期刊文献+

基于随机线性码的快速矩阵嵌入方法 被引量:4

Fast Matrix Embedding Based on Random Linear Code
下载PDF
导出
摘要 矩阵嵌入将编码思想引入隐写过程,用病灶携带秘密信息,通过寻找校验矩阵的陪集首确定最小修改向量,提高隐写安全性.如何以较低的计算复杂度找到陪集首是矩阵嵌入设计的核心.针对小嵌入率下的隐写,该文讨论了将汉明码矩阵引入到随机线性码矩阵的可行性,进而提出了一种新的校验矩阵结构.在此基础上,以一定的计算复杂度限制为前提,以最大化嵌入效率为目标,给出了矩阵的最优化构造方法.实验结果表明,新方法相比已有矩阵嵌入方法在嵌入效率和嵌入速度上都有所提高,适合实时性要求高的隐写应用. Matrix embedding (ME) encodes cover objects and secret messages with an error correction code and modifies the cover data according to the coding result. The modification vector is the coset leader of error correction codes and the messages are conveyed by the syndrome. How to find the coset leader with lower computational complexity is the core of ME design. To improve the embedding efficiency and embedding speed of small payloads ME, this paper discusses the feasibility of introducing Hamming codes into the parity check matrix (PCM) of random linear codes, and proposes a new PCM structure. On this basis, an optimization scheme is proposed which can adaptively generate a PCM to accommodate to the given cover length and provide the best performance while guaranteeing the desired computational complexity. Experimental results show that this new method achieves higher embedding efficiency and faster embedding speed than previous fast ME methods, and is more suitable for real-time steganogaphic systems.
作者 高瞻瞻 韦大伟 汤光明 李晓利 GAO Zhan-zhan WEI Da-wei TANG Guang-ming LI Xiao-li(PLA Information and Technology University, Zhengzhou, Henan 450001, China Luoyang Electronic Equipment Test Center of China,Luoyang, Henan 471000, China)
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第5期1139-1149,共11页 Acta Electronica Sinica
基金 国家自然科学基金(No.61272488) 河南省科技攻关项目(No.122102210047) 全军军事类研究生资助课题(No.2015JY125)
关键词 隐写术 矩阵嵌入 嵌入效率 嵌入速度 steganography matrix embedding embedding efficiency embedding speed
  • 相关文献

参考文献3

二级参考文献21

  • 1[1]H. Heffes, D. A. Lucanoni, Markov modulation characterization of packetized voice and data traffic and related statistical multiplexer analysis[J], IEEE J. on SAC, 1986, 4(6), 856-868.
  • 2[2]H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RTP-A transport protocol for real-time applications, Internet Draft, draft-ietf-avt-rtp-new-ps, Internet Engineering Task Force, Dec., 1997.
  • 3[3]H. Schulzrinne, RTP profile for audio and video conferences with minimal control, internet draft, draft-ietf-avt-profile-new-01. ps, Internet Engineering Task Force, Jan., 1998.
  • 4[4]A. Campbell, G. Coulson, D. huchison, Transporting QoS Adaptive Flows, Multimedia Systems,London, Springer-Verlag, 1998, 167-178.
  • 5Westfeld A, Pfitzmann A. Attacks on steganographic systems [ A]. Proceedings of Third lmemational Workshop, Information Hiding[ C]. Berlin: Springer-Verlag, 2000.61 - 76.
  • 6Filler T, Fridrich J. Fisher information determines capacity of e- secure steganography [ A ]. Proceedings of l lth International Workshop, Information Hiding[ C]. Germany: Darmstadt, 2009. 31 - 47.
  • 7Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [ A ]. Proceedings of SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents Ⅷ [C] .San Jose,CA: SPIE,2006.1 - 13.
  • 8Harmsen J J, Pearlnlan W A. Steganalysis of additive-noise modelable information hiding[ A]. Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V [ C ]. Santa Clara,CA: SPIE,2003. 131 - 142.
  • 9Cancelli G, Doerr G, Cox I J, et al. Dection of ± 1 LSB steganography based on the amplitude of histogram local extrema [ A ]. Proceedings of 15th IEEF, International Conference. Image Processing[C] .San Diego,CA: IEEE,2008.1288 - 1291.
  • 10Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel ad- jacency matrix[ J]. IEEE Transactions on Information Forensics and Security,2010,5(2) :215 - 224.

共引文献10

同被引文献26

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部