DAI Yue-wei, WANG Zhi-quan. A secret sharing based on (t,n) threshold and adversary structure [ J]. InternationalJournal of Information Security,2009,8 (5) :379-385.
  • 3ZHAO Jian-jie, ZHANG Jian-zhong, ZHAO Rong. A practical verifiable muhi-seeret sharing scheme[J]. Computer Standards & Interfaces,2007, 29( 1 ) : 138-141.
  • 4DEHKORDI M H, MASHHADI S. An efficient threshold verifiable mahisecret sharing [ J ]. Computer Standards & Interfaces,2008, 30(3) :187-190.
  • 5DEHKORDI M H, MASHHADI S. New efficient and practical verifiable multi-secret sharing schemes [ J ]. Information Sciences, 2008, 378(9) :2262-2274.
  • 6ALVAREZ G, ENCINAS L H, REY A M. A multisecret sharing scheme for color images based on cellular automata [ J]. Information Sciences, 2008,178 ( 22 ) : 4382- 4395.
  • 7DAS A, ADHIKARI A. An efficient multi-use multi-secret sharing scheme based on hash function [ J]. Applied Mathematics Letters, 2010,23(9 ) :993-996.
  • 8XlAOLiangliang LIUMulan.Linear multi-secret sharing schemes[J].Science in China(Series F),2005,48(1):125-136. 被引量:8
  • 9HSU C F, CHANG Qi, TANG Xue-ming, et al. An ideal multi-secret sharing scheme based on MSP[ J]. Information Sciences,2011,181 ( 7 ) : 1403-1409.

二级参考文献5

  • 1[1]Blackley, G. R., Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference,1979, 48: 313-317.
  • 2[2]Shamir, A., How to share a secret, Communications of the ACM, 1979, 22: 612-613.
  • 3[3]Blundo, C., De Santis, A., Di Crescenzo, G., Multi-secret sharing schemes, Advances in Cryptology-CRYPTO'94,1995, 839: 150-163.
  • 4[4]Beimel, A., Secure Schemes for Secret Sharing and Key Distribution, PhD thesis, Technion-Israel Institute of Techonlogy, 1996.
  • 5[5]Blundo, C., De Santis, A., Masucci, B., Randomness in Multi-Secret Sharing Schemes, Technical Report, University of Salerno, 1998.

共引文献7

同被引文献31

  • 1Zhang J,Ho A T S.Robust digital image-in-video watermarking for the emerging H.264/AVC standard[DB/OL].[2013-12-12].http://epubs.surrey.ac.uk/1917/1/fulltext.pdf.
  • 2Noorkami M,Mersereau R M.A framework for robust watermarking of H.264-encoded video with controllable detection performance[J].Information Forensics and Security,IEEE Transactions on,2007,2(1):14-23.
  • 3陆欢.基于H.264编码标准的可逆视频信息隐藏技术的研究[D].上海:上海交通大学,2011.
  • 4周悦.基于运动矢量与漂移补偿的H.264视频水印算法研究[D].上海:上海交通大学,2011.
  • 5Zhang J,Ho A T S.An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform(IntDCT)[DB/OL].[2013-12-19].http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1292643.
  • 6Sakazawa S,Takishima Y,Nakajima Y.H.264native video watermarking method[DB/OL].[2013-12-19].http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1692866.
  • 7龚龙.基于比特流的实时视频水印技术及其应用[D].哈尔滨:哈尔滨工业大学,2008.
  • 8Liu Qingzhong,Sung A H. Feature Mining and Nuero-fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images[A].Hyderabad,India:Morgan Kaufmann Publishers,2007.
  • 9Harmsen J J,Pearlman W A. Kernel Fisher Discriminant for Steganalysis of JPEG Hiding Methods[A].San Jose,USA:International Society for Optics and Photonics,2004.
  • 10Harmsen J J,Pearlman W A. Steganalysis of Additive-noise Modelable Information Hiding[A].Santa Clara,USA:International Society for Optics and Photonics,2003.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部