期刊文献+

采用两次模运算的无直方图异常安全密写法

Steganography Using Dual-Modulo Arithmetic without Introducing Histogram Abnormality
下载PDF
导出
摘要 提出一种以像素对为基础的数字图像密写方法,该方法同时对像素灰度值和像素对的差值进行模运算(modulo gray-value modulo difference,简称MGMD),在每一对像素中可嵌入的比特数取决于像素对差值的大小.基于待嵌入的数据和两次模运算的结果修改像素对,并维持其差值不变.MGMD密写不会引起像素直方图和像素差值直方图的异常,不仅避免了一些基于像素对的密写法如PVD和SM的安全漏洞,还能抵御针对常规LSB密写的RS分析和χ2分析.该方法的安全性得到实验的验证. A new steganographic embedding technique based on pixel pairs is described. The proposed method involves two modulo operations on the difference between pixels in each pixel pair and the gray-value of a pixel, respectively, hence the name modulo gray-value modulo difference(MGMD). The number of bits to be embedded into each pair is determined by the pixel difference. The secret data and the results of two modulo operations are combined and used to modify the host pixel pair such that the gray level difference is kept unchanged. MGMD embedding causes no histogram abnormality as often encountered in other pixel pair-based techniques such as PVD and SM. It can also resist the popular RS and X^2 analyses. Security of the method is confirmed in experiments on a large number of images.
出处 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第4期331-337,共7页 Journal of Shanghai University:Natural Science Edition
基金 国家自然科学基金资助项目(60372090) 上海市科委基础研究重点项目(04JC14037)
关键词 安全密写 模运算 像素差值 直方图 secure steganography modulo operation pixel value difference histogram
  • 相关文献

参考文献10

  • 1PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information hiding-a survey[J].Proc IEEE,1999,87:1062-1078.
  • 2WANG H,WANG S.Cyber warfare:Steganography vs.steganalysis[J].Communication of the ACM,2004,47(10):76-82.
  • 3FRIDRICH J,GOLJAN M.Practical steganalysis of digital images-state of the art[C]// Security and Watermarking of Multimedia Contents Ⅳ,Proceedings of the SPIE 4675,San Jose,USA.2002:1-13.
  • 4WU D C,TSAI W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24:1613-1626.
  • 5CHANG C C,TSENG H W.A steganographic method for digital images using side match[J].Pattern Recognition Letters,2004,25:1431-1437.
  • 6WESTFELD A,PFITZMANN A.Attacks on steganographic systems[J].Lecture Notes in Computer Science,1999,1768:61-76.
  • 7ZHANG X,WANG S.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25:331-339.
  • 8王威娜,张新鹏,王朔中.针对边缘匹配嵌入法的密写分析以及嵌入率估计[C]//第十二届全国图像图形学学术会议论文集.北京:清华大学出版社,2005:105-108.
  • 9MAYACHE A,EUDE T,CHERIFI H.A comparison of image quality models and metrics based on human visual sensitivity[C]// International Conference on Image Processing (ICIP' 98),Chicago,Illinois.1998,3:409-413.
  • 10FRIDRICH J,GOLJAN M,DU R.Detecting LSB steganography in color and gray-scale images[J].IEEE Multimedia (Special Issue on Security),2001,8(4):22-28.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部