期刊文献+

一种基于像素块的纹理优先自适应隐写算法 被引量:5

A Pixel Block-Based Adaptive Steganographic Algorithm with Embedding Priority Given to Image Textures
下载PDF
导出
摘要 与平坦区域相比,图像纹理区域在结构上表现出更多的随机性,因此将密信嵌入到纹理丰富的区域可获得更好的安全性.本文利用相邻像素的LSB与次低LSB位之间的关系,提出一种基于像素块的纹理优先自适应隐写算法,将密信优先嵌入到复杂纹理区域.所设计的纹理判别准则能结合待嵌入密信长度,自适应选择嵌入区域.针对在嵌密过程中嵌密块可能出现的异常情况,提出一种像素值调整方案,并从理论上证明了其可行性.实验结果表明本文算法比两种经典的LSB算法和一种现有的基于边缘优先的自适应算法具有更高的嵌入效率,且对四种有代表性的隐写分析算法通常具有更强的抵御能力. Compared with flat regions,image textures have more randomness in structure. As a result,the embedding of secret message in rich textures can obtain better security. Based on the relationship between the least two significant bits of neighboring pixels,we propose a pixel block-based adaptive steganographic algorithm with embedding priority given to image texture regions. In other words,the embedding order is from rich textures to flat regions. Our criterion for texture assessment can adaptively allocate image regions for embedding according to the length of the secret message. To deal with possible irregular embedding blocks,we propose a pixel value modification solution. We have justified this solution mathematically. Experimental results have demonstrated that our algorithm outperforms two established LSB( least significant bit) embedding algorithms and one current edge adaptive steganographic algorithm in terms of embedding efficiency; meanwhile,our algorithm often has stronger resistance to the four representative steganalytic algorithms.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第6期1094-1100,共7页 Acta Electronica Sinica
基金 国家973重点基础研究发展计划(No.2011CB707003) 广东省自然科学基金团队项目(No.9351064101000003) 华南理工大学中央高校基本科研业务费专项资金(No.2014ZZ0036)
关键词 LSB隐写 图像纹理 自适应嵌入 安全性 隐写分析 LSB embedding image texture adaptive embedding security steganalysis
  • 相关文献

参考文献14

  • 1王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. 被引量:75
  • 2Westfeld A, Pfitzmann A. Attacks on steganographic systems [ A]. Proceedings of Third lmemational Workshop, Information Hiding[ C]. Berlin: Springer-Verlag, 2000.61 - 76.
  • 3Filler T, Fridrich J. Fisher information determines capacity of e- secure steganography [ A ]. Proceedings of l lth International Workshop, Information Hiding[ C]. Germany: Darmstadt, 2009. 31 - 47.
  • 4Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [ A ]. Proceedings of SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents Ⅷ [C] .San Jose,CA: SPIE,2006.1 - 13.
  • 5Harmsen J J, Pearlnlan W A. Steganalysis of additive-noise modelable information hiding[ A]. Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V [ C ]. Santa Clara,CA: SPIE,2003. 131 - 142.
  • 6Cancelli G, Doerr G, Cox I J, et al. Dection of ± 1 LSB steganography based on the amplitude of histogram local extrema [ A ]. Proceedings of 15th IEEF, International Conference. Image Processing[C] .San Diego,CA: IEEE,2008.1288 - 1291.
  • 7Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel ad- jacency matrix[ J]. IEEE Transactions on Information Forensics and Security,2010,5(2) :215 - 224.
  • 8Mielikainen J. LSB matching revisited [ J]. IEEE Signal Pro- cessing Letters,2006, 13(5) :285 - 287.
  • 9Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[ J]. IEEE Transactions on In- formation Forensics and Security,2010,5(2):201 -214.
  • 10Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B- Spline titling[ J]. IEEE Signal Processing Letters, 2012, 19 (6) :336 - 339.

二级参考文献7

共引文献74

同被引文献32

  • 1Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287.
  • 2Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218.
  • 3Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783.
  • 4Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9.
  • 5Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184.
  • 6Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
  • 7Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56.
  • 8Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318.
  • 9Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
  • 10Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部