期刊文献+

基于Markov链安全性的量化隐写算法 被引量:8

A novel quantization-embedded steganographic algorithm based on Markov chain security
原文传递
导出
摘要 如何在大容量嵌入的同时保证隐秘信息的统计安全性是当前隐写算法设计的难点和热点。本文证明了载体图像Markov链(MC)二阶统计特性的保持等价于其一阶统计特性保持的结论,并据此以MC安全标准为优化目标,提出二阶安全的图像预测误差量化隐写算法。实验表明,在较大容量的数据嵌入过程中,该算法能很好保持二阶统计特性,取得隐写安全性的提高。 It is a difficulty and hotspot in steganographic algorithm designs to ensure the statistical security of secret information while large numbers of data are embedded.It′s proven that the maintenance of the second-order Markov Chain distribution of cover image is equivalent to that of its first-order distribution.Based on the conclusion,a novel second-order secure quantization-embedded steganographic algorithm in prediction-error domain is proposed,which employs Markov Chain security benchmarking as the optimization goal.Experimental results show that the proposed algorithm can maintain the second-order distribution of cover image while larger secret information is embedded,and improve the steganographic security.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2009年第7期944-949,共6页 Journal of Optoelectronics·Laser
基金 江苏省自然科学基金资助项目(BK2008403) 中国博士后基金资助项目(20070421017)
关键词 信息隐藏 隐写 Markov链(MC) 统计二阶保持 information hiding steganography Markov chain(MC) second-order distribution maintain
  • 相关文献

参考文献10

  • 1Liu N,Amin P,Subbalakshimi K.Secure quantization based data em-bedding[].IEEEthWorkshopon Multimedia Signal Processing.2005
  • 2Fridrich J,Soukal D.Matrix embedding for large payloads[].IEEE Transactions onInformation Forensics and Security.2006
  • 3Sarkar A,Solanki K,MadhowU,et al.Securesteganography:statisti-cal restoration of thesecond order dependenciesforimprovedsecuri-ty[].AcousticsSpeech and Signal ProcessingIEEEInterna-tional Conference.2007
  • 4Zhang X P,Wang S Z,Zhang K W.Anovel LSBsteganography schemeagainst statistical analysis[].Journal of Imageand Graphics.2003
  • 5Zhang WM,Wang SZ,Zhang XP.Improving embedding efficiency of covering codesfor applicationsin steganography[].IEEE Communi-cations Letters.2007
  • 6Ambalavanan A,Chandramouli R.A bayesianimage steganalysis ap-proachto estimate the embedded secret message[].Proc ACM multimedia security workshop.2005
  • 7University of Southern California.USC-SIPI Image Database. http://sipi.usc.edu/services/database/index.html . 2006
  • 8Luo X Y,Wang D S,Wang P,et al.Areviewon blind detection for imagesteganography[].Signal Processing.2008
  • 9Christian Cachin.An information-theoretic model for steganography[].Information and Computation.2004
  • 10Cover TM,Thomas JA.Elements of Information Theory. Journal of Women s Health . 1991

共引文献1

同被引文献78

引证文献8

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部