期刊文献+

lαβ与组合位平面技术在信息隐藏算法中的应用 被引量:3

Application of lαβ and combination bit plane in information hiding scheme
下载PDF
导出
摘要 利用lαβ域对颜色的控制力和图像位平面的嵌入策略特点,按照提出的组合位平面规则l、α、β分量图进行改变。在l中嵌入鲁棒参数,以RAID4方式在α和β中嵌入隐藏信息。应用混沌映射和遗传算法提高信息与载体一致性,并以骑士巡游路线在各位平面上进行遍历。实验表明,不可见性与鲁棒性平均提高8.94%和9.88%。 Based on controllability of lαβ domain to color and embedding strategy of image bit plane,l,α,β component images are changed according to proposed Combination Bit Plane(CBP) rule.Embed robustness parameter in l,hiding data in α and β by RAID4 and traverse all bit planes with Knight-tour route.Moreover,consistence of information and original image is improved with chaotic map and genetic algorithm.Experimental results show that imperceptibility and robustness are improved by 8.94% and 9.88% averagely.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第20期10-12,22,共4页 Computer Engineering and Applications
基金 国家部委基础科研资助项目
关键词 信息隐藏 lαβ颜色模式 组合位平面 混沌映射 遗传算法 骑士巡游 information hiding lαβ combination bit plane chaotic map genetic algorithm Knight-tour
  • 相关文献

参考文献6

  • 1Zhu Geng-ming,Sang Nong,Xiang De-sheg,et al.Watermark algorithm research and simulation based on different frequency coefficients[C]//Proceedings of International Conference on Advanced Computer Theory and Engineering,ICACTE,Phuket,Thailand,2008.IEEE Computer Soe, USA, 2008 : 271-275.
  • 2Zhang Xin-peng,Wang Shuo-zhong.Fragile watermarking with errorfree restoration capability[J].IEEE Transactions on Multimedia,2008, 10(8) : 1490-1499.
  • 3Tai Yu-wing,Jia jia-ya,Tang Chi-keung.Local color transfer via probabilistic segmentation by expectation-maximization[C]//Proceedings of the 2005 1EEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA, 2005,1 : 747-754.
  • 4Goldberg D E.Genetic algorithms in search,optimization,and machine learning[M].New Jersey:Addison Wesley Publishing Company, 2007 : 237-251.
  • 5Bai Sen,Liao Xiao-feng,Qu Xiao-hong,et al.Generalized knight's tour problem and its solutions algorithm[C]//Proceedings of International Conference on Computational Intelligence and Security. New York, USA : IEEE Press, 2006 : 570-573.
  • 6Ruderman D L,Cronin T W,Chiao C C.Statistics of cone responses to natural images:Implications for visual coding[J].Journal of Optical Society of America(A), 1998,15(8) :2036-2045.

同被引文献23

  • 1徐涛,吴登峰,刘杰,魏连鑫,宋广才.多小波正交扩充算法在图像处理中的应用[J].吉林大学学报(工学版),2006,36(5):778-781. 被引量:3
  • 2吴晓荣,何明一,张易凡.基于多小波分解的多光谱图像矢量融合[J].电子与信息学报,2007,29(4):789-794. 被引量:5
  • 3PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix [ J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2) : 215 - 224.
  • 4ZHANG T, MUD J, REN S. Information Hiding (IH) algorithm based on Gaussian pyramid and GHM ( Geronimo Hardin Massopust) multi-wavelet transformation [ J]. International Journal of Digital Content Technology and its Applications, 2011, 5(3) : 210 -218.
  • 5ZITZMANN C, COGRANNE R, RETRAINT F, et al. Statistical decision methods in hidden information detection [ C]//Proceedings of the 13th International Conference on Information Hiding. Berlin: Springer-Verlag, 2011:163 - 177.
  • 6CHUI C K, LIAN J. A. A study of orthonormal multi-wavelets [ J]. Applied Numerical Mathematics, 1996, 20(3) : 273 - 298.
  • 7AN Z Y, ZHAO F. Image retrieval based on the energy and entro- py of multiwavelets transform [ C]/! ITCS'09: Proceedings of the 2009 International Conference on Information Technology and Com- puter Science. Washington, DC: IEEE Computer Society, 2009: 544 - 547.
  • 8REINHARD E, ASHIKHMIN M, GOOCH B, et ol. Color transfer between images [ J]. IEEE Computer Graphics and Applications, 2001, 21(5) :34 -40.
  • 9ZHAO Ming-wei,DANG Yan-zhong.Color Image Copyright Protection Digital Watermarking Algorithm based on DWT & DCT[C].Proc of the 4th International Conference on Wireless CommunicationsiNetworking and Mobile Computing,2008:659-662.
  • 10Mitra P,Gunjan R,Gaur M S.A Multi-resolution Watermarking based on Contourlet Transform Using SVD and Q Recomposition[J].Recent Advances in Computing and Software Systems,2012,25(27):135-140.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部