期刊文献+

小波域最小嵌入失真函数设计及其在隐写中的应用 被引量:2

Design of minimizing embedding impact function in DWT domain and its applications in steganography
原文传递
导出
摘要 为了提高隐写方案的安全性,提出一种基于最小嵌入失真原理和网格码的图像隐写算法。首先在离散小波域结合人眼视觉特性和整数提升小波变换设计了失真测度函数,主要考虑了亮度、频率和纹理掩蔽因子对载体失真的影响。然后结合网格码设计了隐写算法,将嵌入信息对载体的修改最小化并且集中在人眼不敏感区域。实验结果显示,方案具有良好的视觉不可见性,且能抵抗空域、小波域等隐写分析的攻击,安全容量达到0.4 bits/pixel。 In order to improve the security of steganography system, an image steganography method based on Minimizing Embedding Impact and Syndrome-Trellis Codes is proposed. First, a distortion function in discrete wavelet transform (DWT) domain was designed according to human visual system and integer lifting wavelet transform, which is mainly con- cerned about the influences of frequency, luminance, and texture masking factor to the cover distortion. Then, the Syn- drome-Trellis Codes are combined with the distortion function to propose the steganography method, to make sure that the embedding impact on the cover minimizing and centralizing is in the un-sensitivity domain. Experiments show that the pro-posed approach maintains a good visual quality of the stego-image and has a high security against steganalysis in space and wavelet domain. The security capacity can be about O. 4 bits/pixel.
出处 《中国图象图形学报》 CSCD 北大核心 2012年第8期946-952,共7页 Journal of Image and Graphics
基金 国家高技术研究发展计划(863)基金项目(2007AA01Z429) 陕西省自然科学基金项目(2010JM8034) 武警工程大学基础基金项目(wjy201027)
关键词 隐写 最小嵌入失真 网格码 人眼视觉特性 整数提升小波 steganography minimizing embedding lmpact Syndrome-Trellis codes (STCs) human visual system(HVS) integer lifting wavelet
  • 相关文献

参考文献16

  • 1Fridrich J, Filler T. Practical methods for minimizing embedding impact in steganography [ EB/OL ]. [ 2012-02-29 ]. http:// ws2. binghamton, edu/fridrich/publications, html #Steganogra- phy.
  • 2Filler T, Judas J, Fridrich J. Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes [ J]. IEEE Transactions on Information Forensics and Security, 2011, 6 (3):920- 935.
  • 3Filler T, Judas J, Fridrich J. Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization. [ EB/OL ]. [2012-02-29]. http:// ws2. binghamton, edu/fridrich/publi- cations . html #Steganography.
  • 4Filler T, Fridrich J. Minimizing Additive Distortion Functions With Non-Binary Embedding Operation in Steganography [ C ]//Proceedings of 2nd IEEE Workshop on Information Forensics and Security. Seattle, WA : IEEE Computer Society, 2010:1-6.
  • 5Filler T, Fridrich J. Gibbs construction in steganography [ J ]. IEEE Transactions on Information Forensics and Security, 2010, 5 (4) :705-720.
  • 6Fridrich J, Goljan M, Soukal D. Writing on wet paper [ J ]. IEEE Transactions on Signal Processing, 2005, 53 ( 10 ) : 3923- 3935.
  • 7Shannon C E. Coding theorems for a discrete source with a fidelity criterion [J]. IRE Nat. Conv. Rec. , 1959, 4:142-163.
  • 8Viterbi A, Omura J. Trellis encoding of memory less discrete- time sources with a fidelity criterion [ J ]. IEEE Transactions on Information Theory, 1974, 20:325-332.
  • 9Hen I, Merhav N. On the error exponent of trellis source coding [ J]. IEEE Transactions on Information Theory, 2005, 51:3734- 3741.
  • 10Sidorenko V, Zyablov V. Decoding of convolutional codes using asyndrome trellis [ J]. IEEE Transactions on Information Theory, 1994, 40(5) : 1663-1666.

同被引文献30

  • 1汪贤裕,肖玉明.博弈论及其应用[M].北京:科学出版社.2008:94-96.
  • 2Fridrich J, Filler T. Practical methods for minimizing embed- ding impact in steganography [EB/OL]. http:// ws2. bing- hamton, edu/fridrich/publications . html, 2012-02-29.
  • 3Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes [J]. IEEE transactions on information forensics and security, 2011, 6 (3) :920-935.
  • 4Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization [EB/OL]. http:// ws2. binghamton, edu /fridrich /publications . html, 2012-02-29.
  • 5Filler T, Fridrich J. Minimizing additive distortion functions with non-binary embedding operation in steganography [C]// Proceedings of 2nd IEEE workshop on information forensics and security seattle, WA: IEEE computer Society, 2010:1 -6.
  • 6Filler T, Fridrich J. Gibbs construction in steganography [J]. IEEE transactions on information forensics and security, 2010, 5(4) :705-720.
  • 7Fridrich J, Goljan M, Soukal D. Writing on wet paper [J]. IEEE transactions on signal processing, 2005, 53(10):3923 -3935.
  • 8Lewis A S, Knowles G. Image compression using the 2-D wavelet transforms [J]. IEEE transactions on image process- ing, 1992, 1(4): 244-250.
  • 9Barni M, Bartolini F, Piva A. Improved wavelet-based wa- termarking through pixel-wise masking [J]. IEEE transac- tions on image processing, 2001, 10(5): 783-791.
  • 10Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pix- el adjacency matrix [J]. IEEE transactions on information forensics and security, 2010,5(2) :215-224.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部