期刊文献+

基于湿纸编码的多像素值差密写 被引量:1

Multi-pixel value differencing steganography based on wet paper codes
原文传递
导出
摘要 提出了一种基于湿纸编码的多像素值差(MPVD,multi-pixel value differencing)密写方法。首先用光栅扫描的方式将载体图像划分为若干不重叠的四像素的小块,再将每个小块的4个像素值分别与其中最小像素值求差,应用湿纸密写原理,通过选择适合人眼分辨能力的"干燥区域",将改进的Arnold方法置乱的秘密信息嵌入。模拟实验结果表明,和最低有效位法(LSB)和像素值差法(PVD)相比,本文方法嵌入量高,安全性好,提取简单。 A new data hiding method-multi-pixel value differencing(MPVD) steganography based on wet paper codes is presented.Firstly the cover image is divided into many unlapped blocks by using the way of raster scanning,each of which includes four pixels.Secondly the differences between each pixel and the minimal pixel in the block are gotten;the principle of wet paper writing is used in the differences,the dry place of which is selected to embed the scrambled secret message by the improved Arnold method,which is suitable to the human visual resolution capacity.With this algorithm,both the high capacity of embedding and security are ensured and the extraction is easy.The experiment results prove the validity of the proposed algorithm.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2012年第10期1965-1970,共6页 Journal of Optoelectronics·Laser
基金 天津市高等学校科技发展基金计划(NSC20100702)资助项目
关键词 多像素值差(MPVD) 干燥区域 湿纸编码 选择频道 multi-pixel value differencing(MPVD) dry place wet paper codes selecting channel
  • 相关文献

参考文献2

二级参考文献14

  • 1BALABANOVIC M. An Adaptive Web Page Recommendation Service [ A ]. In Proceedings of 1 st International Conference on Autonomous Agents[ C]. New York: International Institute of Informatics and systemics. 1997,378-385.
  • 2Barni Mauro, Bartolini Franco, Piva Alessandro. Improved wavelet-based watermarking through pixel-wise masking [J]. IEEE Transactions on Image Processing, 2001,10(5) :783-791.
  • 3Xie Gui, Shen Hong.Toward improved wavelet-based watermarking using the pixel-wise masking model [C] //IEEE International Conference on Image Processing 2005, ICIP 2005. CA, USA, 2005, 1 : 689-692.
  • 4Wolfgang R B, Podilchuk C I, Delp E J. Perceptual watermarks for digital images and video [J]. Proc IEEE, 1999,87:1108-1126
  • 5Fridrich Jessica, Goljan Miroslav, Lisonek Petr, et al. Writing on wet paper[J].IEEE Transactions on Image Processing, 2005,53 (10) : 3923-3935.
  • 6Lewis A S, Knowles G. Image compression using the 2-D wavelet transform [J]. IEEE Transactions on Image Processing, 1992, 1 (2): 244-250.
  • 7Brent R P, Gao S, Lauder A G B. Random Krylov spaces over finite fields [ J ] . Discrete Math, 2003, 16 ( 2 ) : 276-287.
  • 8Farid H. Detecting Steganographic Message in Digital Images [R]. New Hampshire, Dartmouth College, 2001.
  • 9刘振宇.基于WWW信息浏览区域的查询语言设计[J].计算机工程,2001,27(4):118-119. 被引量:2
  • 10邢平平,施鹏飞,赵奕.基于本体论的数据挖掘方法[J].计算机工程,2001,27(5):15-16. 被引量:32

共引文献3

同被引文献16

  • 1Korzhik V, Imai H, Shikata J,et al. On the use of Bhtta-charyya distance as a measure of the detectability ofsteganographic system[A]. Trans actionss on Data Hidingand Multimedia Security lll[C]. 2008,4920:23-32.
  • 2余兵奇,张红梅.一种改进的最低有效位信息隐藏算法[J],2012,23(12):2398-2403.
  • 3Cheddad A,Condell J,Curran K. Digital image steanogr-pahy: survey and analysis of cur-rent method [J]. SignalProcessing,2010,90(3) :727-752.
  • 4Nag A,Biswas S. Sarkar D, et al. A novel technique forimage steganography based on block-DCT and huffmanencoding[J]. Intern- ational Journal of Computer Scienceand Inform- ation Technology,2010,2(3) :234-241.
  • 5Ali Al-Ataby, Fawzi Al-Naima. A modified high capacityimage steganography technique based on wavelet trans-form[J]. International Arab Jou- rnal of Information Tech-nology,2010,7(4):358- 364.
  • 6Westfeld A,Pfitzmann A. Attack on steganogra- phic sys-tem [J]. Lecture Notes in Computer Scie- nce,2000,1768:61-75.
  • 7Fridrich J,Goljan M. Practical steganalysis of digital im-age :state of the art[A]. Proc. of SPIE[C]. 2002,4675: 1-13.
  • 8Mielikainen J. LSB matching revisited[J]. IEEE Transac-tion on Signal Processing Letters,2006,13(5) :285-287.
  • 9ZHANG Xing-peng,WANG Shuo-zhong, ZHANG Wei-ming. Steganography with histogram-preserving and dis-tortion-constraining properties [A]. 2009 InternationalConference on Multimedia Netwo-rking and Security[C].2009,30-34.
  • 10Khairazi M,Senear H T, Memon N. Cover selection forsteganographic embedding[A]. IEEE ICIP[C]. 2006,117-120.

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部