期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
基于三次方程的LSB隐藏信息的盲检测 被引量:1
1
作者 陆佩忠 罗向阳 +2 位作者 汤庆阳 沈利 邹艳 《电子与信息学报》 EI CSCD 北大核心 2005年第3期392-396,共5页
该文提出基于最小平方策略以及导出的三次方程的检测最低有效位(LSB)隐藏信息容量的新算法。与Dumitrescu等人(2003)提出的方法比较,新算法具有下列优点:检测的前提条件更宽松、虚警概率更低(由13%降至4%左右),估计的精度提高约9%,... 该文提出基于最小平方策略以及导出的三次方程的检测最低有效位(LSB)隐藏信息容量的新算法。与Dumitrescu等人(2003)提出的方法比较,新算法具有下列优点:检测的前提条件更宽松、虚警概率更低(由13%降至4%左右),估计的精度提高约9%,而且检测速度更快。该文还给出了具体的检测步骤和相关的理论推导。 展开更多
关键词 信息隐藏 lsb 抽样对 最小二乘法 盲估计
在线阅读 下载PDF
基于改进逻辑回归分类算法的LSB匹配隐写检测
2
作者 郭继昌 季文驰 顾翔元 《数据采集与处理》 CSCD 北大核心 2015年第6期1160-1168,共9页
常见的采用高斯核支持向量机(Gaussian support vector machine,G-SVM)分类算法构建分类器的隐写检测方法对最低比特位(Least significant bit,LSB)匹配隐写算法均存在训练时间过长的问题。针对这一问题,提出一种改进逻辑回归分类算法,... 常见的采用高斯核支持向量机(Gaussian support vector machine,G-SVM)分类算法构建分类器的隐写检测方法对最低比特位(Least significant bit,LSB)匹配隐写算法均存在训练时间过长的问题。针对这一问题,提出一种改进逻辑回归分类算法,即L曲线截断正则化迭代重加权最小二乘(L-curve truncated-regularized iteratively re-weighted least squares,LTR-IRLS)算法。该算法采用L曲线法来确定适合于隐写特征的Tikhonov正则算法的近似最优参数,并通过实验寻找出符合隐写特征的截断牛顿算法收敛参数,从而提高了检测准确率;采用重加权最小二乘法计算最大似然估计,并通过截断牛顿法避免计算最小二乘中的海森矩阵,降低了计算量。理论分析与实验结果证明,针对LSB匹配隐写检测,LTR-IRLS分类算法在保证检测准确率优于G-SVM分类算法的情况下,极大地降低了训练时间,从而提高了检测速度。 展开更多
关键词 L曲线法 迭代重加权最小二乘 截断牛顿法 隐写检测 lsb匹配
在线阅读 下载PDF
High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security
3
作者 Wajdi Elhamzi Malika Jallouli Yassine Bouteraa 《Computers, Materials & Continua》 SCIE EI 2022年第11期4329-4347,共19页
Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our appro... Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain,allowing us to greatly expand the size of the watermark.After that,our method does two rounds of insertion,each applying a different type of Clifford-wavelet transform.Before being placed into the Clifford-multiwavelet coefficients,the watermark,which is a mixture of the mesh description,source mesh signature(produced using SHA512),and a logo encrypted using the RSA(Ronald Shamir Adleman)technique,is encoded using Turbo-code.Using the Least Significant Bit method steps,data embedding involves modulation and insertion processes.Finally,the watermarked mesh is reconstructed using the inverse Cliffordmultiwavelet transform.Due to the utilization of a hybrid insertion domain,our technique has demonstrated a very high insertion rate while retaining mesh quality.The mesh is watermarked,and the extracted data is acquired in real-time.Our approach is also resistant to the most common types of attacks.Our findings reveal that the current approach improves on previous efforts. 展开更多
关键词 Digital watermarking Clifford-multiwavelet transform Multiwavelet entropy lsb method RSA algorithm RSA algorithm Turbocode 3D multiresolution meshes
在线阅读 下载PDF
基于DWT密文域图像双水印算法 被引量:2
4
作者 张爱娈 李子臣 《计算机系统应用》 2021年第11期164-171,共8页
