期刊文献+
共找到47篇文章
< 1 2 3 >
每页显示 20 50 100
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
1
作者 Jiajun Liu Lina Tan +3 位作者 Zhili Zhou Weijin Jiang Yi Li Peng Chen 《Computers, Materials & Continua》 SCIE EI 2024年第11期3221-3240,共20页
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images st... Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images stored in the database grows exponentially.This makes it challenging to build and manage a large image database.To improve the image library utilization and anti-attack capability of the steganography system,we propose an efficient coverless scheme based on dynamically matched substrings.We utilize You Only Look Once(YOLO)for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.Using this dictionary,each image is effectively assigned to a specific scrambling factor,which is then used to scramble the receiver’s sequence key.To achieve sufficient steganography capability with a limited image library,all substrings of the scrambled sequences have the potential to hide data.After matching the secret information,the ideal number of stego images will be obtained from the database.According to experimental results,this technology outperforms most previous works in terms of data load,transmission security,and hiding capacity.It can recover an average of 79.85%of secret information under typical geometric attacks,and only approximately 200 random images are needed to achieve a capacity of 19 bits per image. 展开更多
关键词 coverless STEGANOGRAPHY object detection YOLO
在线阅读 下载PDF
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:11
2
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
在线阅读 下载PDF
Coverless Steganography for Digital Images Based on a Generative Model 被引量:5
3
作者 Xintao Duan Haoxian Song +1 位作者 Chuan Qin Muhammad Khurram Khan 《Computers, Materials & Continua》 SCIE EI 2018年第6期483-493,共11页
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ... In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability. 展开更多
关键词 Generative model coverless image steganography STEGANALYSIS steganographic capacity security.
在线阅读 下载PDF
Coverless Image Steganography Based on Image Segmentation 被引量:3
4
作者 Yuanjing Luo Jiaohua Qin +3 位作者 Xuyu Xiang Yun Tan Zhibin He Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第8期1281-1295,共15页
To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based... To resist the risk of the stego-image being maliciously altered during transmission,we propose a coverless image steganography method based on image segmentation.Most existing coverless steganography methods are based on whole feature mapping,which has poor robustness when facing geometric attacks,because the contents in the image are easy to lost.To solve this problem,we use ResNet to extract semantic features,and segment the object areas from the image through Mask RCNN for information hiding.These selected object areas have ethical structural integrity and are not located in the visual center of the image,reducing the information loss of malicious attacks.Then,these object areas will be binarized to generate hash sequences for information mapping.In transmission,only a set of stego-images unrelated to the secret information are transmitted,so it can fundamentally resist steganalysis.At the