期刊文献+

基于矩阵运算的二维EMD算法 被引量:2

Two-dimensional EMD Algorithm Based on Matrix Operation
下载PDF
导出
摘要 为利用人类视觉冗余,达到更高嵌入率,在EMD算法的基础上提出一种二维高嵌入率的空域隐写算法。将载体图像像素序列划分成大小为m×n的矩阵块,结合EMD算法与矩阵运算将编码后的秘密数据,分别独立地嵌入到矩阵块的行和列上,通过性能分析得出矩阵块的行数m的最佳取值为1。实验结果表明,相比EMD算法,该算法的嵌入率有较大提高。 In order to make good use of human vision redundance and obtain a higher embedding rate,on the basis of Exploiting Modification Direction(EMD),a new two-demensional steganograph scheme with high embedding rate in space domain is proposed.Dividing the cover image into m×n matrix blocks,the coded secret message is embedded in each matrix block by using EMD algorithm independently in rows and lines,and the optimal m of matrix rows equaling 1 is presented.The analysis of performance shows that the proposed method has better performance on the embedding rate than the EMD algorithm does.
作者 刘圆 潘峰
出处 《计算机工程》 CAS CSCD 北大核心 2011年第20期111-113,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60842006) 武警工程学院基础研究基金资助项目(WJY201027)
关键词 视觉冗余 空域隐写算法 矩阵运算 EMD算法 高嵌入率 vision redundance space domain steganograph algorithm matrix operation Exploiting Modification Direction(EMD) algorithm high embedding rate
  • 相关文献

参考文献9

  • 1Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336.
  • 2Hsu C T, Wu Jialing. Hidden Digital Watermarks in Images[J]. IEEE Trans. on Image Processing, 1999, 8(1): 58-68.
  • 3Zhang Xinpeng, Wang Shuozhong, Zhang Kaiwen. Steganography with the Least Histogram Abnormality[C]//Proc. of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. [S. l.]: Springer, 2003: 401-412.
  • 4Fridrich J, Goljan M, Soukal D. Perturbed Quantization Steganography[J]. ACM Multimedia and Security Journal, 2005, 11(2): 98-107.
  • 5Fridrich J, Goljan M, Lisonek P, et al. Writing on Wet Paper[J]. IEEE Trans. on Signal Processing, 2005, 53(10): 3923-3935.
  • 6Zhang Xinpeng, Wang Shuozhong. Efficient Steganographic Embedding by Exploiting Modification Direction[J]. IEEE Communications Letters, 2006, 10(11): 781-783.
  • 7Jung Ki-Hyun, Yoo Kee-Young. Improved Exploiting Modifi- cation Direction Method by Modulus Operation[J]. International Journal of Signal Processing, Image Processing and Pattern, 2009, 2(1): 79-87.
  • 8张新鹏,刘焕,张颖春,王朔中.融合方向编码和湿纸编码的高效信息隐藏[J].上海大学学报(自然科学版),2010,16(1):1-4. 被引量:9
  • 9郑江云,江巨浪.基于感觉容量的图像质量评价算法[J].计算机工程,2010,36(8):222-223. 被引量:7

二级参考文献22

  • 1WANG H Q, WANG S Z. Cyber warfare--steganography vs. steganalysis [ J]. Communication of the ACM, 2004, 47(10) :76-82.
  • 2FRIDRICH J, GOLJAN M. Practical steganalysis of digital images-state of the art, security and watermarking of multimedia [C] // Proceedings of SPIE, San Jose, USA. 2002:1-13.
  • 3TSENG Y C, CHEN Y Y, PAN H K. A secure data hiding scheme for binary images [ J]. IEEE Transactions on Communications, 2002, 50 : 1227-1231.
  • 4WESTFELD A. F5-a steganographic algorithm [ C ] // Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001:259-302.
  • 5ZHANG X P, WANG S Z. Dynamically running coding in digital steganography [ J ]. IEEE Signal Processing Letters, 2006, 13(3) :165-168.
  • 6FRIDRICH J, FILLER T. Practical methods for minimizing embedding impact in steganography [ C ] // Proceedings of SPIE. 2007:650502.
  • 7ZHANG X P, WANG S Z. Efficient steganographic embedding by exploiting modification direction [ J ]. IEEE Communication Letters, 2006, 10( 11 ) :781-783.
  • 8FRIDRICH J, LISONEK P. Grid colorings in steganography [ J ]. IEEE Transactions on Information Theory, 2007, 53 ( 4 ) : 1547-1549.
  • 9FRIDRICH J, GOLJAN M, LISONEK P, et al. Writing on wet paper [ J]. IEEE Transactions on Signal Processing, 2005, 53(10) :3923-3935.
  • 10ZHANG X P, ZHANG W M, WANG S Z. Efficient double-layered steganographic embedding [ J ]. Electronics Letters, 2007, 43 (8) :482-483.

共引文献14

同被引文献11

  • 1Zitova B, Kautsky J, Peters G. Robust Detection of Significant Points in Multi Frame Images [J]. Pattern Recongnition Letters (S0167-8655), 1999, 20: 199-206.
  • 2LEE Jiann-Shu, SUN Yung-Nien, CHEN Chin-Hsing. Multi Scale Comer Detection by Using Wavelet Transform [J]. IEEE Transactions on Image Processing(S1057-7149), 1995, 4(1): 100-104.
  • 3Mokhtarian F, Suomela R. Curvature Scale Space Based Image Comer Detection [C]//European Signal Processing Conference, Rhodes, Greece, September8-11, 1998. Patras, Grece: Typorama, 1998: 2549-2552.
  • 4Harris C, Stephens M. A Combined Comer and Edge Detector [C] //Proceedings of the 4th Alvey Vision Conference, Manchester, England, August 31-September 2, 1998: 147-151.
  • 5Huang N E, Zheng S, Steven R, et al. The Empirical Mode Decomposition and the Hilbert Spectrum for Nonlinear and Non-stationary Time Series Analysis [C]//Proceedings: Mathematical, Physical and Engineering Sciences, London, March. The Royal Society Press, 1998, 454(1971): 903-995.
  • 6Nunes J C. Image Analysis by Bidimensional Empirical Mode Decomposition [J]. Image and Vision Computing (S0262-8856), 2003, 21(12): 1019-1026.
  • 7Moravec H R Towards Automatic Visual Obstacle Avoidance [C]//Proceeding of the 5th International Joint Conference on Artificial Intelligence, Cambridge, MA, USA, 1977: 584-590.
  • 8李峰,吕回.基于BEMD和小波阈值的MRI医学图像去噪[J].中国图象图形学报,2009,14(10):1972-1977. 被引量:8
  • 9孟伟,白瑞林,李龙.靶标角点自动匹配世界坐标通用算法[J].光电工程,2011,38(10):27-32. 被引量:2
  • 10姚楚茂,汤光明,蔡镇.最大奇异值移位的鲁棒图像信息隐藏[J].计算机应用研究,2015,32(7):2172-2175. 被引量:8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部