期刊文献+

基于模运算的并行隐写算法 被引量:1

Parallel steganography algorithm based on modular operation
下载PDF
导出
摘要 针对隐写算法的不可检测性、安全性以及运行效率等性能的提高及优化,提出一个基于模运算的并行隐写算法。利用模数运算的余数循环周期性特点,采用参数化设计思想建立可变系数的最优参数表,选择最优参数确定嵌入像素值改变量最小的隐写算法方案,实现一位an进制信息隐藏到n个像素中。利用多核多线程并行计算,载体图像分块后对信息进行并行嵌入处理。实验结果表明,与同类算法相比,该方法具有更好的载密图像视觉质量和安全性,运行效率更高。 To optimize and improve the undetection,security and efficiency of the steganography algorithm,a parallel steganography algorithm based on modular operation was proposed.The remainder of the modulus operation and the parameterized design idea were used to establish the optimal parameter table of variable coefficients,the steganography algorithm which minimized the change of embedded pixel value,achieving a secret information in a n-ary notational system hiding in n pixels.Multi-core multi-threaded parallel computing was used to embed the carrier image,which was divided into blocks before embedding.Experimental results show that the proposed algorithm has better visual quality and security of encrypted image,and better performance.
作者 柯琦 李霞 廖琪男 朱丽娜 KE Qi;LI Xia;LIAO Qi-nan;ZHU Li-na(Department of Computer Science,Guangxi University of Finance and Economics,Nanning 530003,China)
出处 《计算机工程与设计》 北大核心 2018年第11期3444-3450,共7页 Computer Engineering and Design
基金 国家自然科学基金项目(61562004) 广西财经学院青年教师科研发展基金项目(2017QNB17)
关键词 信息隐藏 模函数 数字图像 并行计算 多核计算机 steganography modulus function digital image parallel computing multi-core computer
  • 相关文献

参考文献2

二级参考文献30

  • 1罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(3):463-473. 被引量:22
  • 2刘劲,康志伟,何怡刚.一种基于小波对比度和LSB的密写[J].电子学报,2007,35(7):1391-1393. 被引量:19
  • 3Chan C K, Cheng L. Hiding data in images by simple KSB substi- tution[ J]. Pattern Recognition ,2004,37 ( 3 ) :469-474.
  • 4Wu H C,Wu N I, Tsai C S, et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods [ J]. IEEE Proceedings Vision,Image & Signal Processing,2005, 152(5) :611-615.
  • 5Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction [ J ]. IEEE Communications Letters ,2006,10 ( 11 ) :781-783.
  • 6Lee C F,Wang Y R, Chang C C. A steganographic method with high embedding capacity by improving exploiting modification di- rection [ C ]//Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Pro- cessing. Washington, USA : IEEE Computer Society ,2007,1:497- 500.
  • 7Wang Z H, Kieu T D, Chang C C, et al. A novel information con- cealing method based on exploiting modification direction [ J ]. Journal of Information Hiding and Multimedia Signal Processing, 2010,1(1) :1-9.
  • 8Jung K H, Yoo K Y. Improved exploiting modification direction method by modulus operation[ J]. International Journal of Signal Processing, Image Processing and Pattern ,2009,2 ( 1 ) :79-88.
  • 9Chao R M, Wu H C, Lee C C, et al. A novel image data hiding scheme with diamond encoding[J]. EURASIP Journal on Informa- tion Security 2009 (2009) :658047 (1-9).
  • 10Bender W, Gruhl D, Morimoto N, et al. Techniques for datahiding[J]. IBM System Journal, 1996,35 ( 3 - 4 ) : 313 - 336.

共引文献6

同被引文献10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部