期刊文献+

基于EMD的DEM数据信息伪装技术 被引量:6

Information disguising for DEM data Via EMD
下载PDF
导出
摘要 提出了一种全新的基于经验模态分解的数字高程模型(DEM)数据伪装技术。首先利用SHA-256单向Hash函数产生由种子控制的伪随机序列,扩充序列后再用经验模态分解生成用于伪装的DEM数据,伪装后的DEM数据具有较高的视觉欺骗性。同时针对DEM数据提出了广义直方图的概念,通过修改广义直方图在伪装的DEM数据中以便可逆地嵌入水印。本方法保证提取水印后可完全恢复伪装DEM数据以及使用种子可完全还原秘密DEM数据,算法安全性较高。 A new information disguising method based on empirical mode decomposition was proposed in this paper. The pseudorandom sequence controlled by seeds of the SHA-256 one-way hash function was generated, and Digital Elevation Model (DEM) data for disguising was achieved by decomposing the expanded pseudorandom sequence via EMD. The high vision fraudulence was obtained for disguised DEM data. Furthermore, the concept of the generalized histogram for DEM data was also proposed and the watermarking was reversibly embedded in the disguised DEM data by modifying its generalized histogram. The disguised DEM data could be completely reconstructed without any distortion from the marked data after the watermark had been extracted. The secret DEM data could be recovered via the seed. The proposed algorithm is of high security.
出处 《计算机应用》 CSCD 北大核心 2007年第6期1345-1348,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60573027 60603014)
关键词 信息伪装 数字高程模型数据 经验模态分解 广义直方图 可逆数字水印 information disguising Digital Elevation Model (DEM) data Empirical Mode Decomposition (EMD) generalized histogram reversible digital watermarking
  • 相关文献

参考文献11

  • 1信息伪装一种崭新的信息安全技术[J].中国图象图形学报(A辑),1998,3(1):83-86. 被引量:24
  • 2张雷,平西建,张涛.一阶统计特征保持的图像信息伪装算法[J].计算机辅助设计与图形学学报,2005,17(1):99-104. 被引量:4
  • 3张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:74
  • 4杨尚英,朱虹,李永盛.一种数字图像的信息伪装技术[A].信息隐藏[C].西安:西安电子科技大学出版社,2001:170-174.
  • 5罗永,成礼智,吴翊,徐志宏.基于模糊关系的DEM数据信息伪装技术研究[J].模糊系统与数学,2004,18(3):116-120. 被引量:10
  • 6CELIK MU,SHARMA G,TEKALP AM,et al.Lossless Watermarking for Image Authentication:A New Framework and an Implementation[J].IEEE Transactions on Image Processing,2006,15(4):1042-1049.
  • 7NI Z,SHI Y-Q,ANSARI N,et al.Reversible Data Hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354 -362.
  • 8HANDSHUH H,GILBERT H.Evaluation Report Security Level of Cryptography SHA-256[R].Technical Report,Issy-les-Moulineaux,2002.
  • 9GILBERT H,HANDSHUH H.Security Analysisof SHA-256 and Sisters[A].Lecture Notes in Computer Science[C].3006.175 -193.
  • 10HUANG NE,SHEN Z,LONG SR.The empiric al mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis[J].Proceedings of the Royal Society of London,A,1998,454:903-995.

二级参考文献16

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding--A survey[J]. Proceedings of IEEE: Special Issue on Protection of Multimedia Content, 1999, 87(7): 1062~1078.?A
  • 2Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in grayscale and color images[A]. In: Proceedings ACM, Special Session on Multimedia Security and Watermarking, Ottawa, 2001. 27~30.
  • 3Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia, Special Issue on Security, 2001, 8(4): 22~28.
  • 4Dumitrescu Sorina, Wu Xiaolin, Wang Zhe. Detection of LSB steganography via sample pair analysis[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2003. 355~372.
  • 5Zhang Tao, Ping Xijian. Reliable detection of LSB steganography based on the difference image histogram[A]. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Hong Kong, 2003. 545~548.
  • 6Hideki Noda1, Jeremiah Spaulding, Mahdad N, et al. Bit-plane decomposition steganography combined with JPEG2000 compression[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2003. 295~309.
  • 7Eggers Joachim J, Bauml R, Girod B. A communications approach to image steganography[A]. In: Proceedings of SPIE Vol. 4675, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002. 26~37.
  • 8Sviatoslav Voloshynovskiy, Thierry Pun. Capacity-security analysis of data hiding technologies[A]. In: Proceedings of IEEE International Conference on Multimedia and Expo, Lausanne, 2002. 477~480.
  • 9Franz Elke. Steganography preserving statistical properties[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2002. 278~294?A.
  • 10Shamos M I, Hoey D. Closeset-point problems[A]. Proceeding of the 16th Annual IEEE Symposium on Foundation of Computer Science[C]. Berkeley, CA, 1976:208~215.

共引文献102

同被引文献89

引证文献6

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部