期刊文献+

一种基于游程编码的二值图像隐藏方案 被引量:2

A Black and White Image Concealment Method Based on Run-length Code
下载PDF
导出
摘要 提出了一种隐藏二值图像的方法,它利用游程编码技术实现对二值图像的无损压缩来减少对掩护载体的像素修改。实验结果表明,相对于传统的LSB隐藏方法,本算法在一定程度上能抵抗RS检测攻击,其载密图像在视觉上更不容易被察觉,秘密信息的安全性得到了增强。 This paper puts forward a method to conceal black and white image, which applies runlength code technique to realize non-damage compression to the white and black image in order for decrease the pixel modification to the covering carrier. The experimental results show that the algorithm can resist RS check attack in some degree compared with the traditional LSB concealment method, so the image with secret is not easy to be found in vision, the security of secret information increases.
机构地区 电子工程学院
出处 《舰船电子对抗》 2008年第2期86-88,共3页 Shipboard Electronic Countermeasure
关键词 游程编码 最不重要位 信息隐藏 安全性 run-length code least significant bit(LSB) information concealment security
  • 相关文献

参考文献5

  • 1[1]Petitcolas F,Anderson R,Kuhn M.Information hiding--a survey[J].Proceedings of IEEE,1999,87(7):1062-1078.
  • 2[4]Fridrich J.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,2001,8(4):22-28.
  • 3[5]Dumitrescu S,Wu X,Wang Z.Detection of LSB steganography via sample pair analysis[J].IEEE Transactions on signal processing,2003,51(7):1995-2007.
  • 4张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75
  • 5张新鹏,王朔中,张开文.抗统计分析的LSB密写方案[J].中国图象图形学报(A辑),2003,8(9):1055-1060. 被引量:22

二级参考文献9

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 3[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
  • 4[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
  • 5[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
  • 6[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
  • 7[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
  • 8[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html
  • 9Katzenbeisser Stefan等著 吴秋新等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001..

共引文献93

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部