期刊文献+

应用二值图像信息隐藏技术实现彩色图像中的安全隐写 被引量:5

Steganography in Color Images Using a Binary Image Data Hiding Scheme
下载PDF
导出
摘要 该文提出一种以彩色图像为载体的安全隐写方法,应用二值图像信息嵌入技术,将隐蔽信息隐藏在颜色分量的较高层位面中,可实现优良的隐蔽性和较大的嵌入量.所使用的二值图像数据隐藏方案包括一组完备的规则,能够准确判断边缘像素是否可承载嵌入数据,保证嵌入数据的无差错盲提取,并可引入密钥以增强安全性.实验表明,在彩色图像中数据嵌入量达到每像素1.5 bits时视觉不可察觉,峰值信噪比保持在40 dB以上,直方图无异常,并能抵御多种有效的隐写分析算法,兼顾了隐蔽信息容量和安全性. A new method for hiding secret information in color images is proposed, in which bit planes are treated as binary images. A set of rules is used to check boundary pixels in the bit planes for data embedding eligibility. These rules can ensure correct extraction of the secret data from the stego-image without any other additional information. A key is introduced in identifying the eligible embedding positions to enhance security. Experiments show that, at an embedding rate of 1.5 bits per color pixel, the stego-images have no perceptual and histogram abnormality with PSNR values greater than 40 dB, and can resist several effective methods for steganalytical detection, achieving a good trade-off between security and embedding capacity.
出处 《应用科学学报》 CAS CSCD 北大核心 2007年第4期342-347,共6页 Journal of Applied Sciences
基金 国家自然科学基金资助项目(60372090 60502039)
关键词 隐写 彩色图像 二值图像 steganography color image binary image
  • 相关文献

参考文献4

二级参考文献25

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 3[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
  • 4[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
  • 5[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
  • 6[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
  • 7[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
  • 8[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html
  • 9Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey. Proc. IEEE, 1999, 87(7): 1062- 1078.
  • 10Wang H, Wang S. Cyber warfare -- Steganography vs.steganalysis. Communication ofACM, 2004, 47(10): 76 - 82.

共引文献46

同被引文献28

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部