期刊文献+
共找到49篇文章
< 1 2 3 >
每页显示 20 50 100
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:11
1
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
在线阅读 下载PDF
Coverless Steganography for Digital Images Based on a Generative Model 被引量:5
2
作者 Xintao Duan Haoxian Song +1 位作者 Chuan Qin Muhammad Khurram Khan 《Computers, Materials & Continua》 SCIE EI 2018年第6期483-493,共11页
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ... In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability. 展开更多
关键词 Generative model coverless image steganography STEGANALYSIS steganographic capacity security.
在线阅读 下载PDF
Coverless Image Steganography Based on Image Segmentation 被引量:3
3
作者 Yuanjing Luo Jiaohua Qin +3 位作者 Xuyu Xiang Yun Tan Zhibin He Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第8期1281-1295,共15页
To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based... To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based on whole feature mapping,which has poor robustness when facing geometric attacks,because the contents in the image are easy to lost.To solve this problem,we use ResNet to extract semantic features,and segment the object areas from the image through Mask RCNN for information hiding.These selected object areas have ethical structural integrity and are not located in the visual center of the image,reducing the information loss of malicious attacks.Then,these object areas will be binarized to generate hash sequences for information mapping.In transmission,only a set of stego-images unrelated to the secret information are transmitted,so it can fundamentally resist steganalysis.At the same time,since both Mask RCNN and ResNet have excellent robustness,pre-training the model through supervised learning can achieve good performance.The robust hash algorithm can also resist attacks during transmission.Although image segmentation will reduce the capacity,multiple object areas can be extracted from an image to ensure the capacity to a certain extent.Experimental results show that compared with other coverless image steganography methods,our method is more robust when facing geometric attacks. 展开更多
关键词 coverless steganography semantic feature image segmentation Mask RCNN ResNet
在线阅读 下载PDF
Coverless Image Steganography Based on Jigsaw Puzzle Image Generation 被引量:3
4
作者 Al Hussien Seddik Saad M.S.Mohamed E.H.Hafez 《Computers, Materials & Continua》 SCIE EI 2021年第5期2077-2091,共15页
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these ... Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload.A coverless data hiding concept is proposed to solve this issue.Coverless does not mean that cover is not required,or the payload can be transmitted without a cover.Instead,the payload is embedded by cover generation or a secret message mapping between the cover file and the payload.In this paper,a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message.Firstly,the image is divided into equal rows then further divided into equal columns,creating blocks(i.e.,sub-images).Then,according to secret message bits and a proposed mapping function,each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image.After that,the generated jigsaw puzzle image is sent to the receiver.Experimental results and analysis show a good performance in the hiding capacity,security,and robustness compared with existing coverless image steganography methods. 展开更多
关键词 coverless information hiding Jigsaw puzzle image image steganography data hiding
在线阅读 下载PDF
Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography 被引量:2
5
作者 Yun Tan Jiaohua Qin +3 位作者 Hao Tang Xuyu Xiang Ling Tan Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第9期1797-1817,共21页
