期刊文献+

基于可容忍失真范围的数字图像隐写方法研究 被引量:2

Digital Image Steganography Based on Tolerable Error Range
下载PDF
导出
摘要 以往的基于可容忍失真范围的隐写方案可以将隐写引起的失真控制在一定范围,但需要同时具备含密图像与原始图像才能提取秘密信息。提出了一种新的基于可容忍失真范围的隐写方案,该方案以一定质量因子的JPEG压缩作为可容忍失真,嵌入信息时仅在可容忍失真范围内改动原始图像,并具有含密图像的JPEG压缩版本与原始图像的JPEG压缩版本完全一致的特性,因此接收端不需原始图像,只要将含密图像与其JPEG压缩版本相减,便可提取出秘密信息,克服了原有此类方法需要原始图像才能提取秘密信息的缺点。实验结果表明,用该方案隐写所得到含密图像不仅在质量上优于其对应的JPEG压缩版本的质量,而且具有一定的抗分析安全性。 Previous proposed steganographic schemes based on tolerable error range(TER) can restrict the distortion caused by data-hiding within an accepted range, but both the stego-image and the original cover image are necessary for extracting the secret message. This paper presents a novel TER-based steganographic scheme, in which JPEG compression under a certain quality factor is regarded as TER, and the modification caused by data-hiding on each pixel is less than that caused by JPEG compression. Furthermore, the JPEG version of a stego-image is completely the same as that of the corresponding original one. At receiver side, the embedded secret data can be extracted by subtracting the stego-image from its JPEG version, so that the original cover is needless. Experimental results show that the presented scheme can gain a stego-image which is superior to its JPEG version in quality, and possesses a capability of withstanding the statistical analysis.
出处 《中国图象图形学报》 CSCD 北大核心 2007年第2期212-217,共6页 Journal of Image and Graphics
基金 国家自然科学基金项目(60372090 60502039) 上海市科委基础研究重点项目(04JC14037) 上海市青年科技启明星计划(06QA14022)
关键词 隐写 JPEG压缩 可容忍失真范围 steganography, JPEG compression, tolerable error range(TER)
  • 相关文献

参考文献10

  • 1Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding-a survey[J].Proceedings of IEEE,1999,87(7):1062 - 1078.
  • 2Wang H,Wang S.Cyber warfare-steganography vs.steganalysis[J].Communication of the ACM,2004,47 (10):76 - 82.
  • 3Noda H,Spaulding J,Shirazi M N,et al.Application of bit-plane decomposition steganography to JPEG2000 encoded images[J].IEEE Signal Processing Letters,2002,9 (12):410 - 413.
  • 4Wu D C,Tsai W H.A steganographic method for images by pixelvalue differencing[J].Pattern Recognition Letters,2003,24 (9 -10):1613 - 1626.
  • 5Zhang X,Wang S.Steganography using multiple-base notational system and human vision sensitivity[J].IEEE Signal Processing Letters,2005,12(1):67-70.
  • 6Wu D C,Tsai W H.Data hiding in images via multiple-based number conversion and lossy compression[J].IEEE Transactions on Consumer Electronics,1998,44(4):1406- 1412.
  • 7Chao H M,Hsu C M,Miaou S G.A data-hiding technique with authentication,integration,and confidentiality for electronic patient records[J].IEEE Transactions on Information Technology in Biomedicine,2002,6(1):46 -53.
  • 8Chang C C,Chuang J C,Lai Y P.Hiding data in multitone images for data communications[J].IEE Proc.-Vis.Image Signal Process,2004,151(2):137 - 145.
  • 9Dumistrescu S,Wu Xiao-lin,Wang Zhe.Detecting of LSB steganography via sample pair analysis[J].IEEE Transactions on Signal Processing,2003,51(7):1995 - 2007.
  • 10Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,2001,8(4):22 -28.

同被引文献11

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部