期刊文献+

一种基于游程长度的高安全性图像信息隐藏算法 被引量:9

Image Information Hiding Algorithm with High Security Based on Run-length
下载PDF
导出
摘要 针对目前多数信息隐藏算法的安全性不高使其无法应用于隐蔽通信等领域的问题,提出了一种基于游程长度的隐藏算法,算法的基本思想是将图像分解成多个二值图像,通过对分解后的二值图像游程长度的奇偶性来隐藏信息,最多改变二值图像黑白交界处的一个像素值便可隐藏1bit的信息,隐藏信息可实现盲提取。算法未造成图像低位平面的0和1分布特性的明显改变,也未造成长游程的减少,因此可抵御许多针对LSB及其改进方法的隐写分析技术的检测。仿真试验结果显示,算法的安全性高,不可感知性好,并且嵌入容量大,可应用于隐藏通信等对隐藏容量和安全性有较高要求的场合。 Aiming at the problem that most information hiding algorithms are not secure enough to afford secret communication,a kind of hiding information algorithm based on Run Length was proposed.The main idea of this algorithm is separating the image into several binary images.Through utilizing the parities of the Run Length of the binary images,one bit of information can be successfully embedded while even one pixel that is located along black-white boundary of the binary image is modified.The blind extraction of the hiding information can be achieved.The algorithm neither obviously changes distribution property of 0 and 1 in image's low plane,nor reduces the Length of Run.Hence it can defend various detections against LSB and its improved method.The simulation result shows that the algorithm has high security,good imperceptibility and large embedding capacity.Furthermore,it can be applied in secret communication and other situation that requires high security and large capacity.
出处 《计算机科学》 CSCD 北大核心 2014年第3期172-175,共4页 Computer Science
基金 湖南省科技计划项目(2012GK3064) 湖南省教育科学"十二.五"课题(XJK 011BXJ008) 省重点学科建设项目资助
关键词 信息隐藏 游程长度 嵌入容量 不可感知性 安全性 Information hiding Run-length Embedding capacity Imperceptibility Security
  • 相关文献

参考文献15

  • 1Nezhadarya E,Wang J,Ward R K.Image watermarking based on multiscale gradient direction qnantization[J].IEEE Transactions on Information Forensics and Security,2011,6 (4):1200-1213.
  • 2姜传贤,陈孝威,李智.基于文本重要内容的鲁棒水印算法[J].自动化学报,2010,36(9):1250-1256. 被引量:7
  • 3Zhou X M,Wang S C,Xiong S C,et al.Attack model and performance evaluation of text digital watermarking[J].Journal of Computers,2010,5 (12):1933-1941.
  • 4陈够喜,陈俊杰.多载体信息隐藏安全性研究[J].小型微型计算机系统,2011,32(4):644-646. 被引量:4
  • 5Ker A D.Steganalysis of embedding in two least-significant bits[J].IEEE Transitions on Information Forensics and Security,2007,1(2):46-54.
  • 6雷雨,杨晓元,潘晓中,郭敦陶.基于局部随机性的YASS隐写分析方法[J].计算机学报,2010,33(10):1997-2002. 被引量:4
  • 7Fillatre L.Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images[J].IEEE Transactions on Signal Processing,2012,60(2):556-569.
  • 8张湛,刘光杰,戴跃伟,王执铨.基于Markov链安全性的二阶统计保持隐写算法[J].中国图象图形学报,2010,15(8):1175-1181. 被引量:7
  • 9Samir K B,Avishek R,Tuhin U P.A palette based approach for invisible digital watermarking using the concept of run-length[A] //2010 International Conference on Computational Intelligence and Communication Networks,CICN 2010[C].2010:83-87.
  • 10周继军,杨义先.图像LSB隐藏游程检测算法[J].西安邮电学院学报,2005,10(1):1-5. 被引量:1

二级参考文献93

共引文献88

同被引文献51

引证文献9

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部