期刊文献+

基于LSB和多重秘密共享的二值图像隐藏方案

BINARY IMAGE HIDING SCHEME BASED ON LSB AND MULTI-SECRET SHARING
下载PDF
导出
摘要 提出一种新的二值图像隐藏方案,将一幅秘密二值图像隐藏在多幅公开载体图像中,实现对秘密二值图像的保护。针对二值图像取值形式为二值的特点,该方案第一次把变长游程编码算法、多重秘密共享思想和LSB算法糅合在一起,并根据载体图像的最大隐藏信息量把秘密图像的游程长度序列分成n块,由n个密钥控制分别隐藏在n幅公开载体图像中。实验表明,该算法在不明显引入修改痕迹的情况下,可显著提高峰值信噪比和安全性,且算法简单易行。 A new binary image hiding scheme is proposed,which hides a secret binary image into a couple of overt carrier images to achieve the protection of secret binary image.Aiming at the characteristic of the binary image whose valuing form is the binary value,the scheme combines the multi-secret sharing idea with run-length encoding algorithm and LSB algorithm for the first time.Moreover,according to the biggest size of hidden information of the carrier image,the scheme divides the run-length sequence of the secret image into n blocks,and then embeds them into n blocks of overt carrier images respectively under the control of n keys.Experiment demonstrates that this scheme can sufficiently improve the PSNR and the security in the condition of inconspicuous introduction of modification trace,and is simple and easy to use.
出处 《计算机应用与软件》 CSCD 2011年第9期15-17,44,共4页 Computer Applications and Software
基金 国家自然科学资助项目(61065001) 新疆维吾尔自治区科技厅少数民族特殊培养计划项目(201023116)
关键词 多重秘密共享 二值图像 LSB算法 图像隐藏 Multi-secret sharing Binary image Least significant bit(LSB) algorithm Image hiding
  • 相关文献

参考文献6

二级参考文献54

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 3庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 4张军.用遗传算法优化二值图像信息隐藏技术的方法[J].计算机工程,2006,32(9):38-40. 被引量:4
  • 5M U Celik, G Sharma. Hierarchical Watermarking for Secure Image Authentication With Localization [J]. IEEE Transactions on Image Processing, 2002, 11(6): 585-595.
  • 6Mohamed A S, Mohammad S O. Digital Watermarking-Based DCT and JPEG Model [J]. IEEE Transactions on Instrumentation and Measurement, 2003, 52(5): 1640-1647.
  • 7Galand F, Kabatiansky G. Information hiding by coverings [A]. Information Theory Workshop Paris, France, 2003, IEEE [C]. 2003. 151-154.
  • 8Chen M, Wong E K, Memon N, et al. Recent developments in document image watermarking and data hiding [A]. Proceedings of SPIE [C]. 2001, 4518: 166-175.
  • 9M Wu, B Liu. Data Hiding in Binary Image for Authentication and Annotation [J]. IEEE Transaction on Multimedia, 2004, 6(4): 528-538.
  • 10H Yang, Alex C Kot. Semi-fragile Watermarking For Text Document Images Authentication [A]. Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on [C]. 2005-05. 4002-4005.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部