期刊文献+

作用于块奇偶性的二值图像数据隐藏算法研究 被引量:1

Study of Data Hiding Method in Binary Images Acted on Block Parity
下载PDF
导出
摘要 提出一种作用于奇偶性矩阵之上的二值图像数据隐藏算法.算法首先对原始图像进行分块,获取原图的奇偶性矩阵和标志矩阵;再对这些矩阵进行二次分块,使用标志矩阵衡量块的可嵌入性,选取可嵌入的奇偶性矩阵块并在其上修改至多一个值来嵌入数据.嵌入过程中,从要修改的奇偶性矩阵值对应的原始图像块中翻转可修改程度最高的像素,使得奇偶性矩阵块所代表的信息和嵌入信息相一致.文中对算法隐藏容量、数据嵌入后图像质量和安全性进行了分析.实验结果表明,该算法有图像质量好、修改像素少、嵌入容量大等优点,并能很好地应用于二值图像的认证中. A scheme of data hiding in binary images which acts on the parity matrix is proposed. The algorithm works as the following sequence, firstly, the original image is blocked once to extract the parity matrix and the sign matrix. And then block the parity matrix and the sign matrix twice. The sign matrix is used to check the embeddability of parity matrix block. The data is successfully embed- ded by changing at most one value of the embeddable parity matrix block. During the process of embedding, turnover the most changeable pixel of the original image block which corresponding to the modified value in parity matrix block. Therefore, the embed- ded information is consistent with the information which parity matrix block represents. Finally, the characteristic such as embed ca- pacity, quality of data embedded image and security is analyzed in the present paper. The experimental results also show that this al- gorithm has the properties of excellent image quality, fewer pixels change, and larger embed capacity , besides, it can be well applied to binary image authentication.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第6期1424-1427,共4页 Journal of Chinese Computer Systems
基金 长沙市科技计划重点项目(K1104009-11)资助
关键词 二值图像 数据隐藏 奇偶性矩阵 标志矩阵 图像认证 binary images data hiding parity matrix sign matrix image authentication
  • 相关文献

参考文献4

二级参考文献43

  • 1I J Cox,M L Miller. The first 50 years of electronic watermarking[J]. Applied Signal Processing,2002,56(2) :126- 132.
  • 2F A P Petitcolas, R J Anderson, M G Kuhn. Information hidinga survey[ J ]. Proceedings of the IEEE, 1999, 87 (7) : 1062 - 1078.
  • 3F Hartung,M Kutter. Multimedia watermarking techniques, proceedings of the IEEE[J]. 1999,87(7) :1079 - 1107.
  • 4I J Cox, M L Miller, J A Bloom, J Fridrich, T Kalker. Digital Watermarking and Steganography ( Second Edition) [M]. San Mateo,CA:Morgan Kaufmann,2008.1 - 13.
  • 5M Yeung,F Mintzer. Invisible watermarking for image verification[ J]. J. of Electronic Imaging, 1998,7 (3) : 578 - 591.
  • 6I Cox, J Kilian, T Leighton, T Shamoon. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans. Image Processing, 1997,6(12) : 1673 - 1687.
  • 7K Matsui, K Tanaka. Video-steganography: how to secretly embed a signature in a picture[J].Proc.IMA Intellectual Property Project, 1994,1 (1) :187 - 206.
  • 8M Fu, O Au. Data hiding by smart pair toggling for halftone images[ A]. Proc. IEEE Inter. Conf. On Acoustics, Speech, and Signal Processing[ C ]. Istanbul, Turkey, 2000.2318 - 2321.
  • 9N F Maxemchuk, S Low. Marking text document [ A ]. Proc.IEEE ICIP'97[C]. Santa Barbara,CA,USA, 1997.13 - 13.
  • 10E Koch, J Zhao. Embedding robust labels into images for copyright protection[A]. Proc. Inter. Congr. Intellectual Property Rights for Specialized Information, Knowledge and New Technologies[C].Hamburg, Germany, 1995.242 - 251.

共引文献243

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部