期刊文献+

基于PVD隐写术的载体图像的选择研究 被引量:1

Study and Selection of Carrier Image Based on the Steganography of PVD
下载PDF
导出
摘要 设计高性能嵌入算法与选择合适载体图像是提高隐写术性能的两个重要途径。基于像素差值PVD(pixel-value differencing)是一种算法复杂度低,嵌入容量大的高性能隐写算法。本文针对PVD嵌入算法,研究最佳载体选择问题。论文分析与讨论载体图像的复杂度、直方图及其平滑度等载体图像特征值,和相对熵、直方图的改变量等隐写术系统性能参数之间的关系,研究载体图像的特征值对PVD隐写术系统性能的影响,为PVD隐写算法选择最佳的载体图像提供理论依据。实验结果表明,选择直方图曲线连续变化缓慢的图像作为PVD隐写算法的载体图像,能有效提高隐写术系统的不可感知性能。 Designing high performance embedded algorithm and choosing a suitable carrier image are two important ways to improve the performance of steganography. The algorithm of pixel value differ- encing (PVD) is a method of low complexity and large - capacity. Based on the embedding algo- rithm of PVD, the selection of the best carrier is considered. In this paper, the relations between the characteristic values of the complexity, histogram, smoothness of the carrier image, and the relative entropy, histogram change quantity which is steganography performance parameters of the system is analysed and discussed. The influence of characteristics values of the carrier image for steganograph- fectively improve the performance of imperceptible of steganographic system.
出处 《无线通信技术》 2014年第4期41-45,共5页 Wireless Communication Technology
基金 国家科技重大专项基金资助项目(2011ZX03002-004-02) 浙江省重点科技创新团队基金资助项目(2012R10009-04) 浙江省杰出青年科学基金资助项目(R1110416) 教育部高等学校博士学科点专项科研基金资助项目(20113305110002) 浙江省信息与通信工程重中之重学科开放基金项目(XKXL1302) 宁波市科技创新团队基金资助项目(2011B81002)
关键词 隐写术 载体图像 图像复杂度 PVD算法 RS检测 steganography carrier image complexity of image steganogxaphy algorithm RS
  • 相关文献

参考文献14

  • 1ALBRECHT'SEN E, HOVDEN J. The information securi- ty digital divide between information security mangers and users [ J ]. Computers & Security, 2009, 28 (6) : 476 - 490.
  • 2王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:76
  • 3LIU Q Z, ANDREW H S, CHEN Z X, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images [ J ]. Pattern Recognition, 2008, 41 ( I ) :56 - 66.
  • 4J. ZHANG, I. J. COX, G. DOERR. Steganalysis forI_.SB matching in images with high - frequency noise [ A ]. In: Proc. of IEEE International Workshop on Mul- timedia Signal Processing[ C] //Chania Crete, Greece, 2007:385-388.
  • 5郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 6HEDIEH SAJEDI, MANSOUR JAMZAD, Cover selection steganography method based on similiarity of image blocks [C]//2008 IEEE 8th International conference on com- puter and information technology . hops, 379 -384.
  • 7FKIDRICH J, GOLJAN M, DE R. ring LSB steg- anography in color and grayscale image: IEEE Mul- timedia, 2001, 8(4) :22 -28.
  • 8FRIDRICH J, GOLJAN M. Practical steganographic of digital images - state of the art[ C ]//USA: .In Security and Watermarking of Multimedia Contents IV, 2002, 4675 :1 - 13.
  • 9FRIDRICH J. GOLJAN M. Reliable detection of LSB steganography in color and grayseale images: U. S. Pa- tent RFA0, 477[P]. 2008 -9 -2.
  • 10WU N I, WANG C M, TSAI C S, et al. A high quality steganographle method with pixel - value differencing and modulus function[J]. Journal of Systems and Soft- ware, 2008, 81(1) :150 -158.

二级参考文献30

  • 1郭艳卿,何德全,尤新刚,孔祥维.信息隐藏的层次安全性[J].中山大学学报(自然科学版),2004,43(A02):105-108. 被引量:4
  • 2张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法[J].中山大学学报(自然科学版),2005,44(3):29-33. 被引量:3
  • 3张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 4刘歆,牛少彰.信息隐藏的检测算法研究综述[J].北京电子科技学院学报,2005,13(4):90-94. 被引量:2
  • 5郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 6Simmons G J. The prisoner's problem and the subliminal channel[ A]. Advances in Cryptography: Proceedings of CRYPTO'83 [ C ]. London: Plenum Press, 1983.51 - 67.
  • 7Cachin C. An information-theoretic model for steganography[A] .Information Hiding: Second International Workshop, vol.1525 of Lecture Notes in Computer Science[ C], Portland, Oregon, U. S. A: Springer- Verlag Press, 1998.306 - 318.
  • 8R Chu, X You, X Kong. A DCT-based image steganographic method resisting statistical attacks[ A]. The 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing[ C]. Montreal, Canada: Springer-Verlag Press, 2004. 953 -956.
  • 9Phil Sallee. Model-based steganography [ A ]. International Workshop on Digital Watermarking [ C ]. Seoul, Korea:Springer-Verlag Press ,2003.154 - 167.
  • 10A Wesffeld, A Pfitzmann. Attacks on steganographic systems:Breaking the steganographic utilities EzStego, Jsteg, Stegnos,and S-tools-and some lessons learned[A], The 3rd Information Hiding Workshop, Lecture Notes in Computer Science 1768[ C]. New York: Springer-Verlag Press, 2000.61 - 76.

共引文献78

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部