期刊文献+

基于双层湿纸嵌入的自适应图像隐写算法 被引量:1

Double-layered embedding based wet-paper-code adaptive steganography
下载PDF
导出
摘要 为了提高隐写系统抗统计检测的能力,对影响隐写算法统计安全性的因素进行了分析,得出减小载密图像统计失真的3条途径。以此为基础,提出一种基于双层湿纸嵌入的图像自适应隐写算法。该算法根据邻域相关性,选取局部环境噪声强的像素作为嵌入对象,利用"湿纸码(WPC)"在其最低有效位及次低有效位嵌入秘密信息。对未压缩图像库的实验表明,该方法比现有算法具有更好的抗统计检测性能。 In order to enhance the statistical security of a data hiding system,the factors that influenced the security of a steganography were analyzed.Three ways to reduce the statistical distortion of the stego-image were found: Increasing embedding efficiency,controlling modifying amplitude and choosing embedding position adaptively.According to the three ways,a new adaptive steganography based on double-layered embedding method was proposed.The new scheme chose pixels under strong noise background as message carrier and embedded secrets in their least significant and second least significant bit-planes.The experimental results on uncompressed images show that the proposed steganography outperforms the prior algorithm for resisting blind steganalysis.
出处 《计算机应用》 CSCD 北大核心 2011年第5期1280-1283,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(6090322160970142)
关键词 自适应隐写 邻域相关性 隐写模型 抗盲检测 双层嵌入 adaptive steganography local correlation embedding model resisting blind steganalysis double-layered embedding
  • 相关文献

参考文献19

  • 1张卫明,张新鹏,王朔中.适用于灰度级信号的数据嵌入方法[J].南京理工大学学报,2008,32(2):209-213. 被引量:3
  • 2YUJ-G,YOON E-J,SHIN S-H,et al.A new image steganogra-phy based on 2k correction and edge-detection. Proceedingsof the Fifth International Conference on Information Technology . 2008
  • 3WANG CHAO,LI XIAO-LONG,YANG BIN,et al.A content-a-daptive approach for reducing embedding impact in steganography. ICASSP:2010 IEEE International Conference on AcousticsSpeech and Signal Processing . 2010
  • 4WANG Y,MOULIN P.Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on InformationForensics and Security . 2007
  • 5Fridrich J,Soukal D.Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security . 2006
  • 6Zhang, W,S. Wang,X. Zhang.Improving embedding efficiency of covering codes for applications in steganography. IEEE Communications Letters . 2007
  • 7Willems F,Dijk M.Capacity and codes for embeddinginformation in gray-scale signals. IEEE Transac-tions on Information Theory . 2005
  • 8Kruppa H,Castrillo′n Santana M,Schiele B.Fast and robust face finding via local context[EQ/OL]. http:∥cite-seerx.ist.psu.edu/viewdoc/download?doi=10.1.1.5.984&rep=rep1&type=pdf . 2010
  • 9Fridrich J,,Goljan M,Lisonek P,et al.Writing on wet paper. IEEE Transactions on Signal Processing . 2005
  • 10MIELIKAINENJ.LSB matching revisited. IEEE Signal Processing Letters . 2006

二级参考文献11

  • 1Crandall R. Some notes on steganography [ EB/OL]. http://os.inf. tu-dresden.de/- westfeld/crandall. pdf, 2007 -01 - 15.
  • 2Westfeld A. FS-A steganographic algorithm: high capacity despite better steganalysis [ A ]. Proc of Information Hiding, the 4th International Workshop [ C]. Berlin: Springer-Verlag, 2001. 289 - 502.
  • 3Galand F, Kabatiansky G. Information hiding by coverings [ A ]. Proc of the IEEE Information Theory Workshop [C]. America: IEEE, 2004. 151 - 154.
  • 4Bierbrauer J, Fridrich J. Constructing good covering codes for applications in steganography [ EB/OL]. http ://www. ws. binghamton.edu/fridrich/Research/ stegocovsurveyOct07.pdf, 2007 - 04 - 03.
  • 5Schofeld D, Winkler A. Embedding with syndrome coding based on BCH codes [ A]. Proc of ACM the 8th Workshop on Multimedia and Security [ C]. New York: Association for Computing Machinery, 2006. 214 - 225.
  • 6Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions on Information Security and Forensics, 2006, 1 (5) : 590 - 594.
  • 7Fridrich J, Filler T. Practical methods for minimizing embedding impact in steganography [ EB/OL ]. http://www.ws. binghamton.edu/fridrich/Research/ main03.pdf, 2007 - 04 - 03.
  • 8Willems F, Dijk M. Capacity and codes for embedding information in gray-scale signals [ J]. IEEE Transactions on Information Theory, 2005, 51 (3):1 209- 1 214.
  • 9Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [ J ]. IEEE Communications Letters, 2006, 10 ( 11 ):781 - 783.
  • 10Fridrich J, Lisonek P. Grid coloring in steganography [ J]. IEEE Transactions on Information Theory, 2007, 53 (4): 1 547-1 549.

共引文献2

同被引文献9

  • 1王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
  • 2Fridrich J, Goljan M, Lisonek P, et al. Writing on Wet Paper[J]. IEEE Trans. on Signal Processing, 2005, 53(10): 3923-3935.
  • 3Fridrich J, Goljan M, Soukal D. Efficient Wet Paper Codes[C]// Proc. of the 7th International Conference on Information Hiding. Berlin, Germany: Springer-Verlag, 2005.
  • 4Fridrich J, Goljan M, Soukal D. Wet Paper Codes with Improved Embedding Efficiency[J]. IEEE Trans. on Information Forensics and Security, 2006, 1(1): 102-110.
  • 5Liao Xin, Wen Qiaoyan. Embedding in Two Least Significant Bits with Wet Paper Coding[C]//Proc. of International Conference on Computer Science and Software Engineering. Washington D. C., USA: IEEE Computer Society, 2008: 555-558.
  • 6Zhang Weiming, Zhang Xinpeng, Wang Shuozhong. Maxi- mizing Steganographic Embedding Efficiency by Combing Hamming Codes and Wet Paper Codes[M]//Solanki K, Sullivan K, Madhow U. Information Hiding. Berlin, Germany: Springer-Verlag, 2008.
  • 7张卫明,张新鹏,王朔中.适用于灰度级信号的数据嵌入方法[J].南京理工大学学报,2008,32(2):209-213. 被引量:3
  • 8戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(B12):35-38. 被引量:10
  • 9朱雪秀,刘九芬,张卫明.一种基于汉明码和湿纸码的隐写算法[J].电子与信息学报,2010,32(1):162-165. 被引量:13

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部