same time,since both Mask RCNN and ResNet have excellent robustness,pre-training the model through supervised learning can achieve good performance.The robust hash algorithm can also resist attacks during transmission.Although image segmentation will reduce the capacity,multiple object areas can be extracted from an image to ensure the capacity to a certain extent.Experimental results show that compared with other coverless image steganography methods,our method is more robust when facing geometric attacks. 展开更多
关键词 coverless steganography semantic feature image segmentation Mask RCNN ResNet
在线阅读 下载PDF
Coverless Image Steganography Based on Jigsaw Puzzle Image Generation 被引量:3
5
作者 Al Hussien Seddik Saad M.S.Mohamed E.H.Hafez 《Computers, Materials & Continua》 SCIE EI 2021年第5期2077-2091,共15页
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these ... Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload.A coverless data hiding concept is proposed to solve this issue.Coverless does not mean that cover is not required,or the payload can be transmitted without a cover.Instead,the payload is embedded by cover generation or a secret message mapping between the cover file and the payload.In this paper,a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message.Firstly,the image is divided into equal rows then further divided into equal columns,creating blocks(i.e.,sub-images).Then,according to secret message bits and a proposed mapping function,each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image.After that,the generated jigsaw puzzle image is sent to the receiver.Experimental results and analysis show a good performance in the hiding capacity,security,and robustness compared with existing coverless image steganography methods. 展开更多
关键词 coverless information hiding Jigsaw puzzle image image steganography data hiding
在线阅读 下载PDF
Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography 被引量:2
6
作者 Yun Tan Jiaohua Qin +3 位作者 Hao Tang Xuyu Xiang Ling Tan Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第9期1797-1817,共21页
With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet a... With the development of the internet of medical things(IoMT),the privacy protection problem has become more and more critical.In this paper,we propose a privacy protection scheme for medical images based on DenseNet and coverless steganography.For a given group of medical images of one patient,DenseNet is used to regroup the images based on feature similarity comparison.Then the mapping indexes can be constructed based on LBP feature and hash generation.After mapping the privacy information with the hash sequences,the corresponding mapped indexes of secret information will be packed together with the medical images group and released to the authorized user.The user can extract the privacy information successfully with a similar method of feature analysis and index construction.The simulation results show good performance of robustness.And the hiding success rate also shows good feasibility and practicability for application.Since the medical images are kept original without embedding and modification,the performance of crack resistance is outstanding and can keep better quality for diagnosis compared with traditional schemes with data embedding. 展开更多
