期刊文献+

一种安全的隐秘通信系统方案 被引量:1

Secure Scheme of Steganographic System
下载PDF
导出
摘要 隐秘通信系统的核心是信息隐藏技术 ,它着眼于被隐藏信息本身的不可探测性。近年提出的很多图像空域信息隐藏方法 ,绝大多数都在隐秘对象中遗留了嵌入信息的统计痕迹 ,为隐秘分析提供了便利。该文推导构建安全隐秘通信系统的条件 ,基于图像直方图保持的数据映射方法提出一种安全的隐秘通信系统方案 ,实验结果表明 ,该系统能够有效地阻止目前流行的统计检测分析。 The main technique for steganographic system is information hiding in which the existence of the hidden message should not be detectable. Many methods for information hiding into the spatial field of images are proposed in recent years. However, most of them make the stego-objects contain detectable statistic artifacts due to message embedding that can be used by the steganalyser. In this paper,the condition to construct a secure steganographic system is derived, and a secure scheme of steganographic system is presented based on histogram preserving data mapping. Experimental results show that the system can effectively prevent the current statistic steganalysis.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2004年第2期113-117,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金项目 (6 0 374 0 6 6 ) 教育部博士点基金项目 (2 0 0 2 0 2 880 2 5 ) 江苏省自然科学基金项目 (BK2 0 0 10 5 4)
关键词 信息隐藏 隐秘分析 隐秘通信系统 information hiding steganalysis steganographic system
  • 引文网络
  • 相关文献

参考文献3

  • 1Fridrich J, Du R, Long M. Steganalysis of LSB encoding in color images[A]. ICME2000[C],New York: IEEE, 2000.1 279-1 282.
  • 2Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. Lecture Notes in Computer Science1768[C]. Berlin: Springer-Verlag, 2000. 61-75.
  • 3Eggers J J,Bauml R,Girod B. A Communications approach to image steganography[A]. Proceedings of SPIE 4675[C]. Bellingham: SPIE, 2002.26-37.

同被引文献26

  • 1杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现[J].中山大学学报(自然科学版),2004,43(A02):50-52. 被引量:6
  • 2[1]Simmons G J. The prisoners' problem and the subliminal channel. Advances in Cryptology, Proc.Crypto ' 83, Springer- Verlag, 1984 : 51 ~ 66
  • 3[2]LI Xin, YU H H. Transparent and Robust Audio Data Hiding in Cepstrum Domain [A]. In: 2000 IEEE Inernation Conference on Multimedia and Expo[C]. 2000. 397~400
  • 4[3]Darko Kirovski and Henrique Malvar. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum [J]. IEEE Journal on Select Ares in Communications, 2003,16 (4): 561 ~ 572
  • 5[8]Orr R, Pike C, Bates M, Tzannes M, Sandberg S.Covert Communications Employing Wavelet Technology in Proc[J]. IEEE International Conference on Acustics, Speech and Signal Processing,2002,6:3630~3633
  • 6[10]Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding[J]. IBM Systems Journal,1996,35(3): 313~336
  • 7[11]Boney L,Tewfik A,Hamdy K. Digital watermarks for audio singals[J]. IEEE Int. Conf. on Multimedia Computing and Systems, 1996(1):473~480
  • 8[12]Bassia P, Pitas I. Robust audio watermarking in the time domain. Signal Processing IX, theories and applications: proceedings of eusipo- 98, ninth European signal processing conference,1998. 25~28
  • 9[13]HYEN O O,JONG W S,JIN W H,et al. New echo embedding technique for robust and imperceptible audio watermarking [J]. Acoustics, speech,and Signal Processing,2001(3):1341~1344.
  • 10[14]HYEM O O,HYUN W K,JONG W S. Transparent and robust audio watermarking with a new echo embedding technique [C]. Multimedia and Expo, 2001: 317 ~320

引证文献1

二级引证文献2

;
使用帮助 返回顶部