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet a... With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet and coverless steganography.For a given group of medical images of one patient,DenseNet is used to regroup the images based on feature similarity comparison.Then the mapping indexes can be constructed based on LBP feature and hash generation.After mapping the privacy information with the hash sequences,the corresponding mapped indexes of secret information will be packed together with the medical images group and released to the authorized user.The user can extract the privacy information successfully with a similar method of feature analysis and index construction.The simulation results show good performance of robustness.And the hiding success rate also shows good feasibility and practicability for application.Since the medical images are kept original without embedding and modification,the performance of crack resistance is outstanding and can keep better quality for diagnosis compared with traditional schemes with data embedding. 展开更多
关键词 Privacy protection medical image coverless steganography DenseNet LBP
在线阅读 下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:5
6
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
在线阅读 下载PDF
Coverless Text Hiding Method Based on Improved Evaluation Index and One-Bit Embedding 被引量:1
7
作者 Ning Wu Yi Yang +4 位作者 Lian Li Zhongliang Yang Poli Shang Weibo Ma Zhenru Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第9期1035-1048,共14页
In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation i... In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation index and onebit embedding coverless text steganography method.In the steganography process,this method did not simply take the transition probability as the optimization basis of the steganography model,but combined it with the sentence length in the corresponding nodes in the model to gauge sentence quality.Based on this,only two optimal conjunctions of the current words are retained in the method to generate sentences of higher quality.Because the size of the training text dataset is generally large,this leads to higher complexity of the steganographic model;hence,fewer repetitions of the generated steganographic sentences occur.Different datasets and methods were selected to test the quality of the model.The results indicate that our method can achieve higher hiding capacity and has better concealment capability. 展开更多
关键词 coverless text steganography Markov chain evaluation index onebit embedding
在线阅读 下载PDF
Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping 被引量:1
8
作者 Runze Li Jiaohua Qin +1 位作者 Yun Tan Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第10期1571-1583,共13页
Most existing coverless video steganography algorithms use a particular video frame for information hiding.These methods do not reflect the unique sequential features of video carriers that are different from image an... Most existing coverless video steganography algorithms use a particular video frame for information hiding.These methods do not reflect the unique sequential features of video carriers that are different from image and have poor robustness.We propose a coverless video steganography method based on frame sequence perceptual distance mapping.In this method,we introduce Learned Perceptual Image Patch Similarity(LPIPS)to quantify the similarity between consecutive video frames to obtain the sequential features of the video.Then we establish the relationship map between features and the hash sequence for information hiding.In addition,the MongoDB database is used to store the mapping relationship and speed up the index matching speed in the information hiding process.Experimental results show that the proposed method exhibits outstanding robustness under various noise attacks.Compared with the existing methods,the robustness to Gaussian noise and speckle noise is improved by more than 40%,and the algorithm has better practicability and feasibility. 展开更多
