期刊文献+

批量隐写容量研究 被引量:2

Research of capacity for batch steganography
下载PDF
导出
摘要 通过对批量隐写的定性分析,提出了增大批量隐写容量的方法。对大容量图像的位平面进行等分分块,采用矩阵编码技术,证明了至多修改像素的1 LSB位能够嵌入2 bit隐秘信息的结论,提升了批量隐写容量,并给出了安全性分析。最后结合隐秘信息的嵌入和提取算法,以航拍图为隐写载体进行实验,验证了算法的有效性。 According to the definition of batch steganography and the properties of security,this paper presented a method to increase capacity for batch steganography.By dividing up bit-plane of large images and matrix coding,it proved that,a given image block could embed 2 bit by changing at most 1 bit in pixel,and enlarging embedding capacity.Besides analyed security of algorithm and gave embedding and extracting algorithm.The result of experiments shows that the new method of batch steganography for capacity increasing is reasonable.
出处 《计算机应用研究》 CSCD 北大核心 2011年第9期3492-3494,3498,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60773004) 山西省科技攻关项目(20090322004)
关键词 信息隐藏 批量隐写 隐写容量 安全性 位平面 information hiding batch steganography steganographic capacity security bit-plane
  • 相关文献

参考文献3

二级参考文献23

  • 1张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法[J].中山大学学报(自然科学版),2005,44(3):29-33. 被引量:3
  • 2张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 3刘歆,牛少彰.信息隐藏的检测算法研究综述[J].北京电子科技学院学报,2005,13(4):90-94. 被引量:2
  • 4郭艳卿,何德全,尤新刚,孔祥维,王波.基于整体性的隐密分析特征提取和融合方法研究[J].电子学报,2006,34(B12):2443-2446. 被引量:4
  • 5Simmons G J. The prisoners' problem and the subliminal channel[C]. IEEE Workshop Communications Security CRYPTO, New York, 1983: 51-67.
  • 6Ettinger J M. Steganalysis and game equilibria[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 319-328.
  • 7Mittelholzer T. An information-theoretic approach to steganography and watermarking[C]. Information Hiding, Dresden, Germany, LNCS, 1999, 1768: 1-16.
  • 8Moulin P and O'Sullivan J A. Information-theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3): 563-593.
  • 9Cachin C. An information-theoretic model for steganography[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 306-318.
  • 10Chert B and Wornell G. Quantization index modulation: A class of provably good method watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 48(4): 1423-1443.

共引文献92

同被引文献18

  • 1黄方军,黄继武.基于图像校准的通用型JPEG隐写分析[J].中国科学(F辑:信息科学),2009,39(4):383-390. 被引量:11
  • 2王建军,王颖.一种基于k-Fibonacci矩阵和JPEG的数据隐藏方法[J].系统工程与电子技术,2006,28(8):1252-1257. 被引量:8
  • 3Cox I J, Miller L, Bloon A, et al. Digital watermarking and steganography [M]. 2nd ed. SanMateo, CA: Morgan Kauf- mann, 2008: 1-13.
  • 4Nguyen B, Yoon S, LEE H. Multi bit plane image stegana- graph [G]. LNCS 4283 : Proceeding of International Workshop on Digital Watermarking, 2006: 61-70.
  • 5Sallee P. Moedl-based methods for steganography and steganal ysis [J]. International Journal of Image Graphics, 2005, 5 (1) : 167-190.
  • 6Tseng Y C, CHEN Y Y, Pan H K. A secure data hiding scheme for two-color images [J]. IEEE Transactions on Com- munications, 2002, 50 (8): 1227-1231.
  • 7WU M, LIU 13. Data hiding in binary for authentication and annota- tion [J]. IEEE Transactions on Multimedia, 2004, 6 (4): 528-538.
  • 8Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12 (6): 441-444.
  • 9Westfield A. F5-A steganographic algorithm: High capacity despite better steganalysis [G]. LNCS 2137: Proceeding of 4th international workshop on information hiding. Berlin, Springer, 2001: 289-302.
  • 10Yu Chiang Li, Chia Ming Yeh, Chin Chen Chang. Data hiding based on the similarity between neighboring pixels with reversibility [J]. Digital Signal Processing, 2010, 20 (4) : 1116-1128.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部