期刊文献+

利用行列变换的无损信息隐藏算法 被引量:3

Lossless data hiding with ranks transform
下载PDF
导出
摘要 为了充分挖掘载体图像的像素相关性,提出一种利用行列变换的无损信息隐藏算法LDHA_RT。该算法依次计算列方向、行方向和对角线方向的像素差及其直方图,对获得的像素差直方图进行移位以构造冗余空间,实现在指定差值处嵌入隐藏信息。在提取隐藏信息后,LDHA_RT算法可以无损地恢复载体图像,不需要除隐藏信息以外的附加信息。仿真实验表明,与参考文献的算法相比,LDHA_RT算法的PSNR/bits是最低的或接近最低的,表明该算法在保证图像质量的情况下,具有隐藏信息容量大的优势。 For taking full advantage of carrier image's pixel correlation, a lossless data hiding algorithm with ranks transform (LDHA_RT) is proposed. Along with three directions of column, row and diagonal, the pixel difference images and their histograms are calculated one after another. The obtained pixel difference histograms are shifted to construct the redundancy spaces, so that the hiding information could be embedded in a designated position. After the hiding data is extracted, the carrier image could be recovered reversibly without any additional information. The experiments demonstrate that the PSNR/bits of the LDHA_RT is the lowest or close to the lowest, compard with these algorithms mentioned in the references. This implies that the LDHA_RT has large capacity of hiding data under a good image quality.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第9期40-46,共7页 Journal of Chongqing University
基金 重庆市教委科研资助项目(KJ130646 KJ110629)
关键词 信息隐藏 行列变换 像素差 直方图移位 无损恢复 data hiding ranks transform pixel difference histogram shift loseless recovery
  • 相关文献

参考文献20

  • 1韩杰思,汤光明,马晓煜.基于图像的信息隐藏安全性分析[J].微计算机信息,2006(01X):19-20. 被引量:14
  • 2奚吉,梁瑞宇.可逆信息隐藏算法综述[J].信息化研究,2011,37(3):1-3. 被引量:1
  • 3杨玉琴.可逆数据隐藏技术综述[J].无线互联科技,2012,9(7):77-77. 被引量:3
  • 4曾宪庭,李卓,平玲娣.基于块参照像素的无损信息隐藏算法[J].计算机科学,2012,39(2):47-51. 被引量:8
  • 5Honsinger C W, Jones P W, Rabbani M, et al. Lossless recovery of an original image containing embedded data: U.S. Patent 6 278 791[P]. 2001-8-21.
  • 6Maeq B. Lossless multiresolution transform for image authenticating watermarking[C]// Proceedings of EUSIPCO, 2000: 533-536.
  • 7Fridrich J, Goljan M, Du R. Lossless data embeddin~new paradigm in digital watermarking[J]. EURASIP Journal on Advances in Signal Processing, 1900, 2002(2): 185 196.
  • 8Goljan M, Fridrich J J, Du R. Distortion-free data embedding for images[C]//Information Hiding. Springer Berlin Heidelberg, 2001, 21(37): 27-41.
  • 9Celik M U, Sharma G, Tekalp A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2) : 253-266.
  • 10Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896.

二级参考文献44

  • 1施博学,王志良,刘冀伟.基于RTP实时远程图像传输研究与实现[J].微计算机信息,2005,21(2):178-179. 被引量:26
  • 2Bender,W. Gruhl,D. Morimoto. N. Techniques for data hiding [J]. IBM Systems Journal, 1996,35:313-336.
  • 3Ko,B.S. Nishimura,R. Suzuki. Y. Time-spread echo method for digital audio watermarking using pn sequences[C]// Proc.of IEEE International Conference on Acoustic, Speech, and Signal Processing, 2002 (2) :2001-2004.
  • 4Petrovic. R. Audio signal watermarking based on replica modu- lation[C]// Proc. of International Conference on Telecommunica- tions in Modem Satellite, Cable, and Broadcasting Service. 2001,1:227-234.
  • 5He,X. Alexander, I. Michael. S. A high capacity watermarking technique for stereo audio[C]//Proc of IEEE International Con- ference on Acoustics,Speech and Signal Processing. 2004: 393-396.
  • 6Cox,I.J. Kilian,J. Leighton,T. et al. Secure spread spectrum wa- termarking for multimedia[J]. IEEE Trans. on Image Processing, 1997,6( 12):1837-1687.
  • 7Kirovski,D. Malvar. H. Robust spread spectrum audio water- marking[C]//Proc.of IEEE International Conference on Acous- tics,Speech and Signal Processing. Salt Lake City, UT,200h 1345-1348.
  • 8Jung,S. Seok,J. Hong. J. An improved detection technique for spread spectrum audio watermarking with a spectral envelope filter[J]. ETRI Journal, 2003,25 ( 1 ):52-54.
  • 9Yeo,l.K. Kim. H.J. Modofied patch-work algorithm: A novel au- dio watermarking scheme[J]. IEEE Transactions on Speech and Audio Processing,2003,11.
  • 10Cevjic,N. Tujkovic. I. Increasing robustness of patchwork audio watermarking algorithm using attack characterization[C]//Proc of IEEE International Symposium on Consumer Electronics. 2004:3-6.

共引文献22

同被引文献32

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部