期刊文献+

改进的信息隐藏的信息论理论模型 被引量:3

Updated Information-theoretic Model of Information-hiding
在线阅读 下载PDF
导出
摘要 分析了已知信息隐藏系统的通信模型,提出了建立在信息论基础上的理论新模型,得出了无攻击情况下隐藏容量的证明,并对该模型进行了讨论。新模型重点考虑了信息隐藏系统实际存在的鲁棒性,全面综合了信息隐藏的嵌入、检测和攻击模型,对以往信息隐藏理论模型中没有考虑检测模型做出了改进。 In this paper,the author analyze the already communication model of information-hiding system,and intro-duce the own theoretic model based on information theory.Then the author give a proof of the hiding capacity under the condition of no attack,and discuss the characteristic of the model.This model think about more the real exist robust of information-hiding system,and entirely colligate embedding,testing and attacking model in one.It improve on already information-hiding theoretic model which don't consist of testing model.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第6期34-36,50,共4页 Computer Engineering and Applications
基金 国家重点基础研究发展规划项目(编号:TG1999035804) 国家自然基金项目(编号:60073049)
关键词 信息隐藏 理论模型 隐藏容量 information-hiding,theoretic model,hiding capacity
  • 相关文献

参考文献6

  • 1[1]I J Cox,M L Miller,A L Mckellips. Watermarking as communications with side information[J].PROCEEDINGS OF THE IEEE,1999;87(7):1121~1141
  • 2[2]M H M Costa. Writing on dirty paper[J].IEEE Transactions on Information Theory, 1983 ;29:439~441
  • 3[3]P Moulin,Joseph A O'Sullivan. Information-Theoretic Analysis of Information Hiding[J].IEEE TRANSACTIONS ON INFORMATION THEORY,2003 ;49(3)
  • 4[4]P Moulin, A Briassouli, H Malvar. Detection-Theoretic Analysis of Desynchronization Attacks in Watermarking[J].IEEE,2002
  • 5[5]A Briassouli,P Moulin. Detection-theoretic analysis of warping attacks in spread-spectrum watermarking.available at http://www.ifp.uiuc.edu/~moulin/paper.html
  • 6[6]C Cachin. An Information-Theoretic Model for Steganography[C].In:D Aucsmith ed. Proceedings of 2nd Workshop on Information Hiding,Lecture Notes in Computer Science,Springer, 1998

同被引文献31

  • 1伍宏涛,朱柏承,杨义先.数字水印的二进制对称信道容量理论[J].北京邮电大学学报,2005,28(z1):26-30. 被引量:3
  • 2DAIYuan-jun,ZHANGLi-he,YANGYi-xian.Digital Watermarking Applied To MEPG-2 Coded Video Sequences Exploiting Motion Vector[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):35-39. 被引量:6
  • 3PETITCOLAS F,ANDERSON R,KUHN M.Information hiding--a survey[J].Proceedings of IEEE,1999,87(8):1062-1078.
  • 4SWANSON M D,KOBAYASHI M,TEWFIK A H.Multimedia data embedding and watermarking technologies[J].Proceedings of IEEE.1998,86(6):1064-1087.
  • 5PINHO A J,NEVES A J R.A note on Zeng's technique for color reindexing of palette-based images[J].IEEE Signal Processing Letters,2004,11(2):232-234.
  • 6FRIDRICH J,DU Dui.A new steganographic method for palette-based image[A].Proceedings of IS&T PICS Conference[C].Savannah(GA,USA),1999.285-289.
  • 7FRIDRICH J,DU Dui.Secure steganographic method for palette images[A].Proceedings of 3rd Int Workshop on Information Hiding[C].Dresden(Germany),1999.Berlin(Germany):Springer Verlag Press,1999.47-66.
  • 8HONSINGER C W,JONES P,RABBANI M,et al.Lossless recovery of an original image containing embedded data[P].USP 77102/E-D,1999.
  • 9GOLJAN M,FREDRICH J,DU R.Distortion-free data embedding for images[A].Proceedings of the 4th Int workshop on Information Hiding[C].Pittsburgh(PA,USA),2001.Berlin(Germay):Springer Verlag Press,2001.
  • 10LIU Hong-mei,ZHANG Zhe-feng,HUANG Ji-wu,et al.A high capacity distortion-free data hiding algorithm for palette image[A].Proceedings of the 2003 International Symposium on Circuits and Systems,Vol 2[C].Bangkok(Thailand),2001.Piscataway(NJ,USA):IEEE Press,2003.916-919.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部