期刊文献+

基于JPEG图像的密写改进方案

The improved steganography scheme based on JPEG image
下载PDF
导出
摘要 为了提高秘密信息的嵌入量,文中基于F4密写提出了一种增大嵌入量的密写改进方法。该方法通过让部分DCT系数中0系数携带秘密信息,从而提高秘密信息的嵌入量。实验表明,该方案在保持图像DCT系数直方图基础上,不但能抵抗直方图和分块特性密写分析,安全性也比较高,而且信息嵌入率也提高了8%左右。 In order to increase the embedding capacity of secret messages,a secure steganographic technique which based on the F4 steganography method is propose.The method allows partial DCT coefficients of the 0 coefficients to embed secret information,so as to increase the hiding capacity.This way,the histogram-based an d blockiness-based steganalyses are effectively resisted.Simulation results show that the proposed method is high secure for cover images,andand information embedding rate has increased by about 8%.
作者 戴薇
机构地区 武汉科技大学
出处 《电子设计工程》 2013年第16期107-109,共3页 Electronic Design Engineering
关键词 JPEG图像 嵌入量 DCT系数 密写分析 JPEG image embedding capacity DCT coefficient steganalysis
  • 相关文献

参考文献6

  • 1Petitcolas F A P,Anderson R J,Kuhn M G. Infonnation hiding-Asurvey[J]. Proc.IEEE , 1999,87 (7) : 1062-1078.
  • 2张新鹏,王朔中.JPEG图像中的安全密写方案[J].电子与信息学报,2005,27(11):1813-1817. 被引量:9
  • 3Wesffeld A.FS-A Steganographic Algorithm[C]//In 4th Interna- tional Workshop on Information Hiding,Lecture Notes in computer Science, 2137.Springer-Verlag,2001:289-302.
  • 4王朔中,张新鹏,张开文.数字密写与密写分析[M].北京清华大学出版社.2010.
  • 5Fridrich J, oljan M,Hogea D. Attacking the OutGuess[C]//In Proc. of the ACM Workshop on Multimedia and Security 2002. France:Juan-Ics-Pins, 2002.
  • 6陈丹,罗欣,王育民.一种保持直方图特性的JPEG图像掩密算法[J].电子与信息学报,2006,28(2):252-256. 被引量:2

二级参考文献21

  • 1Provos N,Honeyman P.Hide and seek:an introduction to steganography.IEEE Security & Privacy,2003,1(3):32-44.
  • 2Fridrich J,Goljan M.Practical steganalysis-state of the art.Proc.SPIE Photonics West,Electronic Imaging 2002.Security and Watermarking of Multimedia Contents,San Jose,California,Jan.2002:1-13.
  • 3Wallace G W.The JPEG still picture compression standard.Communications oftheACM,1991,34(4):30-44.
  • 4Derek Upham,JPEG-JSteg-V4.http://www.funet.fi/pub/crypt/steganographv/ipeg-JSteg-v4.diff.gz.
  • 5Provos N.OutGuess-universal steganography.August 1998.http://www.outguess.org/.
  • 6Westfeld A.F5-a steganographic algorithm:high capacity despite better steganalysis.Proc.4th Int'l Workshop Information Hiding.Springer-Verlag,2001,289-302.http://wwwm.inf.tudresden.de/-west feld/f5.html.
  • 7Westfeld A,Pfitzmann A.Attacks on steganographic systems.Proc.3rd Int'l Workshop Information Hiding Dresden,Germany,Springer-Verlag,1999:61-76.
  • 8Fridrich J,Goljan M,and Hogea D.Steganalysis of JPEG images:breaking the F5 algorithm.Proc.5th Int'l Workshop Information Hiding.Noordwijkerhout,the Netherlands,Springer-Verlag,2002:310-323.
  • 9Latham A.Steganography:JPHIDE and JPSEEK.1999.http://linux01.gwdg.de/-alatham/stego.html.
  • 10Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey. Proc. IEEE, 1999, 87(7): 1062- 1078.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部