期刊文献+

基于人类视觉系统的非抽样Contourlet变换域图像隐写算法 被引量:4

Image steganography algorithm based on human visual system and nonsubsampled contourlet transform
下载PDF
导出
摘要 为提高图像信息隐藏的容量和隐蔽性,对比分析了非抽样Contourlet变换(NSCT)和Contourlet变换各自的优缺点和适用范围,提出了一种基于NSCT和人类视觉系统(HVS)的图像隐写方案。通过对人眼的视觉掩蔽效应进行建模,在NSCT分解的最精细尺度的各方向子带中,对不同系数分别嵌入不同的秘密信息量。仿真实验表明,新的算法相比小波域中的隐写方案,隐写的嵌入量至少提高了70000 b,峰值信噪比(PSNR)提高约4 dB,较好地兼顾了隐写在不可见性和嵌入容量上的要求,较小波域中的隐写方案具有更好的应用前景。 To improve the capacity and invisibility of image steganography, the article analyzed the advantage and application fields between Nonsubsampled Contourlet Transform (NSCT) and Contourlet transform. Afterwards, an image steganography was put forward, which was based on Human Visual System (HVS) and NSCT. Through modeling the human visual masking effect, different secret massages were inserted to different coefficient separately in the high-frequency subband of NSCT. The experimental results show that, in comparison with the steganography of wavelet, the proposed algorithm can improve the capacity of steganography at least 70 000 b, and Peak Signal-to-Noise Ratio (PSNR) increases about 4 dB. Therefore, the invisibility and embedding capacity are both considered preferably, which has a better application outlook than the wavelet project.
出处 《计算机应用》 CSCD 北大核心 2013年第1期153-155,共3页 journal of Computer Applications
关键词 图像隐写 非抽样CONTOURLET变换 人类视觉系统 JND模型 image steganography Nonsubsampled Contourlet Transform (NSCT) Human Visual System (HVS) Just Noticed Different (JND) model
  • 相关文献

参考文献11

  • 1王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:77
  • 2梁小萍,何军辉,李健乾,黄继武.隐写分析——原理、现状与展望[J].中山大学学报(自然科学版),2004,43(6):93-96. 被引量:12
  • 3陈志宏,刘文耀,袁晔,齐利敏.一种基于小波变换的湿纸密写方法[J].天津大学学报,2008,41(10):1172-1177. 被引量:3
  • 4BARNI M, BARTOLIN1 F, PIVA A. Improved wavelet-based wa- termarking through pixel-wise masking [ J]. IEEE Transactions on linage Processing, 2001, 10(5) : 783 -791.
  • 5DO M N, VETI'ERLI M. The contourlet transform: an efficient di- rectional multiresolution image representation [ J]. IEEE Transac- tions on hnage Processing, 2005, 14( 12): 2091 -2106.
  • 6MATALON B, ELAD M, ZIBULEVSKY M. Improved denoising of images using modelling of a redundant contourlet transform [ C]// Proceedings of the SPIE Conference on Wavelets. Bellingham, WA: SPIE, 2005:617 - 628.
  • 7CAI X, ZHAO W. A novel algorithm for multifocus image fusion based on contourlet hidden Markov tree model [ C]// ICSP 2008: Proceedings of the 9th International Conference on Signal Process- ing. Piscataway: IEEE Press, 2008:1019-1022.
  • 8ESAKKIRAJAN S, VEERAKUMAR T, NAVANEETHAN P. Adap- tive vector quantization technique for retinal image compression [ CI//ICCCN 2008: Proceedings of the 2008 International Confer- ence on Computing, Communication mid Networking. Piscataway: IEEE Press, 2008:1 -4.
  • 9da CUNHA A L, ZHOU JIANPING, DO M N. The nonsubsampled contourlet transform: theory, design, and applications [J]. IEEE Transactions on Image Processing, 2006, 10(5) : 3089 - 3101.
  • 10康志伟,刘劲,何怡刚.基于HVS的抗统计分析的小波域密写[J].国防科技大学学报,2007,29(3):76-80. 被引量:2

二级参考文献42

  • 1张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法[J].中山大学学报(自然科学版),2005,44(3):29-33. 被引量:3
  • 2张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 3刘歆,牛少彰.信息隐藏的检测算法研究综述[J].北京电子科技学院学报,2005,13(4):90-94. 被引量:2
  • 4郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 5Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336.
  • 6Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding A Survey[J]. Proc. of the IEEE, 1999, 87(7): 1062-1078.
  • 7Kawaguchi E, Eason R O. Principle and Application of BPCS-steganography[C]//Proc. of Multimedia Systems and Applications Conference. Boston, USA: [s. n.], 1998:464 - 472.
  • 8Wu Dachun, Tsai W H. A Steganographic Method for Images by Pixel-value Differencing[J]. Pattern Recognition Letters, 2003, 24(10): 1613-1626.
  • 9Chang Chin-Chen, Tseng Hsien-Wen. A Steganographic Method for Digital Images Using Side Match[J]. Pattern Recognition Letters, 2004, 25(12): 1431-1437.
  • 10Zhang Xinpeng, Wang Shuozhong. Steganography Using Multiple-based Notational System and Human Vision Sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1): 67-70.

共引文献88

同被引文献53

  • 1刘鸿霞,夏春和.图像隐写分析现状研究[J].计算机工程与设计,2006,27(1):21-25. 被引量:9
  • 2李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法[J].通信学报,2006,27(4):87-94. 被引量:38
  • 3汪太月,李志明.一种广义高斯分布的参数快速估计法[J].工程地球物理学报,2006,3(3):172-176. 被引量:38
  • 4刘昌鑫,朱平,夏春和.F5隐写算法及其隐写分析研究[J].计算机工程与设计,2007,28(4):884-887. 被引量:6
  • 5陈开亮,王建军.一种HVS和Contourlet结合的图像水印算法[J].计算机辅助设计与图形学学报,2007,19(6):811-816. 被引量:16
  • 6姚国祥 林良超.RSA密钥对高效生成算法.计算机工程,2007,33(20):148-149,152.
  • 7Gul G. , Kurugollu F. JPEG Image Steganalysis Using Multivari- ate PDF Estimates with MRF Cliques[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):578 -587.
  • 8Prema G. , Natarajan S.. Steganography Using Genetic Algo- rithm Along with Visual Cryptography for Wireless Network Ap- plication[ C ]. International Conference on Information Commu- nication and Embedded Systems, Chennai, India, 2013:727 - 730.
  • 9Ramaiya M. K. , Naveen H. , Anil Kishore S.. Security Im- provisation in Image Steganography Using DES[ C]. IEEE 3rd International on Advance Computing Conference, Ghaziabad, In- dia, 2013 : 1094 - 1099.
  • 10Jeon H. , Choi J. , McLaughlin S. W. , et al. Channel Aware Eneryption and Decision Fusion for Wireless Sensor Networks I J]. IEEE Transactions on Information Forensics and Security, 2013, 8(4) :619 -725.

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部