期刊文献+

基于线性码的隐写编码研究进展

Recent advances in steganographic coding research based on linear codes
下载PDF
导出
摘要 隐写编码技术是当前数字媒体隐写领域的研究热点,其能够有效提高隐写的安全性和鲁棒性.文中回顾了基于线性码的隐写编码技术的最新进展,根据隐写分析技术的快速发展对高安全性隐写术提出的挑战,将矩阵嵌入这一关键隐写编码方法的发展归纳为3个阶段:面向修改量降低、面向修改区域可选以及面向最小化隐写失真.同时,针对当前隐写术应用场景的不断拓展,指出了多播通信下的矩阵嵌入以及结合线性编码技术衍生的具备一定鲁棒性的矩阵嵌入是当前隐写编码技术的发展趋势. Steganographic coding technique is an advanced research hotspot in the field of multimeida steganog-raphy which can effectively improve the security and robustness of steganography. Recent advances in stegano-graphic coding based on linear codes are reviewed in this paper. Regarding the challenges posed by the rapid de-velopment of steganalysis ,the key steganographic coding methodology--- matrix embedding is concluded as three developmental stages:aiming at reducing the modification,aiming at selecting the modification area,and aiming at minimizing the distortion. Then,with the unceasing expansion of application environment for steganog-raphy,it is indicated that matrix embedding in multicast communications and that in conjunction with linear cod-ing for enhancing the robustness are the new trends of steganographic coding technique.
出处 《江苏科技大学学报(自然科学版)》 CAS 北大核心 2015年第4期362-372,共11页 Journal of Jiangsu University of Science and Technology:Natural Science Edition
基金 国家自然科学基金资助项目(61170250 61472188)
关键词 隐写 隐写编码 线性码 矩阵嵌入 安全性 鲁棒性 steganography steganographic coding linear codes matrix embedding security robustness
  • 相关文献

参考文献59

  • 1Zielinska E, Mazurczyk W, Szczypiorski K. Trends in steganography [ J ]. Communications of the ACM, 2014, 57(3) : 86 -95.
  • 2Pevny T, Bas P, Fridrich J. Steganalysis by subtrac- tive pixel adjacency matrix [ J ]. IEEE Transactions on Information Forensics and Security, 2010, 5 ( 2 ) : 215 - 224.
  • 3Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [ J ]. IEEE Transactions on Information Forensics and Security,2012, 7 ( 3 ) : 868 - 882.
  • 4Luo W, Huang F, Huang J. Edge adaptive image steg- anography based on LSB matching revisited[ J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201 -214.
  • 5Pevn T, Filler T, Bas P. Using high-dimensional im- age models to perform highly undetectable steganogra- phy [ J ]. Information Hiding,2010,6387 : 161 - 177.
  • 6Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images [ C ]//Media Watermarking, Security, and Forensics IlL San Francisco, California, USA: Is. n. ] , 2011.
  • 7Barron R J, Chen B, Wornell G W. The duality be- tween information embedding and source coding with side information and some applications [ J ]. IEEE.Transactions on Information Theory, 2003, 49 (5): 1159 - 1180.
  • 8Crandall R. Some notes on steganography[ OL]. Avail- able :http: ffos. inf. tu -dresden. de/esetfeld/crandall. pdf, 1998.
  • 9Westfeld A, Pfitzmann A. High capacity despite better steganalysis ( F5 : a steganographic algorithm ) [ C ] ff Information Hiding. Germany: Springer, 2001 : 289 - 302.
  • 10Mielikainen J. LSB matching revisited [ J ]. IEEE Sig- nal Processing Letters, 2006, 13 ( 5 ) : 285 - 287.

二级参考文献74

  • 1马建峰,王育民.Golay码的快速译码[J].通信学报,1996,17(4):130-135. 被引量:2
  • 2张卫明,李信然,李世取.线性隐写码的性质与构造[J].工程数学学报,2007,24(3):547-550. 被引量:3
  • 3Crandall R. Some Notes on Steganography[Z]. (1998-09-07). http://os.inf.tu-dresden.de/-westfeld/Crandall.pdf.
  • 4Westfeld A. High Capacity Despite Better Steganalysis(F5-A Steganographic Algorithm)[C]//Proc. of the 4th International Workshop on Information Hiding. Pittsburgh, PA, USA: Springer-Verlag, 2001: 289-302.
  • 5Tseng Y C, Chen Y Y, Pan H K, et al. A Secure Data Hiding Scheme for Two Color Images[J]. IEEE Transactions on Communications, 2000, 50(8): 1227-1231.
  • 6Tseng Y C, Pan H K. Data Hiding in 2-Color Images[J]. IEEE Transactions on Computers, 2002, 51 (7): 873-890.
  • 7Steganos Security Suite 5 Help Document[Z]. (2004-04-08). http://www.steganos.com/.
  • 8Fridrich J, Soukal D. Matrix Embedding for Large Payloads[J]. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390-394.
  • 9Fridrich J, Goljan M, Soukal D. Wet Paper Codes with Improved Embedding Efficiency[J]. IEEE Transactions on Information Security and Forensics, 2006, 1(1): 102-110.
  • 10Schonfeld D, Winkler A. Embedding with Syndrome Coding Based on BCH Codes[C]//Proceedings of ACM Multimedia and Security Workshop. Geneva, Switzerland: ACM Press, 2006: 214-223.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部