关键词 coverless steganography frame sequence perception distance
在线阅读 下载PDF
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
9
作者 Jiajun Liu Lina Tan +3 位作者 Zhili Zhou Weijin Jiang Yi Li Peng Chen 《Computers, Materials & Continua》 SCIE EI 2024年第11期3221-3240,共20页
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images st... Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images stored in the database grows exponentially.This makes it challenging to build and manage a large image database.To improve the image library utilization and anti-attack capability of the steganography system,we propose an efficient coverless scheme based on dynamically matched substrings.We utilize You Only Look Once(YOLO)for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.Using this dictionary,each image is effectively assigned to a specific scrambling factor,which is then used to scramble the receiver’s sequence key.To achieve sufficient steganography capability with a limited image library,all substrings of the scrambled sequences have the potential to hide data.After matching the secret information,the ideal number of stego images will be obtained from the database.According to experimental results,this technology outperforms most previous works in terms of data load,transmission security,and hiding capacity.It can recover an average of 79.85%of secret information under typical geometric attacks,and only approximately 200 random images are needed to achieve a capacity of 19 bits per image. 展开更多
关键词 coverless STEGANOGRAPHY object detection YOLO
在线阅读 下载PDF
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
10
作者 Al-Hussien Seddik Mohammed Salah +5 位作者 Gamal Behery Ahmed El-harby Ahmed Ismail Ebada Sokea Teng Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2023年第3期5087-5103,共17页
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t... The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods. 展开更多
关键词 coverless steganography data hiding information security QR code maze game
在线阅读 下载PDF
Coverless Image Steganography System Based on Maze Game Generation
11
作者 Al Hussien Seddik Saad Mohammed S.Reda +4 位作者 GamalM.Behery Ahmed A.El-harby Mohammed Baz Mohamed Abouhawwash Ahmed Ismail Ebada 《Intelligent Automation & Soft Computing》 2023年第11期125-138,共14页
The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data ... The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data concealing has been suggested by researchers called coverless steganography.Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image.This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems.The system uses the secret message to generate the stego image in the form of one of the Intelligence Quotient(IQ)games,the maze.Firstly,a full grid is generated with several specific rows and columns determined from the number of bits of the secret message.Then,these bits are fed to the full grid to form the maze game stego image.Finally,the generated maze game stego image is sent to the recipient.The experimental results,using the Bit Error Rate(BER),were conducted,and confirmed the strength of this system represented by a high capacity,perfect performance,robustness,and stronger hiding system compared with existing coverless steganography systems. 展开更多
关键词 coverless data hiding digital image steganography intelligence quotient games maze game
在线阅读 下载PDF
