期刊文献+

YASS隐写算法的嵌入容量改进 被引量:1

Improve the Embedding Capacity of YASS
下载PDF
导出
摘要 高安全性和高嵌入容量一直是隐写算法设计的目标。YASS算法是安全性较高的隐写算法,然而其嵌入容量较低。论文对此进行了改进,通过对DCT域系数进行随机分块后,利用块中非零系数的比例嵌入消息。实验证明改进后的算法较好的保持载体统计性质,嵌入效率明显优于传统YASS。 High security and large embedding capacity is always the goal of designing steganography scheme.YASS has significant security while low embedding capacity.This paper improves the embedding capacity by using number of non-zero coefficient in random blocks to embed information.Experiment shows that this method holds statistics properties of cover well,while contains more sufficient information than YASS.
出处 《舰船电子工程》 2013年第7期94-96,共3页 Ship Electronic Engineering
关键词 隐写 YASS 嵌入容量 steganograph YASS embedding based proportion
  • 相关文献

参考文献11

  • 1A. Westfeld. High capacity despite better steganalysis[C]// Proc. of the 4th Informat-ion Hiding Workshop, 2001: 289- 302. Software available at http://wwwrn, inf. tu-dresden, de/ -westfeld/f5. html.
  • 2http://zooid. org/paul/crypto/jsteg/.
  • 3http://redwood. ucdavis, edu/phil/papers/iwdw03.htm.
  • 4P. Sallee. Model based Mothods for Steganography and Stega nalysis[J]. International Journal of Image and Graphics. 2005 15 (1) : 167-189. Software available at http://www, philsallee. com/mbsteg/index, html.
  • 5N. Provos. Defending against staticstical steganalysis[C]// Proc. of 10th USENIX Security Symposium, Washington DC, USA, 2001. Software available at http://www, outguess, org.
  • 6S. Hetzl, P. Mutzel. A graph theoretic approach to steganog raphy[C]//Proc, of the 9th IFIP TC6 TC-11 International Conference, Communications and Multimedia Security, Salzburg, Austria,2005(3677) : 119 - 128. Software available at http/www, steghide, sourceforge, net.
  • 7Pevny. T, Fridrich. J. Merging Markov and DCT features for multi class JPEG steganalysis[C]//Proc, of 4th Electronic Ima ging, Security, Steganography and Watermarking of Multime dia Contents,2007: 3- 14.
  • 8KaushaI S, Anindya S. K. YASS: Yet Another Steganographic Scheme That Resist Blind Steganalysis[C]//IH 2007 Spring, 2007:16-31.
  • 9Divsalar, D. , Jim H. Coding theorems for turbo-like codes [C]//Proe. of 36th Allerton Conf. on Communications, Con trol, and Computing, 1998: 201- 210.
  • 10Chen, B, Wornell, G. Quantization index modulation: a class of provably good methods for digital watermarking and infor- mation embedding [J]. IEEE Transactions on Information Theory, 2001 : 1423-1443.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部