关键词 Privacy protection medical image coverless steganography DenseNet LBP
在线阅读 下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:5
7
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
在线阅读 下载PDF
Coverless Text Hiding Method Based on Improved Evaluation Index and One-Bit Embedding 被引量:1
8
作者 Ning Wu Yi Yang +4 位作者 Lian Li Zhongliang Yang Poli Shang Weibo Ma Zhenru Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第9期1035-1048,共14页
In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation i... In the field of information hiding,text is less redundant,which leads to less space to hide information and challenging work for researchers.Based on the Markov chain model,this paper proposes an improved evaluation index and onebit embedding coverless text steganography method.In the steganography process,this method did not simply take the transition probability as the optimization basis of the steganography model,but combined it with the sentence length in the corresponding nodes in the model to gauge sentence quality.Based on this,only two optimal conjunctions of the current words are retained in the method to generate sentences of higher quality.Because the size of the training text dataset is generally large,this leads to higher complexity of the steganographic model;hence,fewer repetitions of the generated steganographic sentences occur.Different datasets and methods were selected to test the quality of the model.The results indicate that our method can achieve higher hiding capacity and has better concealment capability. 展开更多
关键词 coverless text steganography Markov chain evaluation index onebit embedding
在线阅读 下载PDF
Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping 被引量:1
9
作者 Runze Li Jiaohua Qin +1 位作者 Yun Tan Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第10期1571-1583,共13页
Most existing coverless video steganography algorithms use a particular video frame for information hiding.These methods do not reflect the unique sequential features of video carriers that are different from image an... Most existing coverless video steganography algorithms use a particular video frame for information hiding.These methods do not reflect the unique sequential features of video carriers that are different from image and have poor robustness.We propose a coverless video steganography method based on frame sequence perceptual distance mapping.In this method,we introduce Learned Perceptual Image Patch Similarity(LPIPS)to quantify the similarity between consecutive video frames to obtain the sequential features of the video.Then we establish the relationship map between features and the hash sequence for information hiding.In addition,the MongoDB database is used to store the mapping relationship and speed up the index matching speed in the information hiding process.Experimental results show that the proposed method exhibits outstanding robustness under various noise attacks.Compared with the existing methods,the robustness to Gaussian noise and speckle noise is improved by more than 40%,and the algorithm has better practicability and feasibility. 展开更多
关键词 coverless steganography frame sequence perception distance
在线阅读 下载PDF
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
10
