期刊文献+

基于视觉感知与菱形编码的图像隐写算法 被引量:1

Image Steganographic Algorithm Based on Visual Perception and Diamond Encoding
下载PDF
导出
摘要 为提供较大的隐写容量和保持良好的载密图像质量,提出一种基于视觉感知和菱形编码的图像隐写算法。根据人类视觉系统,针对人眼对图像的高中低灰度区、纹理区及平滑区的敏感度的不同,在不同区域选择嵌入不同数量的秘密信息;同时为了尽可能减少对图像像素值的改变,采用改进的菱形编码来嵌入秘密信息。实验结果表明,与HVS-OPAP算法相比,该算法图像的嵌入容量提高了4.09%,获取的隐写图像具有更好的不可感知性,同时峰值信噪比平均提高了1.5dB,而且该算法具有抗RS隐写分析能力,安全性更高。 In order to provide larger capacity of the hidden secret messages and maintain a good visual quality of stego-image,a novel image steganography based on visual perception and Diamond Encoding( DE) is proposed. According to the Human Visual System(HVS),human eyes have different sensitivity on high gray areas,middle gray areas and low gray areas,texture areas and smooth areas. The different amounts of secret messages are embedded in the different areas of cover images. Especially,the modified DE is used to minimize the change of the image pixel value. Experimental results show that the proposed method can effectively improve the embedding capacity than HVS-OPAP algorithm by 4 . 09%, while stego-image has better imperceptibility, PSNR average of 1. 5 dB, and RS steganalysis methods can not detect whether the secret information is embedded,so it has a better security.
出处 《计算机工程》 CAS CSCD 2014年第10期6-10,共5页 Computer Engineering
基金 浙江省移动网络应用技术重点实验室基金资助项目(2010E10005) 浙江省新一代移动互联网用户端软件科技创新团队基金资助项目(2010R50009) 浙江省重点科技创新团队基金资助项目(2012R10009-11 2012R10009-20) 浙江省重大科技专项重点工业基金资助项目(2011C11042)
关键词 隐写术 容量 人类视觉系统 像素值 菱形编码 RS隐写分析 steganography capacity Human Visual System ( HVS ) pixel value Diamond Encoding ( DE ) RS stegannalysis
  • 相关文献

参考文献14

  • 1王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:77
  • 2张新鹏,刘焕,张颖春,王朔中.融合方向编码和湿纸编码的高效信息隐藏[J].上海大学学报(自然科学版),2010,16(1):1-4. 被引量:9
  • 3Zhang Xinpeng,Wang Shuozhong.Efficient Steganographic Embedding by Exploiting Modification Direction[J].IEEE Communications Letters,2006,10(11):781-783.
  • 4Lin Kai Yung.Data Hiding by Exploiting Modification Direction Technique Using Optimal Pixel Grouping[C] //Proc.of ICETC’10.[S.1.] :IEEE Press,2010:121-123.
  • 5Hong W.An Efficient Prediction-and-shifting Embedding Technique for High Quality Reversible Data Hiding[J].EURASIP Journal on Advances in Signal Processing,2010,10(1):105-118.
  • 6Lee C F,Chang C C,Wang K H.An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy[J].Image and Vision Computing,2008,26(12):1670-1676.
  • 7Wu D C,Tsai W H.A Steganographic Method for Images by Pixel Value Differencing[J].Pattern Recognition Letters,2003,24(9):1613-1626.
  • 8Wang C M.A High Quality Steganographic Method with Pixel Value Differencing and Modulus Function[J].Journal of Systems and Software,2008,81(1):150-158.
  • 9Hong W,Chen T S,Luo C W.Data Embedding Using Pixel Value Differencing and Diamond Encoding with Multiple Base Notational System[J].Journal of Systems and Software,2012,85(5):1166-1175.
  • 10Lou D C.A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity[J].Journal of Systems and Software,2010,83(7):1236-1248.

二级参考文献30

  • 1张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法[J].中山大学学报(自然科学版),2005,44(3):29-33. 被引量:3
  • 2张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 3刘歆,牛少彰.信息隐藏的检测算法研究综述[J].北京电子科技学院学报,2005,13(4):90-94. 被引量:2
  • 4郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 5WANG H Q, WANG S Z. Cyber warfare--steganography vs. steganalysis [ J]. Communication of the ACM, 2004, 47(10) :76-82.
  • 6FRIDRICH J, GOLJAN M. Practical steganalysis of digital images-state of the art, security and watermarking of multimedia [C] // Proceedings of SPIE, San Jose, USA. 2002:1-13.
  • 7TSENG Y C, CHEN Y Y, PAN H K. A secure data hiding scheme for binary images [ J]. IEEE Transactions on Communications, 2002, 50 : 1227-1231.
  • 8WESTFELD A. F5-a steganographic algorithm [ C ] // Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001:259-302.
  • 9ZHANG X P, WANG S Z. Dynamically running coding in digital steganography [ J ]. IEEE Signal Processing Letters, 2006, 13(3) :165-168.
  • 10FRIDRICH J, FILLER T. Practical methods for minimizing embedding impact in steganography [ C ] // Proceedings of SPIE. 2007:650502.

共引文献87

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部