期刊文献+

基于混沌序列的数字图像隐藏技术 被引量:1

Digital image information hiding technique based on chaotic sequences
下载PDF
导出
摘要 混沌序列具有很好的伪随机性,本文结合混沌序列和图像相似度标准,给出了一种实现数字图像隐藏的自适应算法。实验结果证明,该方法简单易行,具有很好的安全性。 Chaotic sequences have good false-randomizations. Combining the chaotic sequences and similarity standard of images, this paper gives an adaptive algorithm to realize digital image hiding.
出处 《西安邮电学院学报》 2006年第1期75-77,108,共4页 Journal of Xi'an Institute of Posts and Telecommunications
基金 陕西省教育厅专项科研计划项目(04JK253)
关键词 混沌序列 图像隐藏 自适应 chaotic sequences image hiding adaptive
  • 相关文献

参考文献3

二级参考文献15

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2王亥,胡健栋.Logistic-MaP混沌扩频序列[J].电子学报,1997,25(1):19-23. 被引量:90
  • 3郝柏林.从抛物线谈起--混沌动力学引论[M].上海:上海科技教育出版社,1995..
  • 4[4]Fukumasa H., Kohno R., Imai H.. Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA. IEEE Journal of Selected Areas in Communications, 1994, 12(5) :828~836
  • 5[5]Kohda T., Tsuneda A.. Statistics of chaotic binary sequences. IEEE Tranactions on Information Theory, 1997, 43(1):105~112
  • 6[6]Kohda T., Tsuneda A.. Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Transactions on Communications,1993, E76-B(8):855~862
  • 7[7]Andreyev Y., Dmitriev A.S., Kuminov D., Starkov S.. Maps with stored information in multiple-access communications systems. In: Proceedings of the NDES'97,Communication, 1997, 185~190
  • 8[11]Hammons R.A., Kumar V.P.. On a recent 4-Phase sequence design for CDMA. IEICE Transactions on Communications, 1993, E76-B (8) :804~813
  • 9[13]Gonzalez J.A., Pino R.. Chaotic and stochastic functions. Physica A, 2000, 276: 425~432
  • 10[1]Lasota A., Mackey M.C.. Chaos, Fractals and Noise. New York: Springer-Verlag, 1994

共引文献137

同被引文献17

  • 1张雪锋,范九伦.基于图像融合的数字图像隐藏技术[J].微电子学与计算机,2007,24(2):188-190. 被引量:7
  • 2李鹏,田东平,张楠.基于混沌序列的数字图像隐藏技术[J].信息安全与通信保密,2007,29(6):222-225. 被引量:9
  • 3张雪锋,范九伦.一种基于混沌系统的数字图像隐藏技术[J].计算机工程,2007,33(4):134-136. 被引量:10
  • 4PAREEK N K, PATIDAR V, SUD K K. Discrete chaotic cryptography using external key [ J]. Physics Letters A, 2003, 309( 1/2): 75 - 82.
  • 5BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding [ J]. IBM System Journal, 1996, 35(3/4) : 313 - 336.
  • 6STEFAN K, FABIEN A P. Information hiding techniques for steganography and digital watermarking [ M]. London: Artech Print on Demand, 2000.
  • 7HSU C-T, WU J-L. Hiding digital watermarks in image [ J]. IEEE Transactions on Image Processing, 1999, 8(1) : 58 - 68.
  • 8PETITCOLAS F A P, ANDERSON R J, KUHN M G. Information hiding--A survey [ J]. Proceedings of the IEEE, 1999, 87 (7) : 1062 - 1078.
  • 9YEN J, GUO J. A new chaotic key-based design for image encryption and decryption [ C]// IEEE International Conference on Circuits and Systems. Washington, DC: IEEE Press, 2000:49 -52.
  • 10张永红.一种基于混沌序列的多幅图像隐藏算法[J].计算机工程与应用,2008,44(17):182-184. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部