期刊文献+

一种基于多变换的LSB隐写算法 被引量:2

An Improve LSB Hide Algorithm Based on Multi-Transformation
下载PDF
导出
摘要 本文对传统的ISB隐写算法进行了研究,提出了一种新的LSB隐写方法,该方法利用多种变换实现信息隐藏。实验及理论分析结果表明,该方法可以抵御RS分析及统计分析的攻击,提高传统LSB隐写算法的安全性。 This paper firstly introduces the traditional LSB information hiding scheme, then proposes an improved LSB algorithm. This algorithm implements the information by many kinds of transformation. Theoretical analysis and experimental results demonstrate that the information hiding scheme can effectively resist both RS and statistics analyses, and improve the security of traditional LSB scheme.
出处 《计算机科学》 CSCD 北大核心 2007年第10期106-109,共4页 Computer Science
基金 本课题得到河南省教委自然科学基金支持(2006520014)。
关键词 信息隐藏 LSB算法 密写分析 安全性 Information hiding, LSB algorithm, Steganalysis, Security
  • 相关文献

参考文献10

  • 1陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,33(2):21-23. 被引量:37
  • 2Wu D C, Tsai W H. A steganographic method for images by pixel-value differencing[J]. Pattern Recognition Letters, 2003, 24: 1613-1626
  • 3Zhang X,Wang S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005,12(1) : 67-70
  • 4Chang C C, Tseng H W. A Steganographic method for digital images using side match[J]. Pattern Recognition Letters, 2004, 25:1431-1437
  • 5夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:20
  • 6Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia (Special Issue on Security), 2001 , 8 (4) : 22-28
  • 7Fridrich J, Du R, Long M. Steganalysis of LSB encoding in color Images[R]. ICME'2000, New York, USA, 2000
  • 8邓倩岚,林家骏.基于统计的LSB隐写分析方法[J].计算机安全,2006(1):23-24. 被引量:2
  • 9Westfeld A, Pfitzmann A. Attacks on steganographic systems [J]. Lecture Notes in Computer Science, 1999,1768:61-76
  • 10Ker A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005,12(6):441-444

二级参考文献25

  • 1[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 2[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 3[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23
  • 4[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230
  • 5[5]Avcbas, B Sankur. Statistical analysis of image quality measures. The 10th European Signal Processing Conf(EUSIPCO'2000), Tampere, Finland, 2000
  • 6[6]A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proc of Information Hiding, Third Int'l Workshop, LNCS 1768. Berlin Heidelberg: Springer-Verlag, 2000. 61~76
  • 7[7]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia(Special Issue on Security), 2001, 8(4): 22~28
  • 8[8]J Fridrich, R Du, M Long. Steganalysis of LSB encoding in color images. ICME'2000, New York, USA, 2000
  • 9[9]Y K Lee, L H Chen. An adaptive image steganographic model based on minimum-error LSB replacement. The 9th National Conf on Information Security, Taichung, Taiwan, 1999
  • 10[10]H Farid. Detecting steganographic messages in digital images. Dartmouth College, Tech Rep: TR2001-412, 2000

共引文献55

同被引文献3

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部