期刊文献+

基于数字图像隐写容量的分析 被引量:2

Capacity Analysis of Steganography Based on the Digital Images
下载PDF
导出
摘要 介绍了基于数字图像隐写容量分析的最新研究成果,重点介绍了安全性限制下针对不同的隐写信道模型的隐写容量的分析和在选择给定的载体方法和失真约束条件下对一个具体图像的隐写容量计算.最后对已有的容量分析结果进行了分类,并给出了下一步研究的方向. This paper presents the recent research of capacity analysis based on the digital images. It emphasizes the capacity analysis of steganography in the security restrictions for different models of stego - channel. Meanwhile, it computes the capacity of a specific image in a given method of cover selection and distortion restrictions. Finally, we classify the capacity analysis results given and provide some next research aspects.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第4期72-75,共4页 Microelectronics & Computer
关键词 信息隐藏 隐写容量 隐写信道 容量分析 information hiding steganographic capacity stego-ehannel capacity analysis
  • 相关文献

参考文献8

  • 1Moulin P, Wang Y. New results on steganography[C].Proc. of CISS. USA: Polytechnic University, 2004.
  • 2Moulin P, Mihcak M K. A framework for evaluating the data-hiding capacity of image sources[J]. IEEE Trarus on Image Processing, 2002, 11(9) : 1029 - 104.
  • 3Chandramouli R, Memon N D. Steganography capacity: a steganalysis perspective[C].SPIE Security and Watermaking of Multimedia Contents V. NEC,2003:173 - 177.
  • 4Jeremiah Joseph Haramsen, Secure capacity of steganographic systems[C]. USA: Rensselaer Polytechnic institute,2005.
  • 5张雪锋,范九伦.基于图像融合的数字图像隐藏技术[J].微电子学与计算机,2007,24(2):188-190. 被引量:7
  • 6周治平,张彪,纪志成.图像隐写分析及其硬件实现原理[J].微电子学与计算机,2007,24(2):202-205. 被引量:1
  • 7Mehdi Kharrazi. Image steganography and steganalysis [ M]. Heidelberg: Springer Berlin, 2006: 35 - 49.
  • 8Harmsen J, Pearlman W. Capacity of steganographoic channels[C].Proc, of the 7th workshop on Multimedia and Security. New York, 2005 : 11 - 24.

二级参考文献13

  • 1刘建东.基于超混沌序列的自适应数字图像隐藏算法[J].微电子学与计算机,2005,22(3):1-4. 被引量:10
  • 2付昱,高明伦,杜高明.一种FPGA验证系统串口通信的实现方法[J].微电子学与计算机,2005,22(5):43-45. 被引量:2
  • 3钱松,周钦,俞军.AES算法的一种高效FPGA实现方法[J].微电子学与计算机,2005,22(7):89-91. 被引量:8
  • 4孙燕飞,王凤英,周运明,贾永新.基于双混沌系统的数字水印技术[J].微电子学与计算机,2005,22(8):114-116. 被引量:10
  • 5Jessica Fridrich,Miroslav Goljan.On estimation of secret message length in LSB steganography in spatial domain[C].In:Proc EI SPIE Jose San,CA,2004,(1):5306
  • 6Westfeld A.F5-A steganographic algorithm[C].In 4th International Workshop on Information Hiding.Lecture Notes in Computer Science,2137.Spring-Verlag,2001:289~302
  • 7R Chandramouli.A mathmetical approach to steganalysis[C].In:Proc of SPIE on Security and Waermarking of Multimedia Contents Ⅳ,Electronic Imageing,2002:4675
  • 8J Fridrich,M Goljan,D Soukal.Searching for the stego key[C].Security,Steganography and Watermaking of Multimedia Contents of EI SPIE,2004,5306:70~82
  • 9Jessica Fridrich,Miroslav Goljan,David Soukal,et al.Forensic steganalysis:determining the stegokey in spatial domain steganography[C].In:Proc EI SPIE Jose San,CA,2004
  • 10Shalin Trivedi,R Chandramouli.Secret key estimation in sequential steganography[J].IEEE Transactions on Signal Processing,2005,53 (2)

共引文献6

同被引文献14

  • 1肖洪华,黄永峰,朱明方.基于最低有效位和最高有效位替换法的熵理论模型[J].中山大学学报(自然科学版),2004,43(A02):42-45. 被引量:2
  • 2刘鸿霞,夏春和.图像隐写分析现状研究[J].计算机工程与设计,2006,27(1):21-25. 被引量:9
  • 3鲁宏伟,万宝平.一种基于BMP图像的秘密信息隐藏算法[J].武汉理工大学学报,2006,28(6):96-98. 被引量:4
  • 4黄继风.数字图像隐秘信息的检测与定位算法[J].微电子学与计算机,2007,24(7):98-101. 被引量:2
  • 5Alvaro A Cairdenas, George V Moustakides, John S Baras. Towards optimal design of data hiding algorithms against nonparametric adversary models[ C] //Information Sciences and Systems, CISS ' 07.41st Annual Conference. Balti- more, 2007:911-916.
  • 6Harmsen J, Pearlman W. Capacity of steganographoic channels[C]//Proc, of the 7th workshop on Multimedia and Security. New York, 2005(1/2) : 11 - 24.
  • 7Pierre Moulin, Kivanc Mihca M. The parallel - gaussian watermarking game [J ]. IEEE Transactions on Information Theory, 2004,50(20) : 1 - 6.
  • 8Harmsen J. Secure capacity of steganographic systems[D]. New York, Polytechnic Institute Troy, 2005.
  • 9Pierre Moulin, Joseph A O' Sullivan. Information - theoretic analysis of information hiding[J ]. IEEE Transactions on Information Theory, 2003,49(2) : 19 - 23.
  • 10Jiang Cuiling, Lin Jiajun, Pang Yilin. Capacity analysis of steganography based on the digital images under the constraints of security[ C]//International Conference on Audio, Language and Image Processing. Shanghai: East China University of Sci. & Technd., 2008(7) :909 -912.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部