期刊文献+

基于MED信道选择和虚拟嵌入块的YASS改进算法

Improved YASS algorithm based on channel selection of minimizing embedding distortion and virtual embedding block
下载PDF
导出
摘要 为抵抗YASS隐写分析算法,本文提出一种新的YASS改进算法。该算法首先利用密钥选择不规则的区域,生成一个虚拟的8×8嵌入块;然后根据图像自身特点,提出一种最小化嵌入失真的计算方法,对嵌入块修改后的量化DCT系数进行失真分析,选择失真影响最小的交流DCT系数进行秘密信息嵌入,取代传统方法直观选择前19交流DCT系数。将文中改进算法与虚拟嵌入块YASS(VH-YASS)算法进行了对比实验,实验结果证明,依据嵌入失真由小到大的顺序选择嵌入信道,在抵抗隐写分析和视觉质量方面都优于VH-YASS隐写方法。 This paper proposed a new YASS algorithm to resist steganalysis. Virtual embedding blocks are generated firstly by using a key to select random region. Then a calculation method for minimizing embedding distortion is put forward and the quantized DCT coefficients for embedding the modified block distortion is analyzed. Secret information is embedded by selecting AC DCT coefficients which have the minimum distortion effects, instead of traditional algorithm which selects the first 19 AC DCT coefficients instinctively. The proposed algorithm is compared with VH-YASS algorithm by experiments.The experimental results show that the embedded channel choice based on embedding distortion ascending order is better than VH-YASS steganography methods in terms of resistance steganalysis and visual quality.
出处 《电子设计工程》 2015年第8期154-157,161,共5页 Electronic Design Engineering
关键词 YASS算法 图像隐写 隐写分析 虚拟嵌入块 信道选择 最小嵌入失真 YASS algorithm image steganography steganalysis virtual host block channel choice MED
  • 相关文献

参考文献8

  • 1Yu L F,Zhao Y,Ni RR,et al. A high-performance ASS- like scheme using randomized big-blocks [C]//IEEE International Conference on Multimedia and Expo (ICME). NewJersey: IEEEComputer Society, 2010:474-479.
  • 2Solanki K,SarkarA,ManjunathB S. YASS: Yet another steganographic scheme that resists blind steganalysis [C]// Proc. of the 9th International Workshop on Information Hiding. Berlin:Springer-Verlag, 2008:16-31.
  • 3Fridrich J. Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Proc. of 6th Information Hiding Workshop.Toronto, Canada, Springer, 2004.
  • 4Li B,Huang J W,Shi YQ. Steganalysisof YASS [J]. IEEE Transactionson Information Forensics and Security,2009,4 (3):369-382.
  • 5忻佳琳,王士林.一种结合整数规划和YASS的图像隐写算法[J].计算机工程,2013,39(10):147-150. 被引量:2
  • 6马丽红,李晓,吕先明.基于虚拟嵌入块和量化器原点抖动的YASS改进算法[J].华南理工大学学报(自然科学版),2013,41(1):38-46. 被引量:2
  • 7Li B, Huang J W,Shi YQ. Steganalysis of YASS [J]. IEEE TransACtionson Information Forensics and Security,2009,4 (3) :369-382.
  • 8Pevn'y T,Fridrich J. Merging Markovand DCT features for multi-class JPEGsteganalysis[C]//Proceedings of the Interna- tional Society for Optical Engineering. Bellingham, Wash- ington: SPIE,2007:I-13.

二级参考文献24

  • 1Phil Sallee. Model-based methods for steganography andsteganalysis [ J]. International Journal of Image and Gra-phics ,Image Data Hiding,2005 ,5(1) : 167-189.
  • 2Niels Provos. OutGuess:steganography detection with steg-detect [EB/OL]. (2004-09-06) [2012-08-30]. http://www. outguess, org.
  • 3Andreas Westfeld. F5 : a steganographic algorithm [C] //Proceedings of the 4th International Workshop on Informa-tion Hiding. Berlin : Springer-Verlag ,2001 *.289-302.
  • 4Jessica Fridrich,Miroslav Goljan,David Soukal. Perturbedquantization steganography with wet paper codes [ C] //Proceedings of ACM Multimedia Security Workshop. Mag-deburg :Association for Computing Machinery ,2004 :4 -15.
  • 5Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Se-curity,2010,5(4) :705-720.
  • 6Solanki K, Sarkar A, Manjunath B S. YASS: yet anothersteganographic scheme that resists blind steganalysis[C] //Proceedings of 9th Information Workshop on Infor-mation Hiding. Berlin : Springer-Verlag,2008 : 16- 31.
  • 7Li B,Huang J W,Shi Y Q. Steganalysis of YASS [J].IEEE Transactions on Information Forensics and Securi-ty,2009 ,4(3) :369-382.
  • 8Sarkar A,Solanki K, Manjunath B S. Further study onYASS : steganography based on randomized embedding toresist blind steganalysis [C] //Proceedings of IEEE In-ternational Conference on Image Processing. Bellingham,Washington : SPIE ,2007 : 16-31.
  • 9Sarkar A,Nataraj L,Manjunath B S, et al. Estimation ofoptimum coding redundancy and frequency domain ana-lysis of attacks for YASS:a randomized block based hidingscheme [ C ] // Proceedings of 15th IEEE InternationalConference on Image Processing. Santa Barbara : Dept ofElectr & Comput Eng, Univ of California at Santa Barba-ra,2008 : 1292-1295.
  • 10Yu L F,Zhao Y, Ni R R,et al. A high-performanceYASS-like scheme using randomized big-blocks [ C ] //IEEE International Conference on Multimedia and Expo(ICME ) ? New Jersey: IEEE Computer Society, 2010 :474-479.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部