期刊文献+

基于灰狼优化边缘检测和XOR编码的图像自适应隐写算法 被引量:1

Adaptive image steganography algorithm based on grey wolf optimized edge detection and XOR coding
下载PDF
导出
摘要 基于人眼视觉感知特性,提出了一种新型的边缘检测和XOR编码相结合的图像自适应隐写算法。通过设计基于灰狼优化(grey wolf optimization,GWO)算法的边缘检测,根据秘密信息的大小自适应地调整边缘检测阈值,利用粒子群优化(particle swarm optimization,PSO)算法优化边缘和非边缘像素的嵌入位数,结合XOR编码实现对混沌加密后的秘密信息的嵌入。实验结果表明,该隐写算法比现有文献算法具有更大的隐写容量,能较好地保持载密图像的不可感知性,并已通过像素差值直方图(pixel difference histogram,PDH)安全性分析。 An image adaptive steganography was proposed using combination between grey wolf optimizer-based edge detection and XOR coding.The algorithm firstly adjusted the threshold of edge detection by the design of GWO-based edge detection and the capacity of messages.Next,it optimized the number of bits in edge points and non-edge points with particle swarm optimization(PSO).Finally,confidential information after chaos encryption was embedded according to the optimal results in the above with XOR coding.The experiment shows that the proposed algorithm has greater capacity of messages for embedding than existing algorithms while maintaining a relatively good imperceptibility with the ability to pass pixel difference histogram(PHD)security analysis.
作者 汤莉莉 王鸿辉 谢加良 陈明志 TANG Lili;WANG Honghui;XIE Jialiang;CHEN Mingzhi(School of Science, Jimei University, Xiamen, Fujian 361021, China;Digital Fujian Big Data Modeling and Intelligent Computing Institute, Jimei University, Xiamen, Fujian 361021, China;Key Laboratory of Applied Mathematics of Fujian Province University, Putian, Fujian 351100, China;Beika Technology Limited Company, Fuzhou 350000, China)
出处 《中国科技论文》 CAS 北大核心 2021年第7期783-789,共7页 China Sciencepaper
基金 国家自然科学基金资助项目(11371130) 福建省软科学基金资助项目(B19085) 福建省教育厅项目(JT180263) 福建省高校应用数学重点实验室开放基金资助项目(SX201906) 集美大学数字福建大数据建模与智能计算研究所开放基金资助项目(JD201901) 集美大学科研启动金资助项目(JD202006)。
关键词 边缘检测 灰狼优化算法 粒子群优化算法 混沌加密 XOR编码 edge detection grey wolf optimization(GWO)algorithm particle swarm optimization(PSO)algorithm chaos encryption XOR encoding
  • 相关文献

参考文献4

二级参考文献49

  • 1Ditto,WL,王世德.驾驭混沌[J].科学(中文版),1993(12):40-46. 被引量:2
  • 2周红,凌燮亭.混沌保密通信原理及其保密性分析[J].电路与系统学报,1996,1(3):57-62. 被引量:10
  • 3李文化,王智顺,何振亚.用于跳频多址通信的混沌跳频码[J].通信学报,1996,17(6):17-21. 被引量:45
  • 4ERDMANN D, MURPHY S. Henon stream cipher[J]. Electronics Letters , 1992,28(9): 893-895.
  • 5JAKIMOSKI G, KOCAREV L. Chaos and cryptography: Block Encryption Ciphers Based on Chaotic Maps, Circuits and Systems I:Fundamental Theory and Applications[J]. IEEE Transactions on, 2001, 48(2) : 163-169.
  • 6KOHD A T. Information Sources Using Chaotic Dynamics[J]. Proceedings of the IEEE , 2002, 90(5): 641-661.
  • 7ZHOU HONG, LING XIE-TING. Problems With the Chaotic Inverse System Encryption Approach, Circuits and Systems I: Fundamental Theory and Applications[J]. IEEE Transactions on, 1997, 44(3): 268-271.
  • 8XUN YI, CHIK HOW TAN, CHEE KHEONG SIEW. A New Block Cipher Based on Chaotic Tent Maps, Circuits and Systems I: Fundamental Theory and Applications[J]. IEEE Transactions on , 2002, 49(12): 1 826-1 829.
  • 9KWOK-WO WONG, SUN-WAH HO, CHING-KI YUNG. A Chaotic Cryptography Scheme for Generating Short Ciphertext[J]. Physics Letters A ,2003,310: 67-73.
  • 10WAI-kIT WONG, LAP-PIU LEE, KWOK-WO WONG. A Modified Chaotic Cryptographic Method[J].Computer Physics Communications 2001,138:234-236.

共引文献30

同被引文献16

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部