期刊文献+

基于DCT变换的图像多通道隐写算法

Image Multi-channel Steganography Algorithm Based on DCT Transformation
下载PDF
导出
摘要 现有图像隐写算法多是基于单通道图像,基于多通道的图像隐写算法研究较少。文章提出一种多通道隐写算法,在图像红色通道和绿色通道上DCT域进行运算,并使用图像两个通道的AC系数来写入消息;实验结果表明,在512×512像素的图像上,对原始图像隐写“HelloWorld!”后得到隐写图像,隐写质量评价MSE=1.14,PSNR=23.50,SSIM=0.98。隐写图像与原始图像相似;在隐写分析检测中,相比传统单通道隐写算法,能更有效抵抗隐写分析检测,因此该多通道隐写算法可应用在实际通信中。 The existing image steganography algorithms are based on single channel image steganography,and there is relatively little research on multi-channel image steganography algorithms.The article proposes a multi-channel steganography algorithm to operate on the DCT domain of the red and green channels of an image,and uses the size between the AC coefficients of the two channels of the image to write messages.The results indicate that at 512×512 pixel image,the steganography of"Hello World!"obtains MSE=1.14,PSNR=23.50,and SSIM=0.98.The steganographic image is similar to the original image.In steganalysis detection,compared to traditional single channel steganalysis algorithms,this multi-channel steganalysis algorithm can more effectively resist steganalysis detection,so it can be used in practical communication.
作者 荣存庆 靳珂 赵莹 常锦才 RONG Cun-qing;JIN Ke;ZHAO Ying;CHANG Jin-cai(College of Science,North China University of Science and Technology,Tangshan Hebei 063210,China;Hebei Key Laboratory of Data Science and Applications,Tangshan Hebei 063210,China)
出处 《华北理工大学学报(自然科学版)》 CAS 2024年第3期87-95,共9页 Journal of North China University of Science and Technology:Natural Science Edition
基金 国家自然科学基金(61702184):局部/全局网格参数化方法的研究
关键词 图像隐写 离散余弦变换变换 隐写分析 最低有效位隐写 image steganography DCT