期刊文献+

适用于灰度级信号的数据嵌入方法 被引量:3

Methods for Embedding Data in Gray-scale Signals
下载PDF
导出
摘要 针对灰阶信号载体,研究了高效数据嵌入方法。利用二元隐写编码和湿纸编码,对±1隐写提出了双层嵌入方法,证明了只要二元隐写码达到二元隐写的嵌入率上界,则对应的双层嵌入可达到±1隐写的嵌入率上界。进一步对±2隐写提出了三层嵌入方法,分析了三层嵌入与嵌入率理论上界的距离,分析结果表明,将双层嵌入和三层嵌入组合即可得到近似最优的±2隐写方法。 Efficient methods for embedding data in gray-scale signals are presented. By using binary steganographic codes and wet paper codes, a "double-layered" embedding scheme for ±1 steganography is proposed. It is proved out that the corresponding "double-layered" embedding can achieve the upper bound of ± 1 steganography if the bianry stego-code reaches the upper bound on embedding rate of binary steganography. A "triple-layered" embedding scheme for ± 2 steganography is presented. The distance between the "triple-layered" embedding and the upper bound is analysed. The results show that the near optimal embedding schemes for ± 2 steganography can be obtained by combining "double-layered" and "triple-layered" embedding methods.
出处 《南京理工大学学报》 CAS CSCD 北大核心 2008年第2期209-213,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60502039,60773039) 国家“863”计划基金(2007AA01Z477) 中国博士后科学基金(20070420096)
关键词 隐写码 矩阵编码 湿纸码 嵌入率 最大平均失真 steganographic codes matrix coding wet paper codes embedding rate maximum average distortion
  • 相关文献

参考文献11

  • 1Crandall R. Some notes on steganography [ EB/OL]. http://os.inf. tu-dresden.de/- westfeld/crandall. pdf, 2007 -01 - 15.
  • 2Westfeld A. FS-A steganographic algorithm: high capacity despite better steganalysis [ A ]. Proc of Information Hiding, the 4th International Workshop [ C]. Berlin: Springer-Verlag, 2001. 289 - 502.
  • 3Galand F, Kabatiansky G. Information hiding by coverings [ A ]. Proc of the IEEE Information Theory Workshop [C]. America: IEEE, 2004. 151 - 154.
  • 4Bierbrauer J, Fridrich J. Constructing good covering codes for applications in steganography [ EB/OL]. http ://www. ws. binghamton.edu/fridrich/Research/ stegocovsurveyOct07.pdf, 2007 - 04 - 03.
  • 5Schofeld D, Winkler A. Embedding with syndrome coding based on BCH codes [ A]. Proc of ACM the 8th Workshop on Multimedia and Security [ C]. New York: Association for Computing Machinery, 2006. 214 - 225.
  • 6Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions on Information Security and Forensics, 2006, 1 (5) : 590 - 594.
  • 7Fridrich J, Filler T. Practical methods for minimizing embedding impact in steganography [ EB/OL ]. http://www.ws. binghamton.edu/fridrich/Research/ main03.pdf, 2007 - 04 - 03.
  • 8Willems F, Dijk M. Capacity and codes for embedding information in gray-scale signals [ J]. IEEE Transactions on Information Theory, 2005, 51 (3):1 209- 1 214.
  • 9Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [ J ]. IEEE Communications Letters, 2006, 10 ( 11 ):781 - 783.
  • 10Fridrich J, Lisonek P. Grid coloring in steganography [ J]. IEEE Transactions on Information Theory, 2007, 53 (4): 1 547-1 549.

同被引文献45

  • 1Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C] //Proceedings of SPIE. Bellingham: Society of Photo Optical Instrumentation Engineers Press, 2003, 5020:131-142.
  • 2Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
  • 3Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [C]//Proceedings of SPIE. Bellingham: Society of Photo Optical Instrumentation Engineers Press, 2006, 6072:1-13.
  • 4Farid H. Detecting hidden messages using higher-order statistical models [C]//Proceedings of International Conference on Image Processing. Los Alamitos: IEEE Computer Society Press, 2002, 2:905-908.
  • 5Wu D C, Tsai W H. A steganographic method for images by pixel value differencing [J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
  • 6Yang C H, Weng C Y. Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497.
  • 7Hempstalk K. Hiding behind corners: using edges in images for better steganography [OL]. http://diit, sourceforge, net/ files/HidingBehindCorners, pdf.
  • 8Park Y R, Kang H H, Shin S U, et al. An image steganography using pixel characteristics [C] //Proceedings of Computational Intelligence and Security: International Conference (CIS 2005 Part 2). Heidelberg: Springer, 2005, 3802: 581-588.
  • 9Lin C C, Hsueh N L. A lossless data hiding scheme based on three-pixel block differences [J]. Pattern Recognition, 2008, 41(4): 1415-1425.
  • 10Wang C M, Wu N I, Tsai C S steganographic method with pixe modulus function [J]. Journal of 2008, 81(1): 150-158.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部