期刊文献+

一种基于汉明码和湿纸码的隐写算法 被引量:13

A Steganographic Algorithm Based on Hamming Code and Wet Paper Code
下载PDF
导出
摘要 该文通过将载体图像分割成矩阵块,重复利用载体矩阵块像素,结合汉明码和湿纸码构造了一种新的双层结构隐写算法。该算法首先利用汉明码在载体矩阵的行向量中嵌入信息,然后在列向量上根据是否影响前面嵌入结果以及是否需要3个修改引入"dry"和"wet"的概念,并通过构造伪随机二值矩阵,采用湿纸码在列向量上实现二次嵌入,从而获得较好的隐写性能。实验结果表明:该隐写算法在嵌入率为0.1至0.8bpp范围内,性能优于PPC和F5算法。 Dividing the cover image into matrix blocks, using the pixels in the matrix blocks repeatedly, this paper constructs a new double-layered steganographic algorithm based on Hamming code and wet paper code. For each matrix block, the secret message is first embedded by using Hamming code in rows. Then according to whether the previous embedding result is influenced or whether 3 changes are needed when embedding message in columns, the notation of "dry" and "wet" is introduced. Finally wet paper code is used for second embedding. The proposed setganographic algorithm can obtain better performance than PPC and F5 algorithm for 0.1-0.8bpp of embedding rate.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第1期162-165,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803155)资助课题
关键词 隐写术 矩阵编码 汉明码 湿纸码 Steganography Matrix embedding Hamming code Wet paper code
  • 相关文献

参考文献9

  • 1Crandall R. Some notes on steganography, http://os.inf.tu- dresden.de/-westfeld/Crandall, pdf. 2007.12.
  • 2Westfeld A. F5-A steganography algorithm[C]. Proc.4th International Workshop on Information Hiding, Lecture Notes in Computer Science, 2001, Vol.2137: 289-302.
  • 3Tseng Y, Chen Y, and Pan H. A secure data hiding scheme for binary images[J]. IEEE Transactions on Communications, 2002, 50(8): 1227-1231.
  • 4Fridrich J, Goljan M, and Lisonek P, et al.. Writing on wet paper[J]. IEEE Transactions on Signal Processing, Third Supplement on Secure Media, 2005, 53: 3923-3935.
  • 5Rifa-Pous H and Rifa J. Product perfect codes and steganography[J]. Digital Signal Processing, 2009, 19(4): 764-769.
  • 6Munuera C. Steganography and error-correcting codes[J]. Signal Processing, 2007, 87(6): 1528-1533.
  • 7张卫明,李信然,李世取.线性隐写码的性质与构造[J].工程数学学报,2007,24(3):547-550. 被引量:3
  • 8Fridrich J, Goljan M, and Soukal D. Wet paper codes with improved embedding efficiency[J]. IEEE Transactions on Information Security and Forensics, 2006, 1(1): 102-110.
  • 9Moulin P and Wang Y. New results on steganographic capacity[C]. Proceeding of 38th. Annual Conference on Information Sciences and Systems. Princeton, New Jersey, USA, 2004: 813-818.

二级参考文献4

  • 1Crandall R.Some notes on steganography[OL].http://os.inf.tu-dresden.de/~westfleld/crandall.pdf,1998
  • 2Tseng Y C,Pan H K.Data hiding in 2-color images[J].IEEE Transaction on Computers,2002,51(7):873-878
  • 3Westfeld A.High capacity despite better steganalysis(F5-A Steganographic Algorithm)[C]//Information Hiding,4th International Workshop.Berlin:Springer-Verlag,2001:289-302
  • 4MacWilliams F J,Sloane N J A.The Theory of Error-correcting Codes[M].New York:North,Holland Publishing Company,1977

共引文献2

同被引文献121

引证文献13

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部