期刊文献+

基于整数线性变换的无损隐秘传输方法 被引量:5

Lossless Covert Communication Method Based on Integer Linear Transform
下载PDF
导出
摘要 为了对图像进行无损隐秘传输,给出了一种新的基于整数线性变换处理的无损隐秘传输方法。该方法是用整数线性变换后的矢量替换原宿主矢量,其不需保存可修改矢量区域信息,就可较好地嵌入大数据量的机密信息在公共信道进行传输,而且在接收端提取机密信息后,能无损恢复原宿主图像。该方法已经过了测试,并获得了较好的结果,适用于医学图像中存储病人的病历信息及遥感、军事图像的信息隐秘传输等领域。 In order to realize lossless covert communication in image, a novel lossless covert communication method based on integer linear transform was proposed. The method uses integer linear transformed vector instead of original vector and need not to save the message of the revisable vector. Using the method the host data with large capacity secret information embedded can be transmitted in open channels. Host image can be recovered without any distortion from the marked image after the hidden data have been extracted. The scheme had been simulated and good experimental results were achieved. It can be applied to keeping case history in medical images and can also be used for covert communication in remote sensing images, military images and etc.
出处 《中国图象图形学报》 CSCD 北大核心 2007年第9期1562-1567,共6页 Journal of Image and Graphics
关键词 变换 嵌入/提取 无损 隐秘传输 transform, embedding&extracting, lossless, covert communication
  • 相关文献

参考文献14

  • 1Ramkumar M,Akansu A N.Signaling methods for multimedia steganography[ J].IEEE Transactions on Signal Processing,2004,52(4):1100-1111.
  • 2De Vleeschouwer C,Delaigle J F,Macq B.Circular interpretation of bijective transformations in lossless watermarking for media asset management[ J].IEEE Transactions on Multimedia,2003,5 (1):97-105.
  • 3Takahashi A,Nishimura R,Suzuki Y.Multiple watermarks for stereo audio signals using phsae-modulation techniques[ J ].IEEE Transactions on Signal Processing,2005,53(2):806-815.
  • 4田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 5程义民,谢于明,王以孝,郭志川.一种彩色视频信息的隐秘传输方法[J].中国图象图形学报(A辑),2005,10(1):93-97. 被引量:11
  • 6Ni Z C,Shi Y Q,Ansari N,et al.Reversible data hiding[ A ].In:Proceedings of the 2003 International Symposium on Circuits and Systems[C],Seoul,Korea,2003,2:912-915.
  • 7Tian J.Reversible data embedding using a difference expansion[ J ].IEEE Transactions on Circuits and Systems for Video Technology,2003,13 (8):890-896.
  • 8Celik M U,Sharma G,Tekalp A M,et al.Lossless generalized-LSB data embedding[ J].IEEE Transactions on Image Processing,2005,14(2):253-266.
  • 9Fridrich J,Goljan M,Du R.Invertible authentication[ A ].In:Proceedings of the SPIE,Security and Watermarking of Multimedia Content[ C ],San Jose,CA,USA,2001:197-208.
  • 10De Vleeschouwer C,Delaigle J F,Macq B.Circular interpretation on histogram for reversible watermarking[ A ].In:Proceedings of the IEEE International Multimedia Signal Processing Workshop[ C ],Cannes,France,2001:345-350.

二级参考文献14

  • 1[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033.
  • 3[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276.
  • 4[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472.
  • 5[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112.
  • 6[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90.
  • 7[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396.
  • 8[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231.
  • 9Frank Hartung, Bernd Girod. Watermarking of uncompressed and compressed video[J]. Signal Processing, 1998,66( 3 ) :283 - 301.
  • 10Tseng Yu-chee, Chen Yu-yuan, Pan Hsiang-kuang. A secure data hiding scheme for binary images [ J ]. IEEE Transactions on Communications,2002,50 ( 8 ) : 1227 - 1231.

共引文献24

同被引文献51

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2郭志川,程义民,王以孝,谢于明.一种无损的隐秘传输方法与仿真[J].系统仿真学报,2006,18(6):1638-1642. 被引量:7
  • 3祝玉新,孙星明,杨恒伏.基于Harr小波的彩色图像可逆水印算法[J].计算机应用研究,2007,24(6):165-166. 被引量:10
  • 4Fridrich J, Goijan M, Du R. Lossless data embedding- new paradigm in digital watermarking [ J ]. EURASIP Journal on Applied Signal Processing, Special Issue on Emerging Applications of Multimedia Data Hiding ,2002 (2) :185-196.
  • 5Fridrich J,Goijan M, Du R. Invertible authentication [ C ]//Proceedings of the SPIE, Security and Watermarking of Multimedia Contents. Washington, Bellingham: Society of Photo-Optical Instrumentation Engineers, 2001,4314 : 197-208.
  • 6Ni Z C, Shi Y Q, Ansari N, et al. Reversible data hiding [ C ]//IEEE Proceedings of the 2003 International Symposium on Circuits and System. Piscataway:Institute of Electrical and Electronics Engineers, 2003, 2 : 912-915.
  • 7Tian J. Wavelet-based reversible watermarking for authentication [C ]//Proceeding of SPIE, Security and Watermarking of Multimedia Contents. Washington, Bellingham: Society of Photo-Optical Instrumentation Engineers, 2003,4675 : 679-690.
  • 8Celik M U,Sharma G, Tekalp A M, et al. Lossless generalized-LSB data embedding [ J]. IEEE Transactions on Image Processing,2005,12 ( 2 ) : 157-160.
  • 9Arnold V I, Avez A, Ergodic. Problems of classical mechanics. Mathematical physics monograph series [ M ]. New York : W A Benjamin, Inc, 1968.
  • 10齐东旭.分形及其计算机生成[M].北京:科学出版社,1997.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部