期刊文献+

基于2^k修正和Canny边缘检测的图像隐写 被引量:1

Image Steganography Based on 2^k Correction and Canny Edge Detection
下载PDF
导出
摘要 针对信息安全,提出基于Canny边缘检测和2k修正的信息隐藏算法。秘密信息仅仅隐藏在边界像素上,首先利用Canny边缘检测算子检测载体图像的边缘,然后利用伪随机数序列对边缘像素进行重排。为了增强秘密信息的安全性,采用霍夫曼编码把秘密信息变成二进制位流。每个像素隐藏的位数由其灰度值确定。最后,为了增强隐写图像的视觉效果,采用2k修正法进一步减小隐写图像和载体图像之间的误差。实验证明提出的方法比LSB-2和文献[12]的方法更好。 A new algorithm is proposed which is based on Canny edge detector and 2k correction. Firstly, Canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. PRNG is used to randomize the edge pixels in order to enhance security. Then Huffman encoding is practiced to code the secret data before embedded according to Huffman table. Calculate coherent bit length L on the base of relevant edge pixels. Finally, the method of 2^k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is better in PSNR and capacity than LSB-2 and scheme [12].
出处 《图学学报》 CSCD 北大核心 2015年第1期52-55,共4页 Journal of Graphics
基金 国家自然科学基金资助项目(61473329) 福建省教育厅科技资助项目(JA12351 JB14132) 福建省教育厅省属高校科研专项资助项目(JK2013062) 福建师范大学科研创新基金资助项目(KY2014029 KY2014028)
关键词 嵌入位长 霍夫曼表 CANNY边缘检测 2k修正 coherent bit length Huffman table Canny edge detector 2^k correction
  • 相关文献

参考文献12

  • 1Schneier B.Applied cryptography:protocols,algorithm and source code in C[M].2nd ed.John Wiley & Sons Press,1996:30-39.
  • 2Channalli S,Jadhav A.Steganography an art of hiding data[J].International Journal on Computer Science and Engineering,2009,1(3):137-141.
  • 3Chan C K,Cheng L M.Hiding data in images by simple LSB substitution[J].Pattern Recognition,2004,37(3):469-474.
  • 4Tovee M J.An introduction to the visual system[M].Cambridge University Press,2008:73-78.
  • 5Kawagnchi E,Eason R O.Principle and applications of BPCS-steganography[C]//Proceedings of SPIE:Multimedia Systems and Applications,1998:464-473.
  • 6Canny J.A computational approach to edge detection[J].IEEE Trans.Pattern Analysis and Machine Intelligence,1986,8(6):679-698.
  • 7Bassil Y.Image steganography based on a parameterized Canny edge detection algorithm[J].International Journal of Computer Applications,2012,60(4):35-40.
  • 8赵跃华,房军祥.一种改进的伪随机数算法的研究[J].信息网络安全,2011(5):44-46. 被引量:3
  • 9Huffman D A.A method for the construction of minimum-redundancy codes[C]//Proceedings of the I.R.E.,1952:1098-1102.
  • 10Rubab S,Younus M.Improved image steganography technique for colored images using Huffrnan encoding with symlet wavelets[J].International Journal of Computer Science,2012,9(1):194-196.

二级参考文献8

  • 1王永 李盛竹.基于多个Logistic映射的分组加密算法.计算机工程,2007,33(20):162-164.
  • 2Robert Matthews.On the derivation of a"chaotic"encryption algorithm[J].Cryptologia,1989,8(1):29-41.
  • 3SakaguchiH,TomitaK.Bifurcation of the couple Logistic map[J].Progress of Theoretical Physics,1987,78(2):305-309.
  • 4Ferretti A,Rahman NK.A study of coupled Logistic map and its applications in chemical physics[J].Chemical Physics,1988,1 19:275-288.
  • 5Welstead ST,Cromer TL.Coloring periodicities of two-dimension-al mappings[J].Computers & Graphics,1989,14(1):125-126.
  • 6于志宏,王静波,刘喆,周栩,李江春,于哲舟.基于Logistic和Baker映射的视频加密方法[J].吉林大学学报(信息科学版),2008,26(3):253-258. 被引量:8
  • 7谢建全,谢勍,阳春华,黄大足.基于Logistic映射的加密算法的安全性分析与改进[J].小型微型计算机系统,2010,31(6):1073-1076. 被引量:15
  • 8胡国杰,冯正进.一类数字混沌加密系统的安全性分析[J].电子与信息学报,2003,25(11):1514-1518. 被引量:14

共引文献2

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部