期刊文献+

二值图像信息隐藏算法评估方案

Assessment Program of Information Hiding Algorithms Based on Binary Image
下载PDF
导出
摘要 首先根据二值图像隐藏算法的特点和应用需求,提出了评估二值图像隐藏算法的指标集,该指标集包括隐藏容量、视觉效果、图像失真、嵌入效率、统计特性和时间复杂度。其次,应用该指标集对5种典型的二值图像隐藏算法进行评估和比较。最后根据实际应用需求设定相应的指标权重,对算法进行综合评估。该评估方案不仅能对新的二值图像隐藏算法进行性能评估,还可以从已知算法中选择最优算法,并为进一步的研究与改进提供方向。 This paper presents an index set for evaluating information hiding algorithms based on bi- nary image according to their characteristics and application requirements. The index set includes hiding capacity, visual effects, image distortion, embedding efficiency, statistical characteristics and time complexity. The index set is also used to evaluate and compare five typical information hiding algorithms based on binary image. Finally, a comprehensive assessment of the algorithms is made af- ter setting up the appropriate index weight according to the actual application needs. The new assessment program not only can evaluate the performance of the information hiding algorithm based on binary image, but also can help to choose the best one from all the known algorithms, and provide the directions for further research and improvement.
出处 《信息工程大学学报》 2011年第3期263-267,共5页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(60803155)
关键词 二值图像 信息隐藏 视觉效果 图像失真 综合评估 binary image information hiding visual effects image distortion comprehensive evaluation
  • 相关文献

参考文献6

  • 1Tzeng C,Tsai W. A new approach to authentication of binary images for muhimedia communication with distortion reduction and security enhancement[ J]. IEEE Communications Letters, 2003, 7(9) : 443-445.
  • 2Wu Min, Liu Bede. Data hiding in binary images for authentication and annotation[ J]. IEEE Transactions on Multimedia, 2004, 6(4) : 528-538.
  • 3Yang Huijuan,Kot A C. Pattern-based data hiding for binary image authentication by connectivity-preserving[ J ]. IEEE Transactions on Multimedia, 2007,9(3): 475-486.
  • 4Tseng HsienWen, Wu Feng-Rong, Hsieh ChiPin. Data Hiding for Binary Images Using Weight Mechanism [ C ]//IIHMSP 2007. 2007, 307-310.
  • 5付磊,刘几芬,张卫明.一种基于二值图像的小失真认证算法[C]//NDCC2010.2010:369-373.
  • 6蒋斌,平西建,张涛.基于模式分析的二值文本图像隐写分析算法[J].计算机工程,2009,35(8):176-178. 被引量:2

二级参考文献6

  • 1Wu Min, Tang Edward, Liu Bede. Data Hiding in Digital Binary Image[C]//Proc. of IEEE ICME'00. New York, USA: IEEE Press, 2000.
  • 2Chen Jeanne, Chen Tungshan. A New Data Hiding Method in Binary lmage[C]//Proc, of IEEE ISMSE'03. [S. l.]: IEEE Press, 2003.
  • 3Mei Q, Wong E K, Memon N. Data Hiding in Binary Text Documents[C]//Proc. of Conf. on Security and Watermarking of Multimedia Contents. San Jose, USA: [s. n.], 2001.
  • 4Yang Huijuan, Kot A C. Data Hiding for Text Document Image Authentication by Connectivity-preserving[C]//Proc. of IEEE ICASSP'05. [S. l,]: IEEE Press, 2005.
  • 5Jiang Ming, Wu Xiaolin, Wong E K, et al. Steganalysis of Boundary-based Steganography Using Autoregressive Model of Digital Boundaries[C]//Proc. of IEEE ICME'04. [S. l.]: IEEE Press, 2004.
  • 6Yu Xiaoyi, Wang Yunhong, Tan Tieniu. Steganalysis of Data Hiding in Binary Images[C]//Proc. of IEEE ICPR'04. [S. l.]: IEEE Press, 2004.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部