期刊文献+

整数小波域湿纸码自适应信息隐藏算法 被引量:3

Wet Paper Code Based Adaptive Steganography in IWT Domain
下载PDF
导出
摘要 通过对一些已有的自适应隐写算法进行分析,提出一种旨在提高安全性的整数小波域自适应信息隐藏算法.根据隐藏的数据量和载体单元特性确定阈值,自适应地在图像整数小波高频子带系数中选择合适的隐藏位置;利用湿纸码双层嵌入法嵌入秘密数据,并采用直方图调整策略保持小波高频子带系数直方图特性,由此从多方面提高了信息隐藏算法的安全性.大量与同类算法的对比实验表明,在嵌入率小于100%的条件下,该算法具有较强的视觉隐蔽性和抗统计检测的能力. By analyzing the security of some nowadays adaptive steganographies,a new wet paper code(WPC) based adaptive steganography in IWT domain is proposed in order to enhance the security.The scheme calculates the threshold according to the quantity of the secrete message and the cover element's characteristic,then adaptively chooses the complex texture region as embedding position,embedding secrete data by two layer WPC steganography,and adopt a new histogram adjustment strategy to prevent distortion.By such way,the capability of resisting steganalysis is improved.Quantities of experiments show that under average embedding rate of 100%,the new algorithm behaves better in visual and statistical imperceptibility.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2011年第7期1217-1223,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(60903221 60970142)
关键词 自适应信息隐藏 湿纸码 视觉隐蔽性 通用盲检测 adaptive steganography wet paper code visual imperceptibility general blind detection
  • 相关文献

参考文献19

  • 1Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C] //Proceedings of SPIE. Bellingham: Society of Photo Optical Instrumentation Engineers Press, 2003, 5020:131-142.
  • 2Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
  • 3徐旭,平西建,张涛,王国新.针对LSB匹配隐写的图像复原隐写分析[J].计算机辅助设计与图形学学报,2009,21(2):262-267. 被引量:7
  • 4Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [C]//Proceedings of SPIE. Bellingham: Society of Photo Optical Instrumentation Engineers Press, 2006, 6072:1-13.
  • 5Farid H. Detecting hidden messages using higher-order statistical models [C]//Proceedings of International Conference on Image Processing. Los Alamitos: IEEE Computer Society Press, 2002, 2:905-908.
  • 6Wu D C, Tsai W H. A steganographic method for images by pixel value differencing [J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
  • 7Yang C H, Weng C Y. Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497.
  • 8Hempstalk K. Hiding behind corners: using edges in images for better steganography [OL]. http://diit, sourceforge, net/ files/HidingBehindCorners, pdf.
  • 9Park Y R, Kang H H, Shin S U, et al. An image steganography using pixel characteristics [C] //Proceedings of Computational Intelligence and Security: International Conference (CIS 2005 Part 2). Heidelberg: Springer, 2005, 3802: 581-588.
  • 10Lin C C, Hsueh N L. A lossless data hiding scheme based on three-pixel block differences [J]. Pattern Recognition, 2008, 41(4): 1415-1425.

二级参考文献20

  • 1Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C] //Proceedings of SPIE, Santa Clara, 2003, 5022:131-142.
  • 2陈丹,王育民.一种针对加性空域掩密算法的通用掩密分析技术研究[c]//第7届全国信息隐藏暨多媒体信息安全学术大会论文集,南京,2007:233-237.
  • 3Mehrabi M A, Faez K, Bayesteh A R. Image steganalysis based on statistical moments of wavelet subband histograms in different frequencies and support vector machine [C]// Proceedings of IEEE the 3rd International Conference on Natural Computation, Haikou, 2007:24-27.
  • 4Liu Q Z, Sung A H, Ribeiro B, etal. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1):21-36.
  • 5Liu Q Z, Sung A H, Chen Z X, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayseale images[J]. Pattern Recognition, 2008, 41(1): 56-66.
  • 6Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[M] // Lecture Notes in Computer Science. Heidelberg: Springer, 2003, 2578:310- 323.
  • 7Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6) :441-444.
  • 8Gonzalez R C,Woods RE.数字图像处理[M].第2版.阮秋琦,阮宇智,等译.北京:电子工业出版社,2003:175-183.
  • 9University of Washington. CBIR image database[OL]. (2005-12-10) [2008 03-14]. http://www, cs. washington. edu/research/imagedatabase/roundtruth/.
  • 10Crandall R. Some notes on steganography [ EB/OL]. http://os.inf. tu-dresden.de/- westfeld/crandall. pdf, 2007 -01 - 15.

共引文献8

同被引文献49

  • 1任韧,徐进,朱世华.最小二乘支持向量域的混沌时间序列预测[J].物理学报,2006,55(2):555-563. 被引量:15
  • 2潘志庚,孙树森,李黎.三维模型数字水印综述[J].计算机辅助设计与图形学学报,2006,18(8):1103-1110. 被引量:25
  • 3田云凯,贾传荧,王庆武.基于Arnold变换的图像置乱及其恢复[J].大连海事大学学报,2006,32(4):107-109. 被引量:30
  • 4邵利平,覃征,高洪江,衡星辰.二维非等长图像置乱变换[J].电子学报,2007,35(7):1290-1294. 被引量:26
  • 5Chen X C,Wang Y H,Tan T N,et al.Blind image steganalysis based on statistical analysis of empirical matrix [C]//Proceedings of the 18th International Conference on Pattern Recognition.Los Alamitos:IEEE Computer Society Press,2006:1107-1110.
  • 6Pevny T,Bas P,FridrichJ.Steganalysis by subtractive pixel adjacency matrix [J].IEEE Transactions on Information Forensks and Security,2010,5(2):215-224.
  • 7Goljan M,Fridrich J,Holotyak T.New blind steganalysis and its implications[C]//Proceedings of SPIE.Bellingham:Society of Photo-Optical Instrumentation Engineers Press,2006,6072:1-13.
  • 8Jost P,Vandergheynst P,Frossard P.Redundant image representations in security applications [C]//Proceedings of International Conference on Image Processing.Los Alamitos:IEEE Computer Society Press,2004,4:2151-2154.
  • 9Cancelli G,Barni M.MPSteg-Color:data hiding through redundant basis decomposition [J].IEEE Transactions onInformation Forensics and Security,2009,4(3):346-358.
  • 10Starck J L,Elad M,Donoho D L.Image decomposition:separation of texture from piecewise smooth content [C]//Proceedings of SPIE.Bellingham:Society of Photo Optical Instrumentation Engineers Press,2003,5207:571-582.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部