期刊文献+

视频信息伪装技术综述 被引量:4

Survey of Steganography in Video
下载PDF
导出
摘要 介绍了视频信息伪装技术的一般原理,分析了其特点,阐述了所采用的一些主要方法,并对视频信息伪装的攻击手段进行了探讨;最后指出了目前视频信息伪装技术值得进一步研究的问题。 The general principles of steganography in video were described, and the characteristics were analyzed. Then the main algorithms were expatiated, and discussed the attack measures against video steganography. In the end, the issues worthy of further research on the techniques of video steganography were listed.
出处 《计算机应用研究》 CSCD 北大核心 2006年第12期8-11,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60473022)
关键词 信息隐藏 信息伪装 隐蔽通信 隐写分析 Information Hiding Steganography Covert Communication Steganalysis
  • 相关文献

参考文献28

  • 1Fabien A P Petitcolas,Ross J Anderson,Markus G Kuhn.Information Hiding:A Survey[C].Proc.of the IEEE,1999.1062-1078.
  • 2Po-Chyi Su,C-C Jay Kuo.Steganography in JPEG2000 Compressed Images[J].IEEE Trans.on Consumer Electronics,2003,49 (4):824-832.
  • 3L M Marvel,C G Boncelet,Jr C T Retter.Spread Spectrum Image Steganography[J].IEEE Trans.on Image processing,1999,8(8):1075-1083.
  • 4C-C Chang,J-C Chuang,Y-P Lai.Hiding Data in Multitone Images for Data Communications[C].IEE Proc.of Vis.Image Signal Process,2004.137-145.
  • 5Xinpeng Zhang,Shuozhong Wang.Steganography Using Multiplebase Notational System and Human Vision Sensitivity[J].IEEE Signal Processing Letters,2005,12(1):67-70.
  • 6王道顺,齐东旭.一种新的数字图像隐藏方案[J].计算机学报,2000,23(9):949-952. 被引量:20
  • 7夏光升,陈明奇,杨义先,胡正名.基于DCT变换的图像伪装技术[J].电子与信息学报,2001,23(12):1316-1320. 被引量:5
  • 8M D Swanson,Bin Zhu,Ahmed H Tewfik.Data Hiding for Video-inVideo[C].Proc.of ICIP'97,1997.676-679.
  • 9J J Chae,B S Manjunath.Data Hiding in Video[C].Proc.of ICIP,1999.311-315.
  • 10Nidhal Abdulaziz,K Khee Pang.Wavelet Transform and Channel Coding for Data Hiding in Video[C].Proc.of International Conf.on Info-tech and Info-net(ICII'01),2001.791-796.

二级参考文献4

共引文献23

同被引文献18

  • 1刘连山,李人厚.基于离散余弦变换直流分量的盲视频水印方案[J].西安交通大学学报,2006,40(4):402-405. 被引量:5
  • 2王海春.基于多混沌系统的数字密写技术[J].微计算机信息,2006,22(11X):83-85. 被引量:3
  • 3Fabien A P Petitcolas, Rosa J Anderson, Markus G Kuhn. Information Hiding; A Storey [ C]//Proc. of the IEEE, 1999 .1062 - 1078.
  • 4Po-Chyi Su, C-C Jay Kuo. Steganography in JPEG2000 Compressed Images [ J ]. IEEE Trans. on Consumer Electmnics, 2003,49 (4) : 824 - 832.
  • 5Satish K, Jayakar T, Tobin C, et al. Chaos based spread spectrum image steganography[J]. IEEE Transactions on Consumer Electronics, 2004, 50 (2):587-590.
  • 6Petitcolas F A P, Aderson R J, Kuhn M G. Information hiding-a survey[J]. Proc of the IEEE, 1999, 87(7): 1062-1078.
  • 7Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
  • 8Provos N, Honeyman P. Detecting steganographic content on the internet[R]. Michigan:University of Michigan, Center for Information Technology Integration, USA, 2001: 1-11.
  • 9Xu C Y, Ping X J, Zhang T. Steganography in compressed video stream[C] // Proceedings of the First International Conference on Inovative Conputing, Information and Control, 2006:269-272.
  • 10Westfeld A, Wolf G. Steganography in a video con ferencing system[C]//Proc of Information Hiding, 1998,1525:32-47.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部