期刊文献+

最小化扭曲的抗检测隐写算法

Undetectable Steganographic Algorithm of Minimized Distortion
在线阅读 下载PDF
导出
摘要 为提高秘密数据传输的安全性,提出一种最小化扭曲的图像隐写算法。根据图像平滑特性及具体隐写嵌入操作对特性的影响为载体像素分配扭曲值,以表征在该像素上进行特定嵌入操作对图像总体统计特性的影响程度,再利用STC码选择使图像整体扭曲函数最小的嵌入位置和嵌入方式进行信息嵌入。仿真实验结果表明,该算法具有良好的抗检测性。 In order to improve the security of secret data transmission,a steganographic algorithm of minimized distortion is proposed.In order to express the influence of the pixel modification on the whole statistic character,scalar values are assigned to every pixel based on smoothness and impact of different embedding mode on it.Embedding is actualized by choosing the proper embedding position and mode utilizing Syndrome-trellis Codes(STC).Experiments show that the proposed algorithm possesses a good undtetability.
作者 刘华 汤光明
出处 《计算机工程》 CAS CSCD 2012年第18期97-99,共3页 Computer Engineering
基金 河南省信息安全重点实验室基金资助项目(09ISLB001)
关键词 信息隐藏 隐写术 隐写码 扭曲函数 平滑度 STC码 information hiding; steganography; steganographic code; distortion function; smoothness; Syndrome-trellis Codes(STC);
  • 相关文献

参考文献8

  • 1Fridrich J, Filler T. Practical Methods for Minimizing Embedding Impact in Steganography[C]//Proc. of SPIE’07. Orlando, USA: [s. n.], 2007.
  • 2朱雪秀,刘九芬,张卫明.一种基于汉明码和湿纸码的隐写算法[J].电子与信息学报,2010,32(1):162-165. 被引量:13
  • 3Pevny T, Filler R, Bas P. Using High Dimensional Image Models to Perform Highly Undetectable Steganography[C]//Proc. of the 12th International Conference on Information Hiding. Albetta, Canada: [s. n.], 2010.
  • 4Filler T, Fridrich J. Design of Adaptive Steganographic Schemes for Digital Images[C]//Proc. of SPIE’11. San Francisco, USA: [s. n.], 2011.
  • 5Filler T, Judas J, Fridrich J. Minimizing Embedding Impact in Steganography Using Trellis-coded Quantization[C]//Proc. of SPIE’10. San Jose, USA: [s. n.], 2010.
  • 6Filler T, Fridrich J. Minimizing Additive Distortion Functions with Non-binary Embedding Operation in Steganography[C]//Proc. of the 2nd IEEE Workshop on Information Forensics and Security. New York, USA: [s. n.], 2010.
  • 7耿广志,张汗灵,熊彩琼.自适应的无损像素差分隐写算法[J].计算机工程,2009,35(23):136-137. 被引量:3
  • 8Bas P, Furon T. USDA NRCS Photo Gallery[EB/OL]. (2010-03- 12). http://photo gallery.nrcs.usda.gov.

二级参考文献14

  • 1张卫明,李信然,李世取.线性隐写码的性质与构造[J].工程数学学报,2007,24(3):547-550. 被引量:3
  • 2Wu Dachun, Tsai W H. A Steganographic Method for Images by Pixel Value Differencing[J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
  • 3Wu Hsien-Chu, Wu Nan, Tsai C S, et al. Image Steganographic Scheme Baged on Pixel Value Differencing and LSB Replacement Methods[J]. IEE Proceedings: Vision Image and Signal Processing,2005,152(5):611-615.
  • 4Lee Chih-Chiang, Wu Hsien-Chu, Tsai C S, et al. Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion[J]. Pattern Recognition, 2008, 41 (6): 2097-2106.
  • 5Tian Jun. Reversible Data Embedding Using a Difference Expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896.
  • 6Crandall R. Some notes on steganography, http://os.inf.tu- dresden.de/-westfeld/Crandall, pdf. 2007.12.
  • 7Westfeld A. F5-A steganography algorithm[C]. Proc.4th International Workshop on Information Hiding, Lecture Notes in Computer Science, 2001, Vol.2137: 289-302.
  • 8Tseng Y, Chen Y, and Pan H. A secure data hiding scheme for binary images[J]. IEEE Transactions on Communications, 2002, 50(8): 1227-1231.
  • 9Fridrich J, Goljan M, and Lisonek P, et al.. Writing on wet paper[J]. IEEE Transactions on Signal Processing, Third Supplement on Secure Media, 2005, 53: 3923-3935.
  • 10Rifa-Pous H and Rifa J. Product perfect codes and steganography[J]. Digital Signal Processing, 2009, 19(4): 764-769.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部