期刊文献+

一种大容量的信息隐藏方法 被引量:3

Large capacity information hiding algorithm
下载PDF
导出
摘要 以载体信息每个字节的最高为1的位为标志位,通过对嵌入信息的数值进行调整,使隐秘信息的嵌入过程对原图像的改变较少,同时保证载体信息的标志位不必变,达到对嵌入信息无损提取。实验结果表明,算法对载体图像的改动小,提高了隐藏容量。 The maximum of 1 bits in each byte of the carrier information is considered as the flag bit.By adjusting the value of the embedded information,the process of inserting the secret information changes the original host image less,and guarantees the flag bit of the carrier information does not need to change so that extracting hidden information is completely blind extracting.The experimental result indicates that the proposed algorithm improves the hidden information capacity and the original host image is modified less.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第23期122-125,共4页 Computer Engineering and Applications
基金 广西自然科学基金No.0832104 广西教育厅项目(No.200607MS135)~~
关键词 隐写 信息隐藏 标志位 最低比特位 steganography information hiding flag bit least significant bit
  • 相关文献

参考文献14

二级参考文献41

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2Cox I J,Killian J,Leighton F T,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,6 (12):1673-1687.
  • 3Piva A.DCT-based watermark recovering without resorting to the uncorrupted original images[J].Proc of ICIP,1997,(1):520-523.
  • 4Hsu C-T,Wu J-L.Hidder signature in images[J].Proc of ICIP,1996,(3):223-226.
  • 5Tefas A, Pitas 1. Multi-bit Image Watermarking Robust to Gcometric Distortions. In: IEEE International Conierence on Image Processing (ICIP' 2000) CD-ROM, Vancouver, Canada, 2000-09: 10-13
  • 6Poularikas A D. The Transforms and Applications Handbook (2nd Edition). CRC Press, LLC, 2000
  • 7Joseph J K, Ruanaidh O, Pun T. Rotation, Scale and Translation Invariant Digital Image Watermarking. Signal Processing, 1998,66(3):303-317
  • 8Lin Chingyung, Wu Min, Bloom J A, et al. Rotation, Scale and Translation Resilient Watermarking for Images. In: IEEE Trans. on Image Processing, 2001,10(5):767-782
  • 9Cox I J, Miller M L, McKellips A. Watermarking as Communications with Side Information. Proc. IE
  • 10BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for Data Hiding[J].IBM Systems Journal,1996,35(3/4):313-336.

共引文献133

同被引文献16

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部