期刊文献+

基于HVS和混沌序列的DCT域数字图像隐藏技术 被引量:4

Digital image information hiding technology using chaotic sequence and the characteristics of HVS in DCT domain
下载PDF
导出
摘要 目的为得到更优的数字图像隐藏算法。方法鉴于在DCT域进行数字图像隐藏经常会出现“方块效应”以及人眼视觉系统的特点,提出基于视觉敏感度的图像隐藏算法,所用的混合参数序列由混沌动力系统的混沌映射产生。结果该算法按均匀块将一幅数字图像在DCT域隐藏于另一幅图像中。结论数值实验结果表明该算法易行、有效,隐藏后的图像效果好,而且能抵抗剪切等攻击,有一定程度的鲁棒性。 Aim In order to hide a secret image in a known image. Methods Considering the block effects of image-hiding in DCT domain and the characteristics of human vision system, a new scheme of image hiding is provided using of chaotic sequence and the characteristics of human vision system. In this scheme the chaotic sequence is used as blending parameters. According to the frequency response of human vision system, one image is classified into many different blocks. Results Because different blocks are blended with different parameter, image quality can be guaranteed. Conclusion Results of analytic experiments show that not only this scheme of digital image information hiding can be easily realized and is effective, but also the algorithm is robust and can resist many attacks such as cropping.
出处 《西北大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第5期741-746,共6页 Journal of Northwest University(Natural Science Edition)
基金 国家自然科学基金资助项目(60372072)
关键词 数字图像隐藏 DCT变换 人眼视觉系统 混合 混沌序列 复合换位变换 digital image information hiding DCT domain human vision system blending chaotic sequence complex transposition permutation
  • 相关文献

参考文献6

二级参考文献13

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2Rijmen V, Daemen J, Preneel B, Bosselaers A, E De Win. The cipher SHARK. In: Proceedings of Fast Software Encryption—the 3rd International Workshop, LNCS 1039, Romel,Italy, Springer-Verlag, 1996. 99~111.
  • 3FENG Deng-Guo, WU Wen-Ling. The Design and Analysys of Block Cipher. Beijing: Tsinghua University Press, 2000(in Chinese).
  • 4Jakobsen T, Knudsen L R. The interpolation attack on block ciphers. Fast Software Encryption, LNCS 1267, Haifa Israel,Springer-Verlag, 1997.28~40.
  • 5Alex Biryukov, David Wagner. Slide attacks. In: Proceedings of FSE' 99, LNCS 1636, Romec, Italy, Springer-Verlag, 1999.24~259.
  • 6David Wagner. The boomerang attacks. In: Proceedings of Fast Software Encryption—the 6th International Workshop, LNCS 1636, Romel, Italy, Springer-Verlag, 1999. 156~170.
  • 7WHITEFIELD D, MARTINE E H. New directions in cryptography [ J ]. IEEE Tran Information Theory, 1976,22(6) :644-654.
  • 8SHANNON C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948,27 (7):379-423
  • 9[美]洛仑兹EN.混沌的本质[M].北京:气象出版社,1997..
  • 10丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843. 被引量:327

共引文献89

同被引文献31

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部