A Robust joint coverless image steganography scheme based on two independent modules
12
作者 Chang Ren Bin Wu 《Cybersecurity》 2026年第1期234-254,共21页
With the development of deep learning technology,great progress has been made in the feld of coverless steganography based on deep learning technology,including some selection-based steganography methods that use deep... With the development of deep learning technology,great progress has been made in the feld of coverless steganography based on deep learning technology,including some selection-based steganography methods that use deep learning technology and all generation-based steganography methods,however both of which have their limitations.The former is difcult to meet actual communication requirements in terms of communication capacity and completeness due to the limit of the algorithm.Due to the irreversibility of the process of generating secret images from message codeword,the recovery accuracy of the latter is very poor.To this end,this paper designs a robust joint coverless image steganography scheme called Joint Coverless Image Steganography(JoCS).Firstly,this paper proposes the Semantic Factorization Fitting module(SeFF)and the Transform Domain Steganography module(TrDS).The former adds the secret message to the input vector of the low resolution layer in the StyleGAN generator network,which establishs a mapping rule between message codeword and the coarse feature of the generated image,and then the extractor is used to ft the above mapping rule,which has excellent robustness and completeness;the latter encodes the main content area of the image based on the encoder in VQGAN,and then adds secret message to the latent vector of the encoded image,which achieves the steganography in the latent domain of the image.Secondly,we demonstrate the independence between two modules and the advantages of connecting two modules.By using the image generated in the SeFF module as the cover image in the TrDS module,secondary steganography of a single image is achieved,based on which we design the JoCS scheme.The results show that our scheme breaks through the communication capacity limit in the selection-based coverless methods while guaranteeing 100%completeness,excellent image quality and outstanding robustness against various image attacks.Moreover,our scheme exhibits strong security against detection by multiple steganalysis tools and excellent practicality in practical communication.Finally,this paper also discusses the following three points as further elaboration of the scheme:(1)the advantages of the mapping rule in the SeFF module(2)the verifcation of the independence between the two modules(3)the fexibility of the joint steganography scheme. 展开更多
关键词 Selection-based and generation-based coverless steganography Generative adversarial network STEGANALYSIS Joint steganography
原文传递
结合三角剖分和贝塞尔曲线的石头画生成式信息隐藏方法
13
作者 任致毅 邵利平 《计算机工程》 北大核心 2026年第1期314-327,共14页
相对于自然载体无载体信息隐藏,非自然载体无载体信息隐藏不试图生成或利用自然载体来隐藏秘密信息,可从根本上杜绝自然载体判别问题。但在现有的非自然载体无载体信息隐藏方法中,水影画嵌密无法对秘密信息进行有效掩盖,分形嵌密需满足... 相对于自然载体无载体信息隐藏,非自然载体无载体信息隐藏不试图生成或利用自然载体来隐藏秘密信息,可从根本上杜绝自然载体判别问题。但在现有的非自然载体无载体信息隐藏方法中,水影画嵌密无法对秘密信息进行有效掩盖,分形嵌密需满足整体与局部自相似的严苛数学约束。为对秘密信息进行有效掩盖并进一步提升视觉质量,采用自然图像矢量化的方式,提出一种结合三角剖分和贝塞尔曲线嵌密的石头画生成式信息隐藏方法。首先,将前景区域三角剖分,剔除不适合嵌密和不保持掩体前景特征的三角区域;其次,产生表征秘密比特且与给定三角区域相内切的石头轮廓,并填充与三角区域、密钥、嵌密比特一致的随机颜色,从而产生石头画;最后,基于密钥产生一致的三角区域,提取秘密比特并进行颜色认证。理论和实验结果表明,该方法可产生与掩体图像轮廓特征一致的富含语义的石头画,且不暴露嵌密特征,同时可对秘密信息进行有效掩盖,特征提取严格依赖于密钥,可对提取的秘密比特进行高精度的颜色认证,未知密钥将无法获取秘密信息。 展开更多
关键词 无载体信息隐藏 三角剖分 贝塞尔曲线 颜色认证 石头画
在线阅读 下载PDF
基于字符识别的无载体隐写
14
作者 鲁桢 吴建斌 《应用科学学报》 北大核心 2025年第4期684-693,共10页
