期刊文献+

一种安全的无载体纹理合成信息隐藏方案 被引量:3

A SECURE COVERLESS TEXTURE SYNTHESIS INFORMATION HIDING SCHEME
下载PDF
导出
摘要 为了有效抵御Zhou等[8]针对Wu等[7]提出的无载体纹理合成信息隐藏方案的攻击,设计出一种基于有限整数网格上拟仿射变换(QATLIG)的纹理合成无载体信息隐藏方案。该方案通过在纹理合成过程中嵌入干扰纹理块,来抵御文献[8]提出的攻击。其中,干扰纹理块的具体位置,由样本纹理源补丁块的坐标通过QATLIG变换而得。同时该方案将QATLIG变换系数纳入密钥中。分析及实验表明,该方案保持了文献[7]方案的生成纹理图像质量,信息隐藏容量损失极小(约1.46%~7.11%),隐藏的信息被暴力破解的概率极低(远小于10-5),可有效抵御文献[8]的攻击方案。 In order to effectively resist Zhou H et al.s attack on the coverless texture synthesis information hiding scheme proposed by Wu et al.,we designed a coverless texture synthesis information hiding scheme based on quasi-affine transformation on limited integer grids(QATLIG).This scheme defended against attacks by Zhou H et al.by embedding interference texture blocks in the texture synthesis process.The specific location of the interference texture block was obtained by transforming the coordinates of the sample texture source patch block by QATLIG,and the scheme incorporated the QATLIG transform coefficient into the secret key.Analysis and experiments show that the scheme maintains the texture image quality generated by Wu et al.,and the information hiding capacity loss is extremely small(about 1.46%~7.11%).The probability of hidden information being violently cracked is extremely low(far less than 10-5),and it can effectively resist the attack scheme of Zhou H et al.
作者 杜耀刚 王泽豪 赵耿 张艳硕 Du Yaogang;Wang Zehao;Zhao Geng;Zhang Yanshuo(School of Communication Engineering, Xidian University, Xi'an 710071, Shaanxi, China;Beijing Electronic Science and Technology Institute, Beijing 100070, China)
出处 《计算机应用与软件》 北大核心 2019年第6期287-291,321,共6页 Computer Applications and Software
基金 国家自然科学基金面上项目(61772047) 国家重点研发计划基金项目(2017YFB0801803)
关键词 信息隐藏 纹理合成 无载体 有限整数网格拟仿射变换 Information hiding Texture synthesis Coverless Quasi-affine transformation on limited integer grids
  • 相关文献

参考文献4

二级参考文献22

  • 1Bender W, Gruhl D, Morimto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35(3/4): 313~335
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey[J]. Proceedings of the IEEE, 1999, 87(7): 1062~1078
  • 3Voyatzis G, Pitas I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of the IEEE, 1999,87(7): 1197~1207
  • 4Qi Dongxu, Zou Jiancheng, Han Xiaoyou. A new class of scrambling transformation and its application in the image information covering[J]. Science in China(Series E), 2000, 43(3): 304~312
  • 5Cox I, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673~1687
  • 6Barni M, Bartolinit F, Rosa A D, et al. Capacity of full frame DCT image watermarks[J]. IEEE Transactions on Images Processing, 2000, 9(8): 1450~1455
  • 7吴旻升,王介生,刘慎权.图像的排列变换[J].计算机学报,1998,21(6):514-519. 被引量:64
  • 8丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843. 被引量:327
  • 9郭建胜,张锋.一种图像加密算法的等效密钥攻击方案[J].电子学报,2010,38(4):781-785. 被引量:7
  • 10王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,60(6):83-93. 被引量:90

共引文献113

同被引文献16

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部