期刊文献+

双伪装图像自适应高容量可逆隐写算法

Adaptive Reversible Steganography with High Capacity Using Double Stego Images
下载PDF
导出
摘要 可逆隐写可无误差恢复因嵌入信息而失真的宿主。本文提出了一种利用SOS(second-order steganographic method)产生双伪装图像实现高容量自适应可逆隐写的算法。在本算法中,秘密信息被转化为B进制数字,根据秘密数字的进制B构建特定的B×B引导矩阵MB,从而每个像素对都可嵌入两个B进制数字。算法每次将一对B进制秘密数字嵌入像素对(pi,pi+1)产生伪装图像1,然后根据失真幅度依然可以用B进制数字表示的性质,将失真信息再次嵌入该像素对产生伪装图像2。实验表明本算法相对于其他算法不仅在隐写容量方面很有优势,在隐写质量方面也有很大的提高。例如:在载荷为1.5比特每像素(bpp)时,峰值信噪比(PSNR)可达到41dB左右。 The fuzzy host after embedding secret message can be recovered inerrably in reversible steganography. An adaptive reversible steganography scheme which employs second--order steganographic method to generate two stego images is proposed. In this scheme, secret message is converted to B--ary notational system numbers and a matrix MB is determined by B, then two B--ary numbers can be embedded into a pair of pixels. This method embeds secret message in pixel pair (pi , pi+1) to get stego-- image 1, and embeds distortion information in pixel pair (pi , pi+1) to get stego--image 2 according to that the amplitude of distortion can be represented by B- ary numbers. The experimental results demonstrate that this method not only has great advantage in capacity, but also considerably improves image quality compared with previous works. For instance, the peak signal noise to ratio (PSNR) of this method achieves 41dB with payload 1.5 bit per pixel (bpp).
出处 《合肥师范学院学报》 2015年第6期42-47,共6页 Journal of Hefei Normal University
基金 国家自然科学基金(61300057) 安徽大学博士科研启动经费(J10113190069) 安徽大学大学生科研训练计划(J18520152 J18520162)
关键词 可逆隐写 自适应 双伪装图像 高容量 reversible steganography adaptive double stego images high capacity
  • 相关文献

参考文献13

  • 1Wang Ran-zan, Lin Chi-fang, Lin Ja-chen. Hiding data in im-ages by optimal moderately significant-bit replacement [J].IEEE electronics Letters,2000, 36(25) : 2069-2070.
  • 2Ker A D. Improved detection of LSB steganography in grayscale images information hiding [C], Proc. 6th InformationHiding, Springer LNCS, 2005, 3200; 97-115.
  • 3Mielikainen J. LSB matching revisited [J ]. IEEE SignalProcess, 2006,13(5): 285-287.
  • 4Zhang Xin-peng, Wang Shuo-zhong. Efficient steganographicembedding by exploiting modification direction[J], IEEE Com-munication Letters, 2006, 10(11) : 781-783.
  • 5Chao Ruey-ming. Wu Hsien-chu,Lee Chin-chiang* Chu Yen-ping. A novel image data hiding scheme with diamond enco-ding[J]. EURASIP Journal on Information Security. 2009,2009: 1-9.
  • 6Yin Zhao-xia, Chang Chin-chen,Xu Qin,Luo Bin. Second-or-der steganographic method based on adaptive reference [J].IET Image Processing, 2014, DOI: 10. 1049/iet-ipr.2014.0159.
  • 7Ni Zhi-cheng, Shi Yun-qing. Ansari N, Wei Su. Reversibledata hiding[J]. IEEE Transactions on Circuits and Systems forVideo Technology, 2006,16(3) : 354-362.
  • 8Tai Wei*-liang, Yeh Chia-ming, Chang Chin-chen. Reversibledata hiding based on histogram modification of pixel differences[J], IEEE Transactions on Circuits and Systems for VideoTechnology, 2009,19(6): 906-910.
  • 9Peng Fei, Li Xiao-long, Yang Bin. Adaptive reversible datahiding scheme based on integer transform[J]. Signal Process-ing, 2012, 92(1): 54-62.
  • 10Chang Chin-chen, Kieu T D, Chou Yung-chen. Reversibledata hiding scheme using two steganographic images [J],IEEE TENCON, 2007’ 1-4.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部