为提高无载体隐写的隐藏容量,注意到半构造式方法的特点,本文采用英汉谚语翻译构造原则,结合深度学习方法,提出并实现了一种利用汉字字符小图标作为构造元素的无载体隐写方法。构建汉字字符小图标载体库,设计小图标与二进制流之间一一... 为提高无载体隐写的隐藏容量,注意到半构造式方法的特点,本文采用英汉谚语翻译构造原则,结合深度学习方法,提出并实现了一种利用汉字字符小图标作为构造元素的无载体隐写方法。构建汉字字符小图标载体库,设计小图标与二进制流之间一一映射的关系。在发送端将输入的秘密消息按照12 bits进行分组,从载体库中寻找对应的汉字小图标拼接成含密载体图像。在接收端,对含密载体图像进行分割,利用深度学习方法识别载体图像中的汉字,根据汉字与二进制流之间的映射关系,实现秘密消息的提取。此外,为了提高该方案的鲁棒性,引入了数据增强方法人工合成文本图像数据集。实验和测试结果表明,与同类无载体隐写方法相比,该方法大大提升了隐藏容量,并且具有良好的鲁棒性。 展开更多
关键词 无载体隐写 半构造式 隐藏容量 深度学习
在线阅读 下载PDF
基于DWT编码的纹理合成式无载体信息隐藏
15
作者 安鹤松 任俊玲 《计算机应用文摘》 2025年第21期90-92,95,共4页
为提高信息隐藏的安全性与鲁棒性,提出了一种基于离散小波变换(DWT)编码的纹理合成式无载体信息隐藏方法。DWT作为一种多尺度图像分析工具,能够有效提取图像的多频率成分。该方法将DWT与纹理合成技术相结合,在小波分解后的低频子带中嵌... 为提高信息隐藏的安全性与鲁棒性,提出了一种基于离散小波变换(DWT)编码的纹理合成式无载体信息隐藏方法。DWT作为一种多尺度图像分析工具,能够有效提取图像的多频率成分。该方法将DWT与纹理合成技术相结合,在小波分解后的低频子带中嵌入秘密信息,不仅增强了信息隐藏的鲁棒性,还保证了图像的高质量视觉效果。 展开更多
关键词 无载体信息隐藏 纹理合成 DWT
在线阅读 下载PDF
基于图像Bag-of-Words模型的无载体信息隐藏 被引量:49
16
作者 周志立 曹燚 孙星明 《应用科学学报》 CAS CSCD 北大核心 2016年第5期527-536,共10页
介绍一种基于bag-of-words(BOW)模型的无载体信息隐藏方法.该方法使用BOW模型提取图像的视觉关键词(visual words,VW)以表达待隐藏的文本信息,从而实现文本信息在图像中的隐藏.首先使用BOW模型提取图像集中每幅图像的VW,构建文本信息的... 介绍一种基于bag-of-words(BOW)模型的无载体信息隐藏方法.该方法使用BOW模型提取图像的视觉关键词(visual words,VW)以表达待隐藏的文本信息,从而实现文本信息在图像中的隐藏.首先使用BOW模型提取图像集中每幅图像的VW,构建文本信息的关键词和VW的映射关系库;然后把每幅图像分为若干子图像,统计每一幅子图像的VW频数直方图,选择频数最高的VW表示该子图像;最后根据构建的文本关键词和子图像VW的映射关系库,搜索出与待隐藏文本信息存在映射关系的子图像序列,将含有这些子图像的图像作为含密图像进行传递.实验结果和分析表明,该隐藏算法在抗隐写分析、鲁棒性和安全性方面均有良好的表现. 展开更多
关键词 无载体信息隐藏 BAG of words模型 视觉词汇 图像搜索
在线阅读 下载PDF
基于深度学习的图像隐写研究进展 被引量:14
17
作者 付章杰 李恩露 +2 位作者 程旭 黄永峰 胡雨婷 《计算机研究与发展》 EI CSCD 北大核心 2021年第3期548-568,共21页
图像隐写是信息安全领域的研究热点之一.早期隐写方法通过修改载体图像获得含密图像,导致图像统计特性发生变化,因此难以抵抗基于高维统计特征分析的检测.随着深度学习的发展,研究者们提出了许多基于深度学习的图像隐写方法,使像素修改... 图像隐写是信息安全领域的研究热点之一.早期隐写方法通过修改载体图像获得含密图像,导致图像统计特性发生变化,因此难以抵抗基于高维统计特征分析的检测.随着深度学习的发展,研究者们提出了许多基于深度学习的图像隐写方法,使像素修改更隐蔽、隐写过程更智能.为了更好地研究图像隐写技术,对基于深度学习的图像隐写方法进行综述.首先根据图像隐写过程,从3个方面分析了基于深度学习的图像隐写方法:1)从生成对抗网络和对抗样本2个角度介绍载体图像获取方法;2)分析基于深度学习的隐写失真设计方法;3)阐述基于编码解码网络的含密图像生成方法.然后,分析和总结了无载体图像隐写方法的优缺点,该类方法无需载体图像即可实现图像隐写,因此在对抗统计分析方面存在天然优势.最后,在深入分析与总结基于深度学习的图像隐写与无载体图像隐写2类方法优缺点的基础上,对图像隐写的发展方向进行了探讨与展望. 展开更多
关键词 图像隐写 深度学习 生成对抗网络 对抗样本 无载体图像隐写
在线阅读 下载PDF
基于同义词扩展和标签传递机制的文本无载体信息隐藏方法 被引量:3
18
作者 张祯 倪嘉铭 +3 位作者 姚晔 龚礼春 王玉娟 吴国华 《通信学报》 EI CSCD 北大核心 2021年第9期173-183,共11页
为了解决传统文本信息隐藏方法隐藏容量低、抗检测性弱等问题,提出一种基于同义词扩展和标签传递机制的文本无载体信息隐藏方法。该方法将秘密信息切分成若干个关键词,分别嵌入不同的文本载体中。考虑到汉语中同义词的可替换性,使用基... 为了解决传统文本信息隐藏方法隐藏容量低、抗检测性弱等问题,提出一种基于同义词扩展和标签传递机制的文本无载体信息隐藏方法。该方法将秘密信息切分成若干个关键词,分别嵌入不同的文本载体中。考虑到汉语中同义词的可替换性,使用基于知网的词语相似度计算方法筛选符合上下文语义的同义词,尽可能将不同的关键词或其同义词嵌入同一文本中,以此来提升隐藏容量。同时,记录每篇文本中所有被隐藏关键词的标签信息,将其按固定格式转换为二进制序列,作为秘密信息生成载体文本。最后,将自然载体文本和生成载体文本一起发送给接收方完成秘密通信。实验结果表明,所提方法的隐藏容量与传统方法相比有了较大的提升,具有较强的抗检测能力,使用小型载体文本数据库即可实现完整的信息隐藏和提取,减少了建立和维护索引数据库的开销。 展开更多
关键词 隐蔽通信 无载体信息隐藏 关键词扩展 标签传递机制
在线阅读 下载PDF
一种可信任的大容量无载体信息隐藏方案 被引量:3
19
作者 杜耀刚 杨自力 +1 位作者 张艳硕 王泽豪 《计算机应用与软件》 北大核心 2021年第9期315-321,共7页
提出一种以线性码原理和混沌映射理论为基础的无载体信息隐藏方案。通过提取图像的像素矩阵,利用线性码原理和混沌映射理论先后对矩阵信息作可验证处理和加密处理,最后通过一系列变换建立图像与密文信息的对应关系,从而实现无载体信息... 提出一种以线性码原理和混沌映射理论为基础的无载体信息隐藏方案。通过提取图像的像素矩阵,利用线性码原理和混沌映射理论先后对矩阵信息作可验证处理和加密处理,最后通过一系列变换建立图像与密文信息的对应关系,从而实现无载体信息隐藏。实验和分析表明,该方案保证了信息的安全性,增强了随机性,同时具有可验证性,这使得提出的信息隐藏方案是可信任的。另外相比于其他方案,该方案的隐藏容量有了很大的提升,并且大大减少了信息库的存储资源消耗。 展开更多
关键词 无载体信息隐藏 线性码原理 混沌映射理论 可验证性
在线阅读 下载PDF
基于图像分类的无载体信息隐藏方法 被引量:5
20
作者 吴建斌 康子阳 +2 位作者 刘逸雯 閤双奎 吴建平 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2019年第12期25-32,共8页
为提高无载体信息隐藏的数据嵌入容量和通信效率,注意到半构造式无载体信息隐藏算法所具有的优势,在仔细分析几种社交平台的用户行为习惯后,提出了一种以社交平台的行为习惯为构造原则的半构造式无载体信息隐藏算法.该算法的具体思想通... 为提高无载体信息隐藏的数据嵌入容量和通信效率,注意到半构造式无载体信息隐藏算法所具有的优势,在仔细分析几种社交平台的用户行为习惯后,提出了一种以社交平台的行为习惯为构造原则的半构造式无载体信息隐藏算法.该算法的具体思想通过构建小图标库中的图标与秘密消息的一一映射关系,将小图标按照一定的原则拼接,完成秘密消息的图像表达,通过传递拼接好的图片,实现秘密消息的传递.为了提高小图标的识别率和整个隐蔽通信系统的抗干扰能力,算法还引入了卷积神经网络对图标库中的图标进行训练和分类,同时在训练时特意引入经过多种攻击方式处理过的小图标作为干扰样本.实验和仿真结果表明,该隐藏方法具备良好的抗攻击能力,隐藏容量和通信效率得到了实质性的提高,可用于实际的隐蔽通信系统. 展开更多
关键词 深度学习 图像分类 社交习惯 隐写 无载体信息隐藏
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部