期刊文献+

高效±k自适应图像隐写术 被引量:8

An Efcient Adaptive Image Steganographic Method for ± k Embedding
在线阅读 下载PDF
导出
摘要 自适应隐写可避免修改载体的敏感区域,有效提高隐写术的安全性.总结分析了现有自适应隐写的边信息同步方法.通过推广单调纹理函数思想,构造一种基于自由度的纹理保序函数,实现了自适应隐写边信息的快速同步.结合湿纸编码和多层嵌入思想,提出自适应±1和±2隐写算法.新算法既保证通信双方能快速同步边信息,同时具有很高的抗检测性能.理论分析和实验结果均表明了算法的有效性. Adaptive steganography which avoids changing the sensitive area in carrier, can effectively improve the security of steganography. Firstly, the schemes of side information synchronization in adaptive steganography are summarized and analyzed. Secondly, using the freedom degree which is extented by the previous one-way texture functions, a new order- preserving texture function as side information of adaptive steganography is constructed. Finally, by combining wet paper codes and the method of multi-layered embedding, ±1 algorithm and ±2 algorithm are proposed. The proposed scheme can efficiently enhance the security of adaptive steganography while maintaining fast side information synchronization between communicators. Theoretical analysis and experimental results show the efficiency of the proposed scheme.
出处 《自动化学报》 EI CSCD 北大核心 2013年第10期1594-1601,共8页 Acta Automatica Sinica
基金 国家自然科学基金(60803155 61170234 60970141 60902102 61274133) 郑州市科技创新团队项目(10CXTD150) 中国科学院战略性先导专项课题(XDA06030601) 国家重大科技专项(2010ZX03004003)资助~~
关键词 信息隐藏 隐写术 自适应隐写 湿纸编码 边信息 Information hiding, steganography, adaptive steganography, wet paper coding, side information
  • 相关文献

参考文献19

  • 1程卫东,黄继武,刘红梅.一种基于3D-DCT的彩色图像信息隐藏算法(英文)[J].自动化学报,2003,29(2):258-266. 被引量:6
  • 2Filler T,Fridrich J.Design of adaptive steganographic schemes for digital images.In:Proceedings of the 8th Electronic Imaging,Media Watermarking,Security,and Forensics.San Francisco,CA:SPIE,2011.1-14.
  • 3Fridrich J,Kodovsky J,Goljan M,Holub V.Steganalysis of content-adaptive steganography in spatial domain.In:Proceedings of the 13th International Conference on Information Hiding.Prague,Czech Republic:LNCS,2011.102-117.
  • 4Fridrich J,Goljan M,Lisonek P,Soukal D.Writing on wet paper.IEEE Transactions on Signal Processing,2005,53(10):3923-3935.
  • 5Filler T,Judas J,Fridrich J.Minimizing embedding impact in steganography using trellis-coded quantization.In:Proceedings of the 7th Electronic Imaging,Media Forensics and Security.San Jose,USA:SPIE,2009.1-14.
  • 6Lu Y F,Li X L,Yang B.A secure steganography:noisy region embedding.In:Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Kyoto,Japan:IEEE,2009.1046-1051.
  • 7Zhang X P,Wang S Z.Steganography using multiple-base notational system and human vision sensitivity.IEEE Signal Processing Letters,2005,12(1):67-70.
  • 8Singh Kh M,Singh L S,Singh A B,Devi Kh S.Hiding secret message in edges of the image.In:Proceedings of the 2007 International Conference on Information and Communication Technology.Dhaka,Bangladesh:IEEE,2007.238-241.
  • 9Yang C H,Weng C Y,Wang S J,Sun H M.Adaptive data hiding in edge areas of images with spatial LSB domain systems.IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
  • 10Luo W Q,Huang F J,Huang J W.Edge adaptive image steganography based on LSB matching revisited.IEEE Transactions on Information Forensics and Security,2010,5(2):201-214.

