期刊文献+

基于Karhunen-Loeve变换和最低位替代的图像隐写术

Image Steganography Based on Karhunen-Loeve Transform and Least Bit Substitution
下载PDF
导出
摘要 为了提高信息通信安全性能,防止信息被窃取,提出了一种新颖的图像隐写术。采用Karhunen-Loeve变换压缩数据,构造其最低位替代加密数据,并在载体图像内对信息进行编码,其压缩过程用于去除冗余性,同时还设计了编码到一个级别的像素矩阵,由最低位替换的方式进一步实施。实验结果表明,该算法效率高,并能对原始数据进行有效的解密;且与其他机制相比,所提出的技术具有更高的容量和平均信噪比。 In order to improve the safety performance of infi^rmation communication for preventing information being stolen, a novel image steganography is proposed in this paper, the minimum bit substitution is eonstructed by using Karhunen-Loeve transform compression data to encrypt data in the carrier and encode the image information for removing redundancy during the compression process; and a matrix of pixel levels is designed from the lowest replace bit further implementation approach. Experimental results show that this algorithm can effectively deerypt the original data. Comparing with other mechanism, this technology has a higher capacity and average SNR.
出处 《电视技术》 北大核心 2015年第2期80-84,共5页 Video Engineering
基金 湖南省自然科学基金项目(12JJ4051)
关键词 Karhunen—Loeve变换 图像隐写术 最低位替代 压缩数据 像素矩阵 Karhunen-Loeve transform image steganography least bit substitution compressed data pixel matrix
  • 相关文献

参考文献10

二级参考文献143

  • 1张显全,祝英俊,孙容海,刘潘梅.基于位平面的彩色图像大容量信息隐藏方法[J].光电子.激光,2009,20(8):1092-1095. 被引量:10
  • 2Chang Chin-Chen, Tseng Hsien-Wen. A Steganographic Methodfor Digital Images Using Side Match[J]. Pattern Recognition Letters, 2004, 25(12): 1431-1437.
  • 3Yang Cheng-Hsing, Weng Chi-Yao, Wang Shiuh-Jeng. AdaptiveData Hiding in Areas of Images With Spatial LSB DomainSystems[J]. IEEE Transactions on Information Forensics andSecurity, 2008, 3(3): 488-497.
  • 4Chan Chi-Kwong, Cheng Lee-Ming. Hiding Data in Images bySimple LSB Substitution[J]. Pattern Recognition, 2004, 37(3):469-474.
  • 5王威娜,张新鹏,王朔中.针对边缘匹配嵌入法的密写分析以及嵌入率估计[C]//第十二届全国图像图形学学术会议论文集.北京:清华大学出版社,2005:105-108.
  • 6Gentry C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 2009 ACM Symposium on Theory of Computing, STOC'09, NY, USA, 2009: 169-178.
  • 7Dijk M V, Gentry C, Halevi S, et al.. Fully homomorphic encryption using ideal lattices[C]. Proceedings of in Advances in Cryptology - EUROCRYPT, Riviera, French, 2010, LNCS 6110: 24-43.
  • 8Cancellaro M, Battisti F, Carli M, et al.. A commutative digital image watermarking and encryption method in the tree structured haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 9Kundur D and Karthik K. Video fingerprinting and encryption principles for digital rights management[J]. 1EEE Multimedia, 2004, 92(6): 918-932.
  • 10Memon N and Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4): 643-649.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部