期刊文献+

一种基于小波变换的湿纸密写方法 被引量:3

Writing on Wet Paper Based on Wavelet Transform
下载PDF
导出
摘要 基于对湿纸密写与小波域内密写方法的研究,提出了一种新的小波域内的湿纸密写方法.这种方法依据图像局部邻域内的纹理复杂程度在小波系数中进行选择性的嵌入,而秘密信息接收者无需知道具体的密写方法,只需做简单的矩阵乘法操作就可以提取秘密信息,从而实现了秘密信息传输过程中密写方法的不可见性.实验表明,本文的密写方法除具有很好的鲁棒性外,在隐蔽性上比传统小波域内的密写方法有了很大提升,是一种非常实用的密写方法. Based on steganographic methods in wavelet domain and writing on wet paper, a new steganographic arithmetic in wavelet domain was proposed in this paper. The method selects images' wavelet coefficients based on the degree of texture complexity in the local neighborhood to embed secrete bits in them. The receivers can extract secret bits from carder images only by some matrix multiplications without knowing the formulas written by senders. Thus, the invisibility of arithmetic of this steganographic method is achieved in process of secrete information transmission. The experimental results of the proposed embedding method show a better robust performance against the methods of active attacks such as JPEG compression, noise addition and so on. And the security of the new method has been improved greatly compared with the classic wavelet steganographic methods because of its template of writing on wet paper.
出处 《天津大学学报》 EI CAS CSCD 北大核心 2008年第10期1172-1177,共6页 Journal of Tianjin University(Science and Technology)
基金 国家高科技研究发展(863)计划资助项目(2003AA84ts05)
关键词 信息安全 信息隐藏 密写 小波 湿纸密写 选择通道 人眼视觉系统 information security information hiding steganography wavelet writing on wet paper selection channel human visual system
  • 相关文献

参考文献7

  • 1Barni Mauro, Bartolini Franco, Piva Alessandro. Improved wavelet-based watermarking through pixel-wise masking [J]. IEEE Transactions on Image Processing, 2001,10(5) :783-791.
  • 2Xie Gui, Shen Hong.Toward improved wavelet-based watermarking using the pixel-wise masking model [C] //IEEE International Conference on Image Processing 2005, ICIP 2005. CA, USA, 2005, 1 : 689-692.
  • 3Wolfgang R B, Podilchuk C I, Delp E J. Perceptual watermarks for digital images and video [J]. Proc IEEE, 1999,87:1108-1126
  • 4Fridrich Jessica, Goljan Miroslav, Lisonek Petr, et al. Writing on wet paper[J].IEEE Transactions on Image Processing, 2005,53 (10) : 3923-3935.
  • 5Lewis A S, Knowles G. Image compression using the 2-D wavelet transform [J]. IEEE Transactions on Image Processing, 1992, 1 (2): 244-250.
  • 6Brent R P, Gao S, Lauder A G B. Random Krylov spaces over finite fields [ J ] . Discrete Math, 2003, 16 ( 2 ) : 276-287.
  • 7Farid H. Detecting Steganographic Message in Digital Images [R]. New Hampshire, Dartmouth College, 2001.

同被引文献22

  • 1罗清磊,章文,李卫华.基于本体的Web智能信息Agent[J].广东工业大学学报,2004,21(3):57-60. 被引量:2
  • 2梁小萍,何军辉,李健乾,黄继武.隐写分析——原理、现状与展望[J].中山大学学报(自然科学版),2004,43(6):93-96. 被引量:12
  • 3康志伟,刘劲,何怡刚.基于HVS的抗统计分析的小波域密写[J].国防科技大学学报,2007,29(3):76-80. 被引量:2
  • 4BARNI M, BARTOLIN1 F, PIVA A. Improved wavelet-based wa- termarking through pixel-wise masking [ J]. IEEE Transactions on linage Processing, 2001, 10(5) : 783 -791.
  • 5DO M N, VETI'ERLI M. The contourlet transform: an efficient di- rectional multiresolution image representation [ J]. IEEE Transac- tions on hnage Processing, 2005, 14( 12): 2091 -2106.
  • 6MATALON B, ELAD M, ZIBULEVSKY M. Improved denoising of images using modelling of a redundant contourlet transform [ C]// Proceedings of the SPIE Conference on Wavelets. Bellingham, WA: SPIE, 2005:617 - 628.
  • 7CAI X, ZHAO W. A novel algorithm for multifocus image fusion based on contourlet hidden Markov tree model [ C]// ICSP 2008: Proceedings of the 9th International Conference on Signal Process- ing. Piscataway: IEEE Press, 2008:1019-1022.
  • 8ESAKKIRAJAN S, VEERAKUMAR T, NAVANEETHAN P. Adap- tive vector quantization technique for retinal image compression [ CI//ICCCN 2008: Proceedings of the 2008 International Confer- ence on Computing, Communication mid Networking. Piscataway: IEEE Press, 2008:1 -4.
  • 9da CUNHA A L, ZHOU JIANPING, DO M N. The nonsubsampled contourlet transform: theory, design, and applications [J]. IEEE Transactions on Image Processing, 2006, 10(5) : 3089 - 3101.
  • 10王国新,平西建,张涛,许漫坤.空域LSB信息伪装及其隐写分析[J].计算机工程,2008,34(1):173-174. 被引量:8

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部