期刊文献+

基于混沌置换的图像隐藏算法 被引量:3

An Image Information Hiding Algorithm Based On Chaotic Permutation
原文传递
导出
摘要 为了有效提高图像隐藏的鲁棒性和安全性,文章提出一种基于混沌置换的图像隐藏算法。该方法采用混沌置换算法,能以概率1产生所有置换,优于传统置乱算法。该方法重复隐藏了冗余信息,能较好地抗击噪声干扰和剪切攻击,具备线性时间复杂度。实验结果表明,该方法隐藏效果良好,恢复图像保真度高,具备较好的鲁棒性和安全性。 By blending pixels into different places, an image information hiding algorithm with linear time complexity is proposed. Based on the chaotic permutation, the method is proved that it can extend all over the permutations with probability 1, and the traditional permutation turns out a special case of chaotic permutation. Examples show that the algorithm is efficient and robust against noise corruption and shear attack .
出处 《信息安全与通信保密》 2007年第6期187-188,191,共3页 Information Security and Communications Privacy
基金 陕西省教育厅专项科研计划项目(04JK253)
关键词 图像隐藏 混沌置换 冗余信息 噪声干扰 剪切攻击 Image hiding Chaotic permutation Redundant information Noise corruption Shear attack
  • 相关文献

参考文献9

  • 1[1]Hen I,Neri M.On the Threshold Effect in the Estimation of Chaotic Sequences[J].IEEE Trans on Inforination Theory,2004,50(11):2894-2904.
  • 2[2]Wang L,Smith K.On chaotic shnulated annealing[J].IEEE Trans on Neural Networks,1998,9(4):716-718.
  • 3[3]Mirasso C R,Mulet J,Masoller C.Chaos Shift-Keying Encryption in Chaotic External-Cavity Semicon-ductor Lasers Using a Single-Receiver Scheme[J].IEEE Photonics Technology Letters,2002,14(4):456-458.
  • 4[4]Zhao L,Rogerio A F,Andr é C P L F de.A Network of Globally Coupled Chaotic Maps for Adaptive Multi-Resolution Image Segmentation[C].Proceedings of the Ⅶ Brazilian Symposium on Neural Networks(SBRN'02).Recife,Brazil:IEEE Computer Society Press,2002:92-97.
  • 5[5]Ellis Horowitz,Sartaj Sahni,Dinesh Mehta.Fundamentals of Data Structures in C++[M].1st Edition,NewYork:W.H.Freeman,1995:439-443.
  • 6张贵仓,王让定,章毓晋.基于迭代混合的数字图像隐藏技术[J].计算机学报,2003,26(5):569-574. 被引量:85
  • 7刘建东.基于超混沌序列的自适应数字图像隐藏算法[J].微电子学与计算机,2005,22(3):1-4. 被引量:10
  • 8夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:20
  • 9李昌刚,韩正之.图像加密技术新进展[J].信息与控制,2003,32(4):339-343. 被引量:52

二级参考文献64

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2SchneierB 吴世忠译.应用密码学——协议、算法与C源程序(第二版)[M].北京:机械工业出版社,2000..
  • 3一松信[日].数据保护和加密研究——计算机网络的安全性[M].北京:科学出版社,1991..
  • 4[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 5[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 6[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23
  • 7[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230
  • 8[5]Avcbas, B Sankur. Statistical analysis of image quality measures. The 10th European Signal Processing Conf(EUSIPCO'2000), Tampere, Finland, 2000
  • 9[6]A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proc of Information Hiding, Third Int'l Workshop, LNCS 1768. Berlin Heidelberg: Springer-Verlag, 2000. 61~76
  • 10[7]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia(Special Issue on Security), 2001, 8(4): 22~28

共引文献157

同被引文献17

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部