期刊文献+

基于位置奇偶性的数据隐藏算法 被引量:2

A parity-data hiding algorithm based on the position
下载PDF
导出
摘要 该文提出一种针对JPEG图像的隐藏算法,通过修改非0的DCT系数,使得要嵌入秘密信息位的奇偶性和非0的DCT系数与其对应的位置的差值的奇偶性相同,从而实现嵌入的目的。实验结果表明,该文提出的算法比经典的LSB算法有较好的隐藏容量,且隐秘图像有更好的视觉效果,且能够抵抗RS攻击。 This paper presents a hiding algorithm for JPEG images,By modifying the non-zero DCT coefficients,makes the to embed hidden information bits and the difference between the non-zero DCT coefficients and its corresponding position of the same parity,to achieve the purpose of the embedded.The experimental results show that the proposed algorithm is better than the classic LSB algorithm in hidden capacity,and the secretimage has better visual effect,and be able to resist RS attack.
作者 周满平 丁丰
出处 《科技创新导报》 2013年第5期23-25,共3页 Science and Technology Innovation Herald
关键词 信息隐藏 LSB算法 奇偶位置 information hiding LSB algorithm Parity position
  • 相关文献

参考文献10

  • 1Jessica Fridrich, Miroslav Goljan, and Rui Du, Detecting LSB Steganography in Color and Gray- Scale Images, Magazine of IEEE Multimedia, Special Issue on Multimedia and Security, 2001: 22-28.
  • 2Westfeld, A.and Pfitzmann, A.: Attacks on Steganographic Syslems.In:Pfitzmann A.(eds.)3rd International Workshop.Lecture Notes in Computer Science, Vol. 1768.
  • 3Westfeld, A.: High Capacity Despite Better Steganalysis (F5: Steganographic Algorithm) . In.. Moskowitz, I.S. (eds.)Information Hiding.4th International Workshop.Lecture Notes in Computer Science, Vol.2137.Springer-Verlag, Berlin Heidelberg New York, 2001: 289-302.
  • 4Fridrich, J.,Goljan, M.,and D.Hogea.Steganalysis of JPEG Images.. Breaking the F5 Algorithm.5th Information Hiding Workshop, Noordwijkerhout, Netherlands, 2002.. 7-9.
  • 5N.Provos, Defending against statistical steganalysis, in,Proceedings of the 10th USENIX Security Symposium, 2001: 323-336.
  • 6Fridrich J.,Goljan M.,and Hogea D., "Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002, ACM Press, 2002.
  • 7Fridrich J.,Goljan M.,and Hogea D., "Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002, ACM Press, 2002. B.Chen and G.Wornell.Quantization index modulation:A class of provably good methods for digital watermarking and information embedding[J]. IEEE Trans.Information Theory, 2001,47(4).
  • 8Noda It, Niimi M, Kawaguchi E (2006).uttigh- performance JPEG steganography using quantization index modulation in DCT domain."[J].Pattern Recognition Lett, 27 (5) : 455-461.
  • 9Saravanan,V., Bora, P.K., Ghosh, D.: Oblivious Image-Adaptive Watermarking Using Quantization Index Modulation.In:The Eighth National Conf.on Communications, India, January 2002, 2002: 26-37.
  • 10Tseng, H.W., Chang, C.C.: High capacity data hiding in jpeg-compressed images[J].Informatica, 2004,15(1):127-142.

同被引文献1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部