作者 Al-Hussien Seddik Mohammed Salah +5 位作者 Gamal Behery Ahmed El-harby Ahmed Ismail Ebada Sokea Teng Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2023年第3期5087-5103,共17页
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t... The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods. 展开更多
关键词 coverless steganography data hiding information security QR code maze game
在线阅读 下载PDF
Coverless Image Steganography System Based on Maze Game Generation
11
作者 Al Hussien Seddik Saad Mohammed S.Reda +4 位作者 GamalM.Behery Ahmed A.El-harby Mohammed Baz Mohamed Abouhawwash Ahmed Ismail Ebada 《Intelligent Automation & Soft Computing》 2023年第11期125-138,共14页
The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data ... The trend of digital information transformation has become a topic of interest.Many data are threatening;thus,protecting such data from attackers is considered an essential process.Recently,a new methodology for data concealing has been suggested by researchers called coverless steganography.Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image.This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems.The system uses the secret message to generate the stego image in the form of one of the Intelligence Quotient(IQ)games,the maze.Firstly,a full grid is generated with several specific rows and columns determined from the number of bits of the secret message.Then,these bits are fed to the full grid to form the maze game stego image.Finally,the generated maze game stego image is sent to the recipient.The experimental results,using the Bit Error Rate(BER),were conducted,and confirmed the strength of this system represented by a high capacity,perfect performance,robustness,and stronger hiding system compared with existing coverless steganography systems. 展开更多
关键词 coverless data hiding digital image steganography intelligence quotient games maze game
在线阅读 下载PDF
基于字符识别的无载体隐写
12
作者 鲁桢 吴建斌 《应用科学学报》 北大核心 2025年第4期684-693,共10页
为提高无载体隐写的隐藏容量,注意到半构造式方法的特点,本文采用英汉谚语翻译构造原则,结合深度学习方法,提出并实现了一种利用汉字字符小图标作为构造元素的无载体隐写方法。构建汉字字符小图标载体库,设计小图标与二进制流之间一一... 为提高无载体隐写的隐藏容量,注意到半构造式方法的特点,本文采用英汉谚语翻译构造原则,结合深度学习方法,提出并实现了一种利用汉字字符小图标作为构造元素的无载体隐写方法。构建汉字字符小图标载体库,设计小图标与二进制流之间一一映射的关系。在发送端将输入的秘密消息按照12 bits进行分组,从载体库中寻找对应的汉字小图标拼接成含密载体图像。在接收端,对含密载体图像进行分割,利用深度学习方法识别载体图像中的汉字,根据汉字与二进制流之间的映射关系,实现秘密消息的提取。此外,为了提高该方案的鲁棒性,引入了数据增强方法人工合成文本图像数据集。实验和测试结果表明,与同类无载体隐写方法相比,该方法大大提升了隐藏容量,并且具有良好的鲁棒性。 展开更多
关键词 无载体隐写 半构造式 隐藏容量 深度学习
在线阅读 下载PDF
基于DWT编码的纹理合成式无载体信息隐藏
13
作者 安鹤松 任俊玲 《计算机应用文摘》 2025年第21期90-92,95,共4页
为提高信息隐藏的安全性与鲁棒性,提出了一种基于离散小波变换(DWT)编码的纹理合成式无载体信息隐藏方法。DWT作为一种多尺度图像分析工具,能够有效提取图像的多频率成分。该方法将DWT与纹理合成技术相结合,在小波分解后的低频子带中嵌... 为提高信息隐藏的安全性与鲁棒性,提出了一种基于离散小波变换(DWT)编码的纹理合成式无载体信息隐藏方法。DWT作为一种多尺度图像分析工具,能够有效提取图像的多频率成分。该方法将DWT与纹理合成技术相结合,在小波分解后的低频子带中嵌入秘密信息,不仅增强了信息隐藏的鲁棒性,还保证了图像的高质量视觉效果。 展开更多
关键词 无载体信息隐藏 纹理合成 DWT
在线阅读 下载PDF
基于语义分割的三维模型版权保护算法 被引量:1
14
作者 秦姣华 段振雄 +1 位作者 向旭宇 谭云 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第2期49-54,共6页
为解决传统数字水印技术导致模型精度下降的问题,并保护局部版权,提出了一种基于语义分割的三维模型版权保护算法.首先,使用PointNet对三维模型进行语义分割,并根据分割结果将模型划分为子块,以子块为单位计算版权信息,保护局部版权;然... 为解决传统数字水印技术导致模型精度下降的问题,并保护局部版权,提出了一种基于语义分割的三维模型版权保护算法.首先,使用PointNet对三维模型进行语义分割,并根据分割结果将模型划分为子块,以子块为单位计算版权信息,保护局部版权;然后,提出了一种基于顶点范数与表面曲率的版权信息生成算法.由于版权信息是使用无载体隐写方式生成的,因此该算法可以在不修改模型本身的情况下对模型整体及各子部件进行版权保护.实验证明:该算法在完全抵抗相似变换攻击的情况下,对其他种类攻击同样具有较好的鲁棒性. 展开更多
