期刊文献+

基于禁忌搜索的目标图像信息隐藏技术

Object Image Hiding Technology Based on Tabu Search
下载PDF
导出
摘要 信息隐藏技术是解决重要目标图像信息网上传输安全的一种有效手段,隐藏的信息量和不可感知性是一个矛盾的两个方面。在对重要目标信息进行隐藏时,必须在二者之间做一个权衡。如何在满足不可感知性的前提下隐藏尽可能多的信息是追求的目标。提出了基于禁忌搜索的图像信息的隐藏技术,可以很好地解决这个问题。 Information hiding technology is an effective method for image security in network transmission.When we embed message,we must make a compromise between bits and imperceptibility.How to embed enough message on condition of imperceptibility is our object.The paper puts forward an algorithm based on Tabu search and the experimental results show that the algorithm is fairly good.
作者 闵连权
出处 《海洋测绘》 2005年第4期40-43,共4页 Hydrographic Surveying and Charting
关键词 图像处理 禁忌搜索 信息隐藏 不可感知性 目标函数 image processing Tabu search information hiding imperceptibility object function
  • 相关文献

参考文献4

  • 1邢文训 谢金星.现代优化计算方法[M].北京:清华大学出版社,2003..
  • 2张鸿宾,陈坤.基于最优低位替换和Tabu搜索的图像隐藏[J].自动化学报,2004,30(2):306-315. 被引量:2
  • 3Wang R, Lin L, Lin J. Image hiding by optimal LSB substitution and genetic algorithm [ J ]. Pattern Recognition,2001,34( 3 ) :671 ~ 683.
  • 4Stefan Katzenbeisser,Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking[ M ]. Artech House,Inc,2000.

二级参考文献28

  • 1Glover F, Laguna M. Tabu Search in Modern Heuristic Techniques for Combinatorial Problems. Reeves R C Ed. Berkshire.- McGraw-Hill, 70 - 150.
  • 2Zhang H, Guo J. Optimal polygonal approximation if digital planar curves using meta heuristics. Pattern Recognition, 2001,34(7) : 1429- 1436.
  • 3Zhang H, Sun G. Feature selection using tabu search method. Pattern Recognition, 2002,35(3) : 701-711.
  • 4Zhang H, Sun G. Optimal reference subset selection for nearest neighbor classification by tabu search. Pattern Recognition, 2002,35(7) : 1481-1490.
  • 5Jan J K, Tseng Y M. On the security of image encryption method. Information Processing Letters, 1996,60(2): 261-265.
  • 6Bourbakis N, Alexopoulos C. Picture data encryption using scan pattern. Pattern Recognition, 1992,25(6) : 567-581.
  • 7High L H J. Data encryption: A non-mathematical approach. Computer Security,1997,16(3): 369-386.
  • 8Rhee M Y. Cryptography and secure communication. Singapore: McGraw-Hill Book Co., 1994.
  • 9Kuo C J. Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 1993,2(4) : 345-351.
  • 10Johnson N F, Jajodia S. Exploring steganography: Seeing the unseen. IEEEComputer, 1998, 18(2): 26-36.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部