数字水印是保护数字版权的关键技术,本文首先给出双水印算法形式化的定义,然后基于小波变换(DWT)、SM4分组密码算法和Paillier同态密码,设计了一个密文域双水印算法.在嵌入水印时,将载体图像进行三重DWT变换,将频带集分为加密部分、水... 数字水印是保护数字版权的关键技术,本文首先给出双水印算法形式化的定义,然后基于小波变换(DWT)、SM4分组密码算法和Paillier同态密码,设计了一个密文域双水印算法.在嵌入水印时,将载体图像进行三重DWT变换,将频带集分为加密部分、水平高频LH3水印部分和垂直高频HL3水印部分.利用SM4分组密码和Paillier公钥密码分别对加密部分和水印部分频带系数加密,同时利用Paillier公钥密码体制对数字水印信息进行加密,利用最低有效位(LSB)方法,分别在LH3和HL3的密文域嵌入两个用户水印信息.最后DWT小波逆变换后生成含水印的密文图像.在水印提取时,由于Paillier具有同态特性,实现了在解密后的明文提取水印.实验结果表明,该算法具有加解密速度快,水印的不可见性好等特性. 展开更多
关键词 三重DWT SM4加密算法 Paillier同态密码 lsb嵌入方法
在线阅读 下载PDF
极坐标下的空域水印算法研究
5
作者 卢辉 孙劲光 《计算机工程与科学》 CSCD 2008年第6期62-65,共4页
由于空间域嵌入的水印对旋转和缩放攻击相当脆弱,本文提出一种新的水印算法。将原图像和水印图像进行对数极变换,将变换后的水印图像嵌入到变换后的原图像中,然后再反变换为直角坐标系下的图像。水印嵌入到图片的位置不同,检测的水印图... 由于空间域嵌入的水印对旋转和缩放攻击相当脆弱,本文提出一种新的水印算法。将原图像和水印图像进行对数极变换,将变换后的水印图像嵌入到变换后的原图像中,然后再反变换为直角坐标系下的图像。水印嵌入到图片的位置不同,检测的水印图像发生变化。本文提出三种嵌入位置的方案,显示不同的效果。检测水印时,对几何攻击过的水印进行几何校正,然后与原图像相减得到水印。这种水印方案能够很好地抵抗几何攻击。 展开更多
关键词 数字水印 对极坐标变换 lsb 几何攻击
在线阅读 下载PDF
Steganographic Technique Capable of Withstanding RQP Analysis 被引量:5
6
作者 王朔中 张新鹏 张开文 《Journal of Shanghai University(English Edition)》 CAS 2002年第4期273-277,共5页
A new steganographic approach for 24 bit color images that can resist the RQP(raw quick pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color palett... A new steganographic approach for 24 bit color images that can resist the RQP(raw quick pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color palette is not excessively expanded or even reduced. In this way, numbers of unique colors and pairs of close colors in the image do not rise significantly. This invalidates the RQP analysis. Experimental results are presented to support the argument. 展开更多
关键词 STEGANOGRAPHY STEGANALYSIS RQP method lsb embedding.
在线阅读 下载PDF
Which Bit Is Better in Least Significant Bit?
7
作者 Fatin E. M. Al-Obaidi Ali Jassim Mohamed Ali 《Journal of Information Security》 2015年第3期161-165,共5页
The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to... The weakness of Human Auditory System (HAS) led the audio steganography process to be used in hiding data in the digital sound. Audio steganography is implemented here by using Least Significant Bit (LSB) algorithm to hide message into multiple audio files. This is achieved by 1st, 2nd, 3rd, and 4th bits hiding ratios. In comparison to other used bits, hiding results show that the use of 1st bit in LSB method for embedding data is much better than those used bits as expected. In addition to that and according to the results, file’s size affects strongly upon the effectiveness of the embedding process while hiding starting position doesn’t affect upon the variation of the adopted statistical estimators regardless to which bit is used. Among the statistical estimators that have been adopted here, the Mean Absolute Error (MAE) seems to be the best one in testing hiding process. 展开更多
关键词 Audio STEGANOGRAPHY lsb method PSNR MAE
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部