关键词 三维模型 点云模型 版权保护 无载体隐写 PointNet
原文传递
一种基于区块链信息映射的无载体隐写方法
15
作者 秦姣华 卿大山 +1 位作者 向旭宇 谭云 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第11期58-63,共6页
针对区块链隐蔽通信中高成本和交易未上链信息丢失的问题,提出一种基于区块链信息映射的无载体隐写方法.首先,该方法对虚拟货币中的区块信息进行预处理,分析解析后的数据,根据数据的属性选取合适的信息作为秘密信息载体;然后,对提取后... 针对区块链隐蔽通信中高成本和交易未上链信息丢失的问题,提出一种基于区块链信息映射的无载体隐写方法.首先,该方法对虚拟货币中的区块信息进行预处理,分析解析后的数据,根据数据的属性选取合适的信息作为秘密信息载体;然后,对提取后的数据构建奇偶映射规则,将秘密信息映射到区块信息中;最后,接收方根据附带信息从不同的区块链场景中提取出所需要的秘密消息.实验结果表明:该方法能有效提高单次秘密信息传输的容量,同时使用无载体技术无须在链上发起交易,有效节约构造交易产生的成本;在不同的区块链场景中实现秘密信息的映射,提高了区块链隐蔽通信的拓展性. 展开更多
关键词 区块链 隐蔽通信 区块信息 无载体 信息安全
原文传递
A Linked List Encryption Scheme for Image Steganography without Embedding
16
作者 Pengbiao Zhao Qi Zhong +3 位作者 Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期331-352,共22页
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks. 展开更多
关键词 STEGANOGRAPHY ENCRYPTION steganography without embedding coverless steganography
在线阅读 下载PDF
面向编码伪装的鲁棒无载体图像隐写方法 被引量:1
17
作者 苑紫烨 邱宝林 +3 位作者 叶妤 温文媖 化定丽 张玉书 《应用科学学报》 CAS CSCD 北大核心 2024年第3期469-485,共17页
传统的图像隐写方法容易受到隐写分析的攻击,无载体图像隐写方法可以从本质上抵抗隐写分析的攻击。然而,现有的无载体图像隐写算法存在鲁棒性低、提取精度有限和不可感知性差等问题,为此提出一种面向编码伪装的鲁棒无载体图像隐写方法... 传统的图像隐写方法容易受到隐写分析的攻击,无载体图像隐写方法可以从本质上抵抗隐写分析的攻击。然而,现有的无载体图像隐写算法存在鲁棒性低、提取精度有限和不可感知性差等问题,为此提出一种面向编码伪装的鲁棒无载体图像隐写方法。该方案将基于深度的合成隐写方法与传统的聚类相结合,通过感知哈希对编码网络生成的合成图像与相似图像进行匹配,将传输的图像由合成图像替换成真实自然图像以此提高安全性;进一步,利用聚类算法找到与相似图像对应的伪装图像进行传输。以卷积神经网络特征为基准进行聚类,提高了抗几何攻击的能力。实验分析表明,所提方案在隐藏容量、提取精度方面都有较优的表现,且解决了生成式隐写方案存在的图像质量低和鲁棒性差等问题。 展开更多
关键词 无载体图像隐写 卷积神经网络聚类 感知哈希 生成网络 伪装图像
在线阅读 下载PDF
一种抗几何攻击的无载体图像隐写方法
18
作者 向旭宇 谭洋 +1 位作者 秦姣华 谭云 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第11期31-36,共6页
针对现有算法在传输隐写图像过程中安全性差、难以抵抗几何攻击的问题,提出一种抗几何攻击的无载体图像隐写方法.首先,利用EfficientNet模型根据输入图像构建载体图像数据集,然后对载体图像进行同心圆分块;从最内层圆向外计算子块的颜... 针对现有算法在传输隐写图像过程中安全性差、难以抵抗几何攻击的问题,提出一种抗几何攻击的无载体图像隐写方法.首先,利用EfficientNet模型根据输入图像构建载体图像数据集,然后对载体图像进行同心圆分块;从最内层圆向外计算子块的颜色矩分量生成鲁棒特征序列,根据图像特征值和图像路径建立倒排索引;最后,根据图像特征序列的位数对秘密信息进行分割,并根据映射规则选择合适的载体图像进行传输.实验结果表明:该方法在提升容量的同时对几何和非几何攻击均具有鲁棒性. 展开更多
关键词 信息隐藏 无载体隐写术 颜色矩 EfficientNet模型 鲁棒性
原文传递
基于图像Bag-of-Words模型的无载体信息隐藏 被引量:49
19
作者 周志立 曹燚 孙星明 《应用科学学报》 CAS CSCD 北大核心 2016年第5期527-536,共10页
介绍一种基于bag-of-words(BOW)模型的无载体信息隐藏方法.该方法使用BOW模型提取图像的视觉关键词(visual words,VW)以表达待隐藏的文本信息,从而实现文本信息在图像中的隐藏.首先使用BOW模型提取图像集中每幅图像的VW,构建文本信息的... 介绍一种基于bag-of-words(BOW)模型的无载体信息隐藏方法.该方法使用BOW模型提取图像的视觉关键词(visual words,VW)以表达待隐藏的文本信息,从而实现文本信息在图像中的隐藏.首先使用BOW模型提取图像集中每幅图像的VW,构建文本信息的关键词和VW的映射关系库;然后把每幅图像分为若干子图像,统计每一幅子图像的VW频数直方图,选择频数最高的VW表示该子图像;最后根据构建的文本关键词和子图像VW的映射关系库,搜索出与待隐藏文本信息存在映射关系的子图像序列,将含有这些子图像的图像作为含密图像进行传递.实验结果和分析表明,该隐藏算法在抗隐写分析、鲁棒性和安全性方面均有良好的表现. 展开更多
关键词 无载体信息隐藏 BAG of words模型 视觉词汇 图像搜索
在线阅读 下载PDF
基于深度学习的图像隐写研究进展 被引量:13
20
作者 付章杰 李恩露 +2 位作者 程旭 黄永峰 胡雨婷 《计算机研究与发展》 EI CSCD 北大核心 2021年第3期548-568,共21页
图像隐写是信息安全领域的研究热点之一.早期隐写方法通过修改载体图像获得含密图像,导致图像统计特性发生变化,因此难以抵抗基于高维统计特征分析的检测.随着深度学习的发展,研究者们提出了许多基于深度学习的图像隐写方法,使像素修改... 图像隐写是信息安全领域的研究热点之一.早期隐写方法通过修改载体图像获得含密图像,导致图像统计特性发生变化,因此难以抵抗基于高维统计特征分析的检测.随着深度学习的发展,研究者们提出了许多基于深度学习的图像隐写方法,使像素修改更隐蔽、隐写过程更智能.为了更好地研究图像隐写技术,对基于深度学习的图像隐写方法进行综述.首先根据图像隐写过程,从3个方面分析了基于深度学习的图像隐写方法:1)从生成对抗网络和对抗样本2个角度介绍载体图像获取方法;2)分析基于深度学习的隐写失真设计方法;3)阐述基于编码解码网络的含密图像生成方法.然后,分析和总结了无载体图像隐写方法的优缺点,该类方法无需载体图像即可实现图像隐写,因此在对抗统计分析方面存在天然优势.最后,在深入分析与总结基于深度学习的图像隐写与无载体图像隐写2类方法优缺点的基础上,对图像隐写的发展方向进行了探讨与展望. 展开更多
关键词 图像隐写 深度学习 生成对抗网络 对抗样本 无载体图像隐写
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部