期刊文献+

基于经验模式分解的数字高程模型数据伪装方法 被引量:8

Information Disguising for Digital Elevation Model Data via Empirical Mode Decomposition
下载PDF
导出
摘要 提出了一种基于经验模态分解(EMD)的数字高程模型数据伪装技术。首先利用SHA-256单向Hash函数产生由种子控制的伪随机序列,扩充序列后再用经验模态分解生成用于伪装的DEM数据,伪装后的DEM数据具有较高的视觉欺骗性。针对DEM数据提出了直方图的概念,通过修改直方图,在伪装的DEM数据中可逆地嵌入水印。本文方法可在提取水印后完全恢复伪装DEM数据,以及使用种子可完全还原秘密DEM数据,算法安全性高。 A novel information disguising method based on empirical mode decomposition is proposed. The pseudorandom sequence controlled by seeds of the SHA-256 one-way hash function is generated; and digital elevation model data for disguising is achieved by decomposing the expanded pseudorandom sequence via empirical mode decomposition(EMD). The high vision fraudulence is obtained for disguised DEM data. Furthermore, the concepts of the histogram for DEM data is also proposed; and the watermarking was reversibly embed- ded in the disguised DEM data by modifying its histogram. The disguised DEM data can be completely reconstructed without any distortion from the marked data after the watermark has been extracted. The secret DEM data can be recovered via the seed. The proposed algorithm owns high security.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第6期652-655,共4页 Geomatics and Information Science of Wuhan University
基金 湖南省科技计划资助项目(06CK3047) 湖南省教育厅重点资助项目(06A066) 湖南省教育厅科研项目(06C753)
关键词 信息伪装 数字高程模型 经验模态分解 直方图 可逆数字水印 information disguising digital elevation model data empirical mode decomposition histogram reversible watermarking
  • 相关文献

参考文献9

  • 1张雷,平西建,张涛.一阶统计特征保持的图像信息伪装算法[J].计算机辅助设计与图形学学报,2005,17(1):99-104. 被引量:4
  • 2张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75
  • 3杨尚英,朱虹,李永盛.一种数字图像的信息伪装技术--信息隐藏[M].两安:电子科技大学出版社,2001.
  • 4罗永,成礼智,吴翊,徐志宏.基于模糊关系的DEM数据信息伪装技术研究[J].模糊系统与数学,2004,18(3):116-120. 被引量:10
  • 5Celik M U, Sharma G, Tekalp A M. Lossless Watermarking for Image Authentication:a New Framework and an Implementation[J]. IEEE Trans on Image Processing, 2006, 15(4):1042-1049.
  • 6Ni Zhicheng, Shi Yunqing, Ansari N, et al. Reversible Data Hiding[J]. IEEE Trans on Circuits and Systems for Video Technology, 2006, 16 (3) : 354-362.
  • 7Gilbert H, Handshuh H. Security Analysis of SHA-256 and Sisters[C]. SAC2003, Ottawa, 2003.
  • 8Huang N E, Shen Z, Long S R. The Empirical Mode Decomposition and the Hilbert Spectrum for Nonlinear and Non-stationary Time Series Analysis [C]. The Royal Society, London, 1998.
  • 9Christophe Damerval, Sylvain Meignen. A Fast Algorithm for Bidimensional EMD[J]. IEEE Signal Processing Letters , 2005, 12(10) :701-704.

二级参考文献16

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding--A survey[J]. Proceedings of IEEE: Special Issue on Protection of Multimedia Content, 1999, 87(7): 1062~1078.?A
  • 2Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in grayscale and color images[A]. In: Proceedings ACM, Special Session on Multimedia Security and Watermarking, Ottawa, 2001. 27~30.
  • 3Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia, Special Issue on Security, 2001, 8(4): 22~28.
  • 4Dumitrescu Sorina, Wu Xiaolin, Wang Zhe. Detection of LSB steganography via sample pair analysis[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2003. 355~372.
  • 5Zhang Tao, Ping Xijian. Reliable detection of LSB steganography based on the difference image histogram[A]. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Hong Kong, 2003. 545~548.
  • 6Hideki Noda1, Jeremiah Spaulding, Mahdad N, et al. Bit-plane decomposition steganography combined with JPEG2000 compression[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2003. 295~309.
  • 7Eggers Joachim J, Bauml R, Girod B. A communications approach to image steganography[A]. In: Proceedings of SPIE Vol. 4675, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002. 26~37.
  • 8Sviatoslav Voloshynovskiy, Thierry Pun. Capacity-security analysis of data hiding technologies[A]. In: Proceedings of IEEE International Conference on Multimedia and Expo, Lausanne, 2002. 477~480.
  • 9Franz Elke. Steganography preserving statistical properties[A]. In: Proceedings of the Information Hiding: The 5th International Workshop, IH 2002, Noordwijkerhout, 2002. 278~294?A.
  • 10Shamos M I, Hoey D. Closeset-point problems[A]. Proceeding of the 16th Annual IEEE Symposium on Foundation of Computer Science[C]. Berkeley, CA, 1976:208~215.

共引文献81

同被引文献63

引证文献8

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部