期刊文献+

一种基于离散小波域的隐蔽通信中的混合型信息隐藏技术 被引量:1

A Confidential-Communication-oriented and DWT-Based Hybrid Information Hiding Technology
下载PDF
导出
摘要 提出了一种应用于隐蔽通信的基于离散小波(DWT)域的混合型信息隐藏技术,详细阐述了算法流程,分析了其技术特点,给出了实验结果和结论。结果和分析都表明,将信息隐藏技术应用于隐蔽通信,具有较好的效果。 A DWT based on hybrid information hiding technology oriented to confidential communication for images is presented, based on this, the flowcharts are described in detail and their technological characteristics are analyzed. Then, the results of the experiments are shown and the conclusion is made. Both the results and the analysis indicate that the algorithm is good in performance in the application of information hiding technology to confidential communication.
出处 《空军工程大学学报(自然科学版)》 CSCD 2004年第6期63-67,共5页 Journal of Air Force Engineering University(Natural Science Edition)
基金 空军科研基金资助项目
关键词 信息隐藏 离散小波变换 量化 扩频 置乱 information hiding DWT quantization spread spectrum scrambling
  • 相关文献

参考文献4

  • 1Cox I J, Miller M L. The First 50 Years of Electronic Watermarking[ J ]. Journal of Applied Signal Processing, 2002, (2): 126 -132.
  • 2Cox I J,Kilian J,Leighton T,et at.Secure Spread Spectrum Watermarking for Multimedia[A].Proceedings of The IEEE International Conference on Image Processing ICIP97[C].USA October:Santa Barbara,California,1997,1673-1687.
  • 3Kundur D, Hatzinakos D. A Robust Digital Image Watermarking Method Using Wavelet - Based Fusion [ A ]. Proc. 4th IEEE Int.Conf. Image Processing97 [ C ]. CA: Santa Barbara, 1997. 544 - 547.
  • 4Hongmei Liu, Jiufen Liu, Jiwu Huang, et al. A Robust DWT - Based Blind Data Hiding Algorithm [ J ]. IEEE International Symposium on Circuits and Systems ,2002, (2) :672 - 675.

同被引文献5

  • 1Diffie W, Hellmanm E. New Directions in Cryptography[ J]. IEEE Trans IT, 1976,22(6) :644- 654.
  • 2Beth T, Frisch M C. Public - Key Cryptography : State of the Art and Future Directions [ M ]. New York : Springer - Verlag, 1991.
  • 3Bender W, Gmbl D, Morimito N, et al. Techniques for data hiding [ J ]. IBM Systems Journal, 1996,35 ( 3 - 4 ) : 313 - 336.
  • 4Swanson M. Kobayashi M. A Multimedia data embedding and watermarking technologies[ J]. Pro IEEE, 1998,86 (6):1064 -1087.
  • 5韦卫,王行刚.密钥交换理论与算法研究[J].通信学报,1999,20(7):64-68. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部