期刊文献+

图像加密隐藏信息识别技术研究 被引量:5

Military Image Encryption Hidden Information Identification Technology Research
下载PDF
导出
摘要 研究加密图像隐藏信息准确识别技术。在图像中,如果加密信息隐藏在图片的噪声中,噪声信号和隐藏信息敏感信号混合在一起,将造成隐藏信息的敏感信号图谱特征发生形变。传统算法多是通过采集图像中的敏感信息图谱特征完成检测的,噪声信号和隐藏信息混合在一起,造成隐藏信息图谱可识别特征发生突变,导致识别准确率下降。提出一种逆向隐藏变换算法的图像隐藏信息识别技术,对图像进行置乱处理,运用干扰清除技术完成识别。实验证明,这种算法能够避免由于噪声信号和隐藏信号混合造成的隐藏信息特征发生形变的缺陷,保证了图像隐藏信息识别的准确率。 The military encryption image hiding information accurately identify technology.In the military the image of the encrypted information hiding in the picture if the noise,the noise signal and information hiding sensitive signal mixed together,will cause the hidden information sensitive signal deform spectroscopic characteristics.More than traditional algorithm is through the acquisition of image of sensitive information map features can identify the completion of the inspection,noise signal and information hiding mix together,cause hidden information map can identify when deformed features,cause identification accuracy decline.Put forward a kind of reverse hidden transform algorithm military image hidden information identification technology,scrambling to military image processing,the use of interference clear finish recognition technology.Experiments show that the algorithm can avoid the noise signal and the hidden cause of mixed signal characteristics hidden information deform defects,ensure the military image hiding information identification accuracy
出处 《科技通报》 北大核心 2012年第8期129-131,155,共4页 Bulletin of Science and Technology
关键词 图像 隐藏信息 特征形变 military image hidden information deformation characteristics
  • 相关文献

参考文献5

二级参考文献22

  • 1刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方法[J].东南大学学报(自然科学版),2003,33(z1):98-101. 被引量:16
  • 2黄良永,肖德贵.二值图像Arnold变换的最佳置乱度[J].计算机应用,2009,29(2):474-476. 被引量:23
  • 3孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564. 被引量:83
  • 4靳冰,赖宏慧,贾玉珍.DES加密算法的安全分析[J].华南金融电脑,2007,15(2):71-73. 被引量:16
  • 5Das T S, Sau A K, Sarkar S K. Multimedia data hiding in spatial and transformed domain[J]. Distributed Computing and Internet Technology, Springer Berlin / Heidelberg, 2006,4317,447-456.
  • 6Chen B, Wornell G W. An information-theoretic approach to the design of robust digital watermarking systems[C]. Proc. of IEEE International Conf. on Acoustics, Speech, and Signal Processing, ICASSP 199, 1999,4,2061 - 2064.
  • 7Chen B, Wornell G W. Digital watermarking and information embedding using dither modulation [C]. IEEE Second Workshop on Multimedia Signal Processing, 1998, 273 - 278.
  • 8Perez-Gonzalez F, Barni M, Abrardo A. Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks [C]. IEEE International Workshop on Multimedia Signal Processing, 2004, 139-142.
  • 9Qiao Li, Cox I J. Rational dither modulation watermarking using a perceptual model[C]. IEEE 7th Workshop on Multimedia Signal Processing, 2005, 1-4.
  • 10Lai Bo-luen,Chang Long-wen. Adaptive data hiding for images based on harr discrete wavelet transform[J]. Advances in Image and Video Technology. Springer Berlin / Heidelberg, 2006, 4319,1085 -1093.

共引文献21

同被引文献36

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部