期刊文献+

隐写术中的编码模型及方法研究 被引量:2

Coding Model and Methods for Steganography
下载PDF
导出
摘要 隐写术的目的是将秘密消息嵌入到多媒体数据中进行隐蔽传输。为了提高安全性,嵌入过程希望对载体做尽量少的修改并避免对敏感区的修改。这个数据嵌入问题可以用隐写码来解决。文章按照发送方拥有的边信息情况,将隐写编码问题分为三种模型:基本模型,湿纸模型和湿度级模型。对各种模型的下编码方法作了介绍,并以灰度图像上的±1隐写为例说明了隐写码可以大幅度提高隐写术的安全性。 The purpose of steganography is covert communication by embedding secret messages into multimedia data.To improve security,the steganographer hope to modify less cover elements and avoid changing sensitive fields of the cover.This problem can be solved by steganographic codes(stego codes).According to side information using by the sender,we divide stego codes into three models:basic model,wet paper model and wet-scale model.We review coding methods in each coding model,and show that stego codes can greatly improve security of steganograpy by taking ±1embedding in grayscale images as an example.
出处 《信息网络安全》 2011年第11期8-13,共6页 Netinfo Security
基金 国家自然科学基金[60803155 61170234]
关键词 隐写术 隐写码 湿纸码 矩阵嵌入 嵌入效率 steganography steganographic code wet paper codes matrix embedding embedding efficiency
  • 相关文献

参考文献34

  • 1Zhang W M, Li S Q. A coding problem in steganography[J]. Designs, Codes and Cryptography, 2008,46(1): 67-81.
  • 2Crandall R. Some notes on steganography. Posted on steganography mailing list[OL], http://os.inf.tu-dresden.de/-westfeld/crandall.pdf, 1998.
  • 3Westfeld A. F5: a steganographic algorithm[C]. Proc of 4th Workshop Information Hiding, LNCS 2137, 2001.289-302.
  • 4Galand F and Kabatiansky G. Information hiding by coverings[C]. Proc of the IEEE Information Theory Workshop 2004, 2004.151 - 154.
  • 5Bierbrauer J, Ffidrich J. Constructing good coveting codes for applications in steganography[M]. Lecture Notes in Computer Science, 2006.1-22.
  • 6Munuera C. Steganography and error-correcting codes[J]. Signal Processing, 2007,87: 1528-1533.
  • 7Sch o nfeld D , Winkler A. Embedding with syndrome coding based on BCH codes[C]. ACM the 8th workshop on Multimedia and Security, 2006.214-223.
  • 8Fridrich J ,Soukal D. Matrix embedding for large payloads[C]. 1EEE Transactions on Information SecuriW and Forensics, 1 (3): 390-394, 2006.
  • 9Fridrich J,Finer T. Practical metho& for minimizing embedding impact in steganography[C]. SPIE Electronic Imaging, 6050, 2007.
  • 10Hou C L, Lu C C, Tsai S C, et al. An optimal data hiding scheme with tree-based parity check[C]. IEEE Transactions on Image Processing, 99(9):1-7, 2010.

同被引文献10

  • 1PETITCOLAS F A P,ANDERSON R J,KUHN M G. Information hiding a survey [ J ]. Proceedings of the IEEE, 1999,87 (7) : 1062-1070.
  • 2WESTFELD A. FS--a steganographic algorithm[ EB/OL]. [2012-12- 20 ]. http ://link. springer, com/chapter/lO. 1007/3-540-45496-9_21 # page-1.
  • 3FRIDRICH J, GOLJAN M, HOGEA D. Steganalysis of JPEG images: breaking the F5 algorithm[ C]//Proc. 5th International Workshop on In- formation Hiding. Berlin :Springer-Verlag Press ,2002:310-323.
  • 4FRIDRICH J,GOLJAN M,LISONEK P,et al. Writing on wet paper[J] IEEE Trans. Signal Processing,2005,53 (10) :3923-3935.
  • 5KAWAGUCHI E R O. Principle and application of BPCS-steganogra- phy. in: multimedia systems and applications[ C]//Proc. SPIE. Bos- ton:[ s. n. ] ,1998:464--472.
  • 6FRIDRICH J.GOLIAN M.SOUKAL D. Wet paper codes with improved embedding efficiency[ J]. IEEE Trans. Information Security and Foren- sics,2006(1 ) :102-110.
  • 7WU M,LIU B. Data hiding in image and video[J]. IEEE Trans. Image Processing,2003,12(6) :685-705.
  • 8奚玲,平西建,张涛.一种新的湿纸码自适应信息隐藏方法[J].应用科学学报,2010,28(5):485-492. 被引量:6
  • 9汪影,谢青松,王玉芳,袁泉.基于卡方统计破解Jsteg隐写算法研究[J].网络安全技术与应用,2014(12):95-95. 被引量:2
  • 10王康,刘琲贝,刘烁炜,胡永健.简洁的JPEG图像隐写DCT系数选择方案和安全性增强策略[J].网络与信息安全学报,2016,2(9):57-64. 被引量:2

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部