期刊文献+

基于图遍历的自适应调色板图像密写方案

Adaptive graph traversal-based steganographic scheme for palette images
原文传递
导出
摘要 提出了一种新的基于图遍历的自适应调色板图像密写方案。将调色板中各颜色视为图节点,利用颜色间的亮度差和欧氏距离,构建颜色图。应用图的遍历为颜色节点,分配秘密比特。嵌入秘密信息的过程中,利用相邻像素颜色间的相关性,建立自适应嵌入准则。对比实验结果表明,提出的密写方案具有较大的嵌入容量,并保持很好的图像质量,与其他的密写方案相比,提出的方案更能抵抗直方图特征函数(HCF)统计分析。 A novel adaptive graph traversal-based steganographic scheme for palette images is proposed. Each color in the palette is considered to be a graph node,and a color-graph is constructed by exploiting the difference of luminance and Euclid distance between any two colors. Assignment of secret bit for each color-node is completed according to traversal of a graph. During the data embedding,the adaptive rule is built by exploiting correlations among colors of the pixels. Comparative experimental results show that the proposed scheme can gain a larger capacity,maintain quite good image quality,and be more resistant to HCF attack,compared with some other steganographic schemes.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2013年第9期1796-1802,共7页 Journal of Optoelectronics·Laser
基金 国家自然科学基金(61170226) 中央高校基本科研业务费专项资金(SWJTU11CX047) 成都市科技计划(12DXYB214JH-002)资助项目
关键词 信息隐藏 图遍历 调色板 自适应 tata hiding graph traversal palette adaptive
  • 相关文献

参考文献19

  • 1王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:76
  • 2WANG Huai-qing, WANG Shuo-zhong. Cyber warfare: steganography vs. Steganalysis[J]. Communication of the ACM, 2004,47(i0) : 76-82.
  • 3Abbas Cheddad, Joan Condenll, Kevin Curran, et al. Digit- al image steganography., survey and analysis of current methods[J]. Signal Processing, 2010,98(3) : 727-752.
  • 4HONG Wien, CHEN Tung-shou. A Novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012,7(1) :176-184.
  • 5Andreas Westfeld. F5 A steganographic algorithm[A]. Proc. of 4th International Workshop on Information Hiding [C]. 2001,2137 : 289-302.
  • 6Phil Sallee. Model-based steganography[A]. Proc. of 2nd international Workshop on Digital Watermarking [C]. 2004,2939:154-167.
  • 7Solanki K, Sarkar A, Manjunath B S. YASS: yet another steganographic scheme that resists blind steganalysis [A]. Proc. of 9:h International Workshop on Information Hiding[C]. 2007,4567 : 16-31.
  • 8ZHANG Xin-peng, WANG Shuo-zhong. Eficient stegano- graphic embedding by exploiting modification direction[J]. IEEE Communication Letters, 2006,13 (5) : 285-287.
  • 9Matthew Kwan. Gifshuffle[EB/OL]. http//www, dark- side. com. au/gifshuffle/, 2003.
  • 10Romana Machado. EzStego[EB/OL]. http://www, infor- matik, htw-dresden, de/: fritzsch/VWA/Source/Ez- Stego. java, 1996.

二级参考文献7

共引文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部