期刊文献+

二值图像中的数据隐藏算法 被引量:12

Data Hiding in Binary Images
下载PDF
导出
摘要 本文证明了在一个m×n的二值图像块中至多改变1个像素时所能隐藏的比特数的上界为﹂(log2(mn+1)」,并实际构造了达到此上界的信息隐藏算法.文中归纳了一些选择修改像素位置的规则,较好地保持了数据嵌入后图像的质量.对算法的鲁棒性和安全性进行了分析.用3个例子—数字手写签名中认证信息的嵌入、二值电子文档的窜改检测和卡通图像中注释信息的嵌入说明了本文算法可能的应用. This paper proposes a method to embed data in binary iro.ages with high ernbedding capacity. It is proved that, given an m × n image block of the host image, the upper bound of the amount of bits that can be embedded in that block is 「(log2(mn+1)」 by changing at most 1 pixel in the block. An algorithm whose embedding capacity can reach the bound is then constructed. We also summarize some rules for selecting pixels to be changed in order to maintain higher quality of the host image after data hiding. The robustness and security of the proposed algorithm is analyzed. Three examples,data hiding in digital handwritten signature, temper detection of digital binary documents, and invisible annotation for cartoon image are tested to illustrate the potential applications.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第11期2409-2415,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.60775011) 北京市教育委员会科技发展计划项目
关键词 数据隐藏 数字水印 图像认证 二值图像 data hiding digital watermarking image authentication binary image
  • 相关文献

参考文献13

  • 1I J Cox,M L Miller. The first 50 years of electronic watermarking[J]. Applied Signal Processing,2002,56(2) :126- 132.
  • 2F A P Petitcolas, R J Anderson, M G Kuhn. Information hidinga survey[ J ]. Proceedings of the IEEE, 1999, 87 (7) : 1062 - 1078.
  • 3F Hartung,M Kutter. Multimedia watermarking techniques, proceedings of the IEEE[J]. 1999,87(7) :1079 - 1107.
  • 4I J Cox, M L Miller, J A Bloom, J Fridrich, T Kalker. Digital Watermarking and Steganography ( Second Edition) [M]. San Mateo,CA:Morgan Kaufmann,2008.1 - 13.
  • 5M Yeung,F Mintzer. Invisible watermarking for image verification[ J]. J. of Electronic Imaging, 1998,7 (3) : 578 - 591.
  • 6I Cox, J Kilian, T Leighton, T Shamoon. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans. Image Processing, 1997,6(12) : 1673 - 1687.
  • 7K Matsui, K Tanaka. Video-steganography: how to secretly embed a signature in a picture[J].Proc.IMA Intellectual Property Project, 1994,1 (1) :187 - 206.
  • 8M Fu, O Au. Data hiding by smart pair toggling for halftone images[ A]. Proc. IEEE Inter. Conf. On Acoustics, Speech, and Signal Processing[ C ]. Istanbul, Turkey, 2000.2318 - 2321.
  • 9N F Maxemchuk, S Low. Marking text document [ A ]. Proc.IEEE ICIP'97[C]. Santa Barbara,CA,USA, 1997.13 - 13.
  • 10E Koch, J Zhao. Embedding robust labels into images for copyright protection[A]. Proc. Inter. Congr. Intellectual Property Rights for Specialized Information, Knowledge and New Technologies[C].Hamburg, Germany, 1995.242 - 251.

同被引文献102

引证文献12

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部