期刊文献+

基于视觉效应的自适应图像隐写算法 被引量:1

Adaptive Steganography Algorithm Based on Vision Effect
下载PDF
导出
摘要 空间域中,本文根据光混合颜色立方体,通过计算欧式空间中的特征向量,提出了衡量主观不敏感区域的特征参数"色度"、"色偏差",根据设定的参数阈值筛选隐写视觉效果好的像素位置.算法通过分析原始像素值与待隐写数据的数字特征,自适应地将信息写到特征相近的像素点中,并记录下隐写位置表.通过理解隐写位置表,算法在不需要原始图像的情况下完成信息提取.同时,算法还提出了数据隐写协议,有效地避免了图像遭破坏后导致的信息误传.仿真结果表明,该隐写算法视觉效果好,利用空间域最常用的隐写分析算法分析法和RS分析法对图像进行隐写分析也无法准确判断图像是否含有隐写信息. In the spatial domain, the characteristic parameters "chroma" and "colour difference" based on the theory of light mix are proposed to describe insensitive feeling through calculating the feature vector in Eu- clid space. The optimum location can be found by filtering the parameters. Using figure characters, we prop- ose a novel algorithm to put information into image adaptively, so that it can maintain figure characters. Steg- anography information can be obtained without original image by recording information location. At the same time, the steganography protocol used in this algorithm avoids transmitting misinformation effectively. The theoretical analysis, confirmed by experimental results, shows that the proposed algorithm has a good vision effect. Neither X2 analysis nor RS analysis can confirm whether the image has been disposed or not.
作者 肖晶晶 鲁琴
出处 《测试技术学报》 2012年第1期9-14,共6页 Journal of Test and Measurement Technology
基金 国家自然科学基金项金资助项目(No.60872151 61003302)
关键词 数字隐写 视觉特性 色度 色偏差 steganography vision character chroma colour difference
  • 相关文献

参考文献10

  • 1王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:77
  • 2梁小萍,何军辉,李健乾,黄继武.隐写分析——原理、现状与展望[J].中山大学学报(自然科学版),2004,43(6):93-96. 被引量:12
  • 3Kawaguchi E, Earn. Principle and Applications of Bpcs Steganography[C]. In Teseher A G, et al. (Eds.): Proe. of Multimedia Systems and Applications. Boston MA. USA. 1998. SPIE, 3528: 464-473.
  • 4Nguyen B C, Yoon S M, Lee H K. Multi bit plane image steganography[C]. In Shi, Y Q. , etal. (Eds.) : Proc. of 5th Internation Workshop on Digital Watermarking. Jeju Island, Korea. 2006. Spinger LNCS, 4283: 61-70.
  • 5Westield A, Pfitzmann A. Attacks on steganographic systems[J ]. Proceedings of the 3rd International Workshop on Infor- mation Hiding. LNCS 1768. Berlin- Springer-Verlag, 1999: 61-76.
  • 6Fridrich J, Goljan M. Practical Steganalysis of Digital Images-state of the Art[C]. Proc of SPIE: Security and Watermark- ing of Multimedia Contents IV, 2002: 1-13.
  • 7Fridrich j, Goljan M. , Du R. Reliable Detection of LSB Steganography in gray,ale and color image[J]. In Proc. ACM Workshop on Multimedia and security, 2001 : 27-30.
  • 8Ker A. A General Framework for Stmctural Steganalysis of LSB Replaeement~C]. Proceedings of the 7th Information Hid- ing Workshop, Barcelona, Spain, 2005: 296-3ll.
  • 9Ker A. A Fusion of Maximum Likelihood and Structural Steganalysis[ C]. Proceedings of the 9th Information Hiding Work- shop, Brittany, France, 2007: 204-219.
  • 10Noda H, Spaulding J, Shirazi M N, et al. Bit-plane Decomlxxsition Steganography Combined with Jpeg2000 Compression [C]. In Petitcolas, F. A. P(Ed. ) : Proe. of 5th Information Hiding Workshop. Noordwijkerhout, The Netherlands. 2002. Springer LNCS, 2578: 295-309.

二级参考文献17

  • 1张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法[J].中山大学学报(自然科学版),2005,44(3):29-33. 被引量:3
  • 2张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 3刘歆,牛少彰.信息隐藏的检测算法研究综述[J].北京电子科技学院学报,2005,13(4):90-94. 被引量:2
  • 4郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 5KELLEY J. Terror groups hide behind Web encryption[N].USA Today, Feb. 2001, http://www. usatoday. com./tech/news/2001 - 02 - 05 - binladen. htm.
  • 6WESTFELD A, PFITZMANN A. Attacks on steganographic systems [ C]. Proc. 3rd Int'l Workshop in Information Hiding. Springer Verlag, 1999:61 - 76.
  • 7FRIDRICH J, GOLJAN M, DU R. Reliable detection of LSB steganography in grayscale and color images [ C]. Proc.ACM, Special Session on Multimedia Security and Watermarking. Ottawa CA, 2001: 27- 30.
  • 8DUMITRESCU S, WU X L, WANG Z. Detection of LSB steganography via sample pair analysis[J]. IEEE Transactions on Signal Processing, 2003, 51(7): 1995 - 2007.
  • 9FRIDRICH J, GOLJAN M, HOGEA D. Steganalysis of JPEG images: breaking the F5 algorithm [ J]. 5th Information Hiding Workshop. Noordwijkerhout Netherlands, 2002: 10-323.
  • 10FRIDRICH J, GOLJAN M, HOGEA D. Attacking the OutGuess [ C ]. Proc. ACM Workshop Multimedia and Security. Juan- les- Pins, France, 2002.

共引文献85

同被引文献11

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部