期刊文献+

结合快速编码的F5隐写算法改进 被引量:1

Improvement of F5 algorithm combined with fast coding
在线阅读 下载PDF
导出
摘要 数字图像隐写是隐秘通信的重要手段,其中Westfeld提出的F5隐写算法是在DCT域中比较好的算法。详细介绍了F5隐写算法的主要步骤,重点分析了F5算法中所采用的矩阵编码及秘密信息的密写方式,指出了其中的缺陷,并且分析了其缺陷产生的原因。在此基础上,使用修改率更低的快速编码取代原有的矩阵编码并改变其秘密信息的密写方式。实验表明,改进算法在安全性和嵌入容量上有了提高。 Digital steganography is an important way for secret communication, and F5 stegano- graphic algorithm proposed by Westfeld is an excellent steganography in DCT domain. The main steps of F5 steganographic algorithm is introduced, the matrix encoding and embedding process are analyzed. Its defects are pointed out and the caution is analyzed. Then the original matrix encoding of F5 stegano- graphic algorithm is replaced by fast coding which has a lower rate of modification, and the original em- bedding process is also changed. Experiments show that the new improved algorithm has improvement in both security and capacity.
出处 《计算机工程与科学》 CSCD 北大核心 2013年第8期46-51,共6页 Computer Engineering & Science
基金 陕西省自然科学基金基础研究项目(2012JM8014) 武警工程大学基础研究基金资助计划(WJY201123)
关键词 F5隐写算法 安全性 矩阵编码 快速编码 密写方式 F5 steganographic algorithm security matrix encoding fast coding embedding mode
  • 相关文献

参考文献12

  • 1Ker A D. Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters, 2005, 12(6) :441-444.
  • 2Kim Y, Duric Z, Richards D. Modified matrix encoding tech- nique for minimal distortion steganography[C]//Proc of the 8th Information Hiding, 2006 : 314-327.
  • 3Provos N. OutGuess[EB/OL]. [2012-10-01]. http://www. outguess org.
  • 4Westfeld A. FS-A steganographic algorithm:High capacity de- spite better steganalysis[C]//Proc of the 4th International Workshop on Information Hiding,2001:289-302.
  • 5Crandall R. Some notes on steganography [EB/OL]. [1998- 05-20]. http://os, inf. tu2dresden, de/-westfeld/Crandall, pdf.
  • 6Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG ima- ges: Breaking the F5 algorithm[C]//Proc of the 5th Infor- mation Hiding Workshop, 2002 : 7-9.
  • 7Liu Fen-lin, Liu Jiu-fen, Luo Xiang-yang, et al. Digital im- age steganalysis[M]. Beijing: China Machine Press, 2010.
  • 8FU Yu,ZHANG Ru,MA Song-ya,QU Zhi-guo NIU Xin-xin YANG Yi-xian.Fast coding in digital steganography[J].The Journal of China Universities of Posts and Telecommunications,2009,16(6):92-96. 被引量:1
  • 9Fu Yu. Research on the security and optimization of steg- anography algorithm[D]. Beijing:Beijing University of Posts and Telecommunications, 2010.
  • 10Zhang X P, Wang S. Dynamical running coding in digital steganography[J]. IEEE Signal Processing Letters, 2006, 13(3) : 165-168.

二级参考文献6

  • 1Westfeld A. High capacity despite better steganalysis (F5-A steganographic algorithm). Proceedings of the 4th Intemational Workshop on Information Hiding (II4W'O1), Apr 25-27, 2001, Pittsburgh, PA, USA. LNCS 2137. Berlin, Germany: Springer-Verlag, 2001:289-302.
  • 2Fridricb J, Goljan M, Lisonek P, et al. Writing on wet paper. IEEE Transcriptions on Signal Processing, 2005, 53(10-2): 3923-3935.
  • 3Zhang X P, Wang S Z. Dynamical running coding in digital steganography. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
  • 4Ker A D. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 2005, 12 (6): 441-444.
  • 5Wang H Q, Wang S Z. Cyber warfare: steganography vs steganalysis. Communication of the ACM, 2004, 47(10): 76-82.
  • 6Fridrich J, Soukal D. Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390-394.

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部