期刊文献+

面向社交网络的图片信息隐藏方法与实现 被引量:9

Image Information Hiding Method and Implementation for Social Network
下载PDF
导出
摘要 文章针对隐写图片上传到社交网络前经过变换处理会丢失秘密信息的问题,提出一种在图片信息中安全隐藏秘密信息的方法。该方法首先将JPEG图片进行不完全解码;然后在离散余弦变换和JSteg隐写的基础上改进JSteg算法,将秘密信息嵌入解码信息中;最后经过重新编码生成新的JPEG图片,并将其上传至社交网络。文章基于该方法设计并实现了一种对图片进行信息隐藏的原型系统,经过该系统的处理,上传到社交网络的图片能够被下载,并且可以通过特定的解密方法还原秘密信息,从而达到将秘密信息安全隐藏到图片的目的。 In order to solve the problem that the hidden image through transforai processing wil l lose secret inforaiation before uploaded to social network, this paper proposes a novel scheme that hides secret information securely into images. In the scheme, firstly, JPEG images are decoded incompletely. Then, JSteg algorithm is improved based on discrete cosine transforai and JSteg steganography techniqu^which secret inforaiation is embedded into decoding inforaiation. Finalty, the recoded JPEG images are uploaded to social network. This paper designs and implements a protot}^pe s}^stem that hides information into images b}^ using the scheme. After the processing of the system, the image uploaded to social network can be downloaded, and the encoded secret information can be decoded through a specified deception technique, so as to achieve the purpose of hiding secret information to the image.
出处 《信息网络安全》 CSCD 2017年第3期6-13,共8页 Netinfo Security
基金 国家自然科学基金[61402109 61370078] 福建省自然科学基金[2015J05120] 福建省高校杰出青年科研人才培育计划(2015)
关键词 社交网络 离散余弦变换 图片编码 信息隐藏 social network discrete cosine transform image coding information hiding
  • 相关文献

参考文献13

二级参考文献135

  • 1陈涛,杨峰,陈佳.数字水印研究综述[J].软件导刊,2010,9(1):150-152. 被引量:4
  • 2徐杰民,肖云.二维条码技术现状及发展前景[J].计算机与现代化,2004(12):141-142. 被引量:62
  • 3冉文波,梁华庆.二值图像数字水印技术的研究进展[J].计算机工程与应用,2005,41(36):48-51. 被引量:7
  • 4刘光杰,戴跃伟,孙金生,王执铨.用于JPEG图像的高容量信息隐藏算法[J].信息与控制,2007,36(1):102-107. 被引量:14
  • 5刘洁.数字水印和二维条码相结合的证件防伪技术.Computer Knowledge and Technology,2009,5(18):5003-5004.
  • 6JPEG-Jsteg-V4 [ CP/OL ]. http ://www. funet. fi/pub/crypt/steganography/jp- eg-jsteg-vd. diff. gz.
  • 7Provos N. Outguess-universal steganography [ EB/OL ]. http : // www. outguess. org/.
  • 8Fridrich M. Goolian D. Hogea. Steganalysis of JPEG Images : Breaking the F5 Algorithm [ C ]//Sth Information Hiding Workshop, Nomdwijkerhout, The Netherlands,2002 : 310 - 323.
  • 9Sallee P. Model-Based Steganography [ C ]//In Proceedings of International Workshop on Digital Watermarking. Berlin: Springer-Verlag, 2004:154 - 167.
  • 10Fridrich, Miroslav Goljan, Rui Du. Steganalysis based on JPEG compatibility[ C]//Proceedings of SPIE-The International Society for Optical Engineering,2001,4518:275 - 280.

共引文献92

同被引文献29

引证文献9

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部