期刊文献+

复数基下的数字媒体表达及信息隐藏 被引量:1

Digital media representation under complex number base and its application on information hiding
下载PDF
导出
摘要 随着数字媒体技术的飞速发展及广泛应用,数字媒体信息安全问题日益引起高度关注。由于数字媒体形式多样,以往的相关研究工作集中于某一具体媒体形式的安全保护,如文字、图像、声音、视频。在计算机及网络环境下,一切对象以数字化的形式出现。将所有数字媒体信息在复数基的形式下进行统一表达,给出数字媒体与复数之间的相互转换算法,从而将数字媒体之间的关系变换为复平面上点的几何关系,并实现了数字媒体的信息隐藏。 With the rapid development and wide application of the digital media technology, the information security problem is becoming more and more highly attention. Because of the various kinds of medias, previous research works have focused on a specific digital media from, such as text, image, audio and video. As a fact that all the objects were expressed in digital forms under the environment of computer and network, a unified form for all kinds of digital media under the complex number base system was proposed. The algorithm of the digital media signal and the complex number intercom version were given, so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane. In the experiments, the proposed method was applied to the application of the digital media information hiding.
作者 陈伟 陈亚楠 刘渊 CHEN Wei CHEN Ya-nan LIU Yuan(School of Digital Media, Jiangnan University, Wuxi 214122, China)
出处 《网络与信息安全学报》 2016年第12期20-26,共7页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61602213) 浙江大学CAD&CG国家重点实验室开放课题基金资助项(No.A1609) 国家科技支撑计划基金资助项目(No.2015BAH54F00)~~
关键词 复数基 高斯整数 数字媒体 信息隐藏 complex base, gauss integer, digital media, information hiding
  • 相关文献

参考文献6

二级参考文献48

  • 1孙伟,杨志华,齐东旭.图像的复数表示及其在图像秘密分存中的应用[J].中国图象图形学报(A辑),2004,9(11):1331-1335. 被引量:2
  • 2李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40
  • 3YU Miao HE HongJie ZHANG JiaShu.A digital authentication watermarking scheme for JPEG images with superior localization and security[J].Science in China(Series F),2007,50(3):491-509. 被引量:2
  • 4Sun Wei, Yang zhihua, Qi Dongxu. Number system based scheme for multimedia steganography[A]. In: Proceedings of 8th International conferences on CAD/Graphics [C], Macao,China, 2003:93-98.
  • 5Shamir A. How to share a secret[J]. Communications of the ACM, 1979,24(11) :612-613.
  • 6Blakeley G R. Safeguarding cryptographic keys [A]. In:Proceedings of AFIPS National Computer Conference [C],Boston, New Jersey, USA, 1979,45:313-317.
  • 7Simmons G J. An introduction to shared secret and/or shared control scheme and their application[A]. In: Simmons G J edi.Contemporary Cryptology, The Science of Information Integrity[C], IEEE Press, 1992:441~497.
  • 8Naor M, Shamir A. Visual cryptography[A]. In; Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science [C], Perugia, Italy, 1994,950 ; 1 -12.
  • 9Yue Tai-wen, Chiang Suchen. A neural network approach for visual cryptograpgy[A]. In: Proceedings of IEEE-INNSENNSInternational Joint Conference on Neural Networks[C], Como,Italy, 2000,5: 5494.
  • 10Chang Chin-chen, Tsai Chwei-shyong, Chen Tung-shou. A new scheme for sharing secret color images in computer network[A].In: Proceedings of Seventh International Conference on Parallel and Distributed SystemsI-C], Iwate, Japan, 2000 : 21- 27.

共引文献33

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部