期刊文献+

一种保持直方图特性的JPEG图像掩密算法 被引量:2

A Steganography Preserving the Property of the Histogram for JPEG Images
下载PDF
导出
摘要 传统的JPEG图像掩密算法往往因为改变了载体图像的DCT系数直方图而不能抵抗各种基于直方图的攻击,或者为了矫正直方图而降低了隐藏容量,该文提出一种新的保持直方图特性的算法。该算法在嵌入秘密消息时,动态建立Adjust_info表记录系数直方图被改变的情况,然后根据该表调整系数的变化方向,这样不但可以补偿直方图的改变,而且并不降低隐藏容量。对多幅图像的实验表明,该算法不但能够达到13%的高隐藏容量(压缩因子为75),而且掩密后图像总体DCT系数直方图的平均失真率为0.81%。由改进算法掩密后图像低频DCT系数直方图的最大失真率为3.83%,平均失真率只有1.98%,仅对直方图做了微小的改变,因此可以有效抵御各种直方图攻击,从而为安全掩密提供了可靠保证。 Traditional steganographic techniques for JPEG images always suffer from histogram-based attacks because they change the DCT coefficient histogram of the cover image, or from the reduced hiding capacity due to the correction of the change of the histogram. A new steganography preserving the property of the histogram is proposed in this paper. When the secret message is embedded, an adjust_info table is built to memorize the alteration of the histogram. Then the modification direction of the coefficient is adjusted according to the table. In this way, the change of the histogram is compensated and the hiding capacity is not reduced yet. Several experimental results demonstrate that the algorithm can attain a high hiding capacity of 13% (the quality factor is 75). Furthermore the average distortion rate of the general DCT coefficient histograms on stego+images is 0.81%, the maximal distortion rate of the histograms on low frequency coefficients is 3.83% obtained from the stego-images generated by the improved algorithm and the average distortion rate of them is only 1.98%. The property of the histogram is fine changed; therefore, various histogram-based attacks can be effectively resisted and secure steganorgraphy can be insured.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第2期252-256,共5页 Journal of Electronics & Information Technology
基金 国家部级基金资助课题
关键词 掩密技术 掩密分析技术 JPEG图像 直方图特件 直方图攻击 Steganorgraphy, Steganalysis, JPEG images, Property of the histogram, Histogram-based attacks
  • 相关文献

参考文献9

  • 1Provos N,Honeyman P.Hide and seek:an introduction to steganography.IEEE Security & Privacy,2003,1(3):32-44.
  • 2Fridrich J,Goljan M.Practical steganalysis-state of the art.Proc.SPIE Photonics West,Electronic Imaging 2002.Security and Watermarking of Multimedia Contents,San Jose,California,Jan.2002:1-13.
  • 3Wallace G W.The JPEG still picture compression standard.Communications oftheACM,1991,34(4):30-44.
  • 4Derek Upham,JPEG-JSteg-V4.http://www.funet.fi/pub/crypt/steganographv/ipeg-JSteg-v4.diff.gz.
  • 5Provos N.OutGuess-universal steganography.August 1998.http://www.outguess.org/.
  • 6Westfeld A.F5-a steganographic algorithm:high capacity despite better steganalysis.Proc.4th Int'l Workshop Information Hiding.Springer-Verlag,2001,289-302.http://wwwm.inf.tudresden.de/-west feld/f5.html.
  • 7Westfeld A,Pfitzmann A.Attacks on steganographic systems.Proc.3rd Int'l Workshop Information Hiding Dresden,Germany,Springer-Verlag,1999:61-76.
  • 8Fridrich J,Goljan M,and Hogea D.Steganalysis of JPEG images:breaking the F5 algorithm.Proc.5th Int'l Workshop Information Hiding.Noordwijkerhout,the Netherlands,Springer-Verlag,2002:310-323.
  • 9Latham A.Steganography:JPHIDE and JPSEEK.1999.http://linux01.gwdg.de/-alatham/stego.html.

同被引文献13

  • 1高丙坤,姜春雷,张佳.一种新的数字视频压缩方法的设计[J].大庆石油学院学报,2005,29(5):106-108. 被引量:3
  • 2张新鹏,王朔中.JPEG图像中的安全密写方案[J].电子与信息学报,2005,27(11):1813-1817. 被引量:9
  • 3徐盛,曾永慧,樊士伟,张天序.基于JPEG-LS帧间扩展的图像无损压缩算法[J].计算机与数字工程,2006,34(3):7-9. 被引量:4
  • 4Jan Biemond. Image Modeling and Quality Criterion[J]. IEEETrans. on ASSP, 1999, 27(6): 649-652
  • 5Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[C]. Proc. 5th int workshop information Hiding. Noordwijkerhout, the Netherlands, springer-verlag, 2002 : 310-323
  • 6Nikil Jayant Nikil. Signal Compression Based on Models of Human Perception[J]. Proc. of IEEE, 1993, 81 (10) : 1385-1422
  • 7ISO/IEC JTCI/SC29/WG10[S]. JPEG Committee Draft CD10918, 1991
  • 8Kannan Ramchandran, Martin Vetterli. Rate-Distortion Optimal FastThreholdingwith Complete JPEG/ MPEG Decoder Compatibility[C]. IEEETrans. On Image Proceeding, 1994
  • 9Petitcolas F A P,Anderson R J,Kuhn M G. Infonnation hiding-Asurvey[J]. Proc.IEEE , 1999,87 (7) : 1062-1078.
  • 10Wesffeld A.FS-A Steganographic Algorithm[C]//In 4th Interna- tional Workshop on Information Hiding,Lecture Notes in computer Science, 2137.Springer-Verlag,2001:289-302.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部