二级参考文献10

  • 1Raymond B Wolfgang, Christine IPodilchuk, Edward J Delp. Perceptual watermarks for digital images and video. Proceedingsof the IEEE, 1999, 87(7):1108~1126
  • 2Ingemar J Cox, Joe Kilian, F Thomson Leigton, Taial Shamoon. Secure spread spectrumwatermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6(12):1673~1687
  • 3Christine I Podilchuk, Wen-Jun Zeng. Image-adaptive watermarking using visualmodels. IEEE Journal on Selected Areas in Communication, 1998, 16(4):525~539
  • 4Inoue H, Miyazaki A, Yamamoto A, Katsura T. A digital watermark based on thewavelet transform and its robustness on image compression. In: Proceedings of IEEEInternational Conference on Image Processing, Piscatway: IEEE Press, 1998, I: 391~395
  • 5Min-Jen Tsai, Kuang-Yao Yu, Yi-Zhang Chen. Joint wavelet and spatial transformationfor digital watermarking. IEEE Transactions on Consumer Electronics, 2002, 46(1):241~245
  • 6Chu Chee-Hung Henry, Wiltz Anthony Wayne. Luminance channel modulated watermarkingof digital images. In: Proceedings of SPIE 1999 Wavelet Application VI, Washington:SPIEPress, 1999,3723:437~445
  • 7Kim H-S, Lee H-K, Lee H-Y, Ha Y-H. Digital watermarking based on color differences.In: Proceedings of SPIE Security and Watermarking of Multimedia Contents III,Washington:SPIE Press, 2001,4314:10~17
  • 8Piva A, Bartolinin F, Cappellini V, Barni M. Exploiting the cross-correlation ofRGB-channels for robust watermarking of color images. In: Proceedings of IEEE 1999International Conference on Image Processing, Piscatway:IEEE Prese,1999,1:306~310
  • 9Ji-Wu Huang, Yun Q Shi, Yi Shi. Embedding image watermarks in DC components. IEEETransactions on Circuits and Systems for Video Technology, 2000, 10(6): 974~979
  • 10J-F Delaigle, C De Vleeschouwer, B Macq. Watermarking algorithm based on a humanvisual model. Signal Processing, 1998, 66(3): 319~335

共引文献5

同被引文献88

  • 1林永和.基于IP技术的端对端通信网络安全模型分析设计[J].微计算机信息,2005,21(10X):1-2. 被引量:16
  • 2刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法[J].计算机工程,2006,32(17):230-232. 被引量:10
  • 3董敏,王向阳.基于模糊聚类的小波域数字图像水印算法[J].计算机应用研究,2007,24(6):194-196. 被引量:8
  • 4吴成宾,朱彬.基于MQ的文件分片传输系统的设计与实现[J].电子科技大学学报,2007,36(3):646-648. 被引量:5
  • 5HAMIDREZA R K, BAHRAM N. A Novel Image Steganogra- phy Scheme with High Embedding Capacity and Tunable Vi- sual Image Quality Based on a Genetic Algorithm[J]. Expert Systems with Applications, 2014,41(14) :6123-6130.
  • 6RATNAKIRTI R, ANIRBAN S, SUVAMOY C. Chaos Based Edge Adaptive Image Steganography[J]. Procedia Technology, 2013,15(10) : 138-146.
  • 7TAN Shun-quan, LI Bin. Targeted Steganalysis of Edge Adap- tive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting[J]. IEEE Signal Process Lett, 2012, 19 (10) : 1204-1212.
  • 8WANG Zhi-hui, CHANG Chin-chen, LI Ming-chu. A Simple Image Encoding Method with Data Lossless Information Hiding[J].Journal of Networks, 2011,6 (3) : 400-407.
  • 9LEE C W. Efficient Bit Rate Control Method for Distributed Video Coding System[J]. Eurasip Journal on Advances in Signal Processing, 2012,12( 1 ) : 1-12.
  • 10SAKKARA S, AKKAMAHADEVI D H, SOMASHEKAR K. Integer Wavelet Based Secret Data Hiding by Selecting Variable Bit Length[J]. International Journal of Computer Applications, 2012,48(19) : 7-11.

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部