期刊文献+

用于EZW编码图像中的安全隐写算法

Secure steganographical algorithm for EZW-encoded images
下载PDF
导出
摘要 提出一种EZW编码图像中的安全隐写算法,该算法以嵌入前后EZW重构小波系数分布的相对熵作为安全指标,采用熵解码变换的方法,将数据比特映射为具有指定分布的0/1比特,并利用量化嵌入机制实现数据的嵌入.所提算法可实现载体和隐写信号一阶统计特性的保持,因此具有一阶的统计安全性.实现结果同时表明,该算法在容量、感知质量和安全性上具有较好的综合性能. A secure steganographical algorithm is proposed.The algorithm takes the relative entropy of the EZW(embedded zerofree wavelet)-reconstructed wavelet coefficient distributions before and after data embedding as the security object,and uses the entropy decoding transformation method to map the data bits to the bit sequence with given distribution and perform data embedding based on quantization.The proposed method can hold the first-order statistics,so it has the first-order security.The experimental results also show that the proposed algorithm has better synthetic performance in capacity,perceptibility quality and security.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第6期975-980,共6页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(60374066).
关键词 隐写 EZW 相对熵 量化嵌入 steganography embedded zerofree wavelet relative entropy quantization-based embedding
  • 相关文献

参考文献15

  • 1Shapiro J M. Embedded image coding using zerotrees of wavelet coefficients [ J ]. IEEE Transaction on Signal Processing, 1993,41 (12) : 3445 - 3462.
  • 2Spaulding J, Noda H, Shirazi M N, et al. BPCS steg-anography using EZW lossy compressed images [ J ]. Pattern Recognition Letters, 2002, 23 ( 13 ) : 1579 - 1587.
  • 3Pla O G, Lin E T, Delp E J. A wavelet watermarking algorithm based on a tree structure [ C ]//Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VI. San Jose, CA, 2004:571 - 580.
  • 4郭越,程景云.基于视觉感知与EZW的自适应公开水印算法[J].复旦学报(自然科学版),2004,43(5):907-909. 被引量:2
  • 5翁洁琼,张志浩,来可伟.一种复合型自适应数字水印算法[J].计算机应用,2005,25(3):557-559. 被引量:1
  • 6Kwak W G, Park R H. Data hiding using bit repetition in the wavelet significant tree structure [ C ]//Proceedings of lASTED International Conference Signal and Image Processing. Malaga, Spain, 2002: 520- 524.
  • 7Michiharu N, Richard O, Hideki N, et al. Intensity histogram steganalysis in BPCS-steganography [ C ]//Proceedings of SPIE, Security, Steganography and Water- marking of Multimedia Contents Ⅲ. San Jose, CA, 2001 : 555 - 564.
  • 8Yu X Y, Tan T N, Wang Y H. Reliable detection of BPCS-steganography in natural images [ C ]//Proceedings of the 3rd International Conference on Image and Graphics. Hong Kong, China, 2004:333 -336.
  • 9Cachin C. An information-theoretic model for steganography [ J ]. Information and Computation, 2004, 192 (1):41-56.
  • 10Provos N. Defending against statistical steganalysis [ C ]//Proceedings of lOth USENIX Security Symposium. Washington DC, USA, 2001:323 - 336.

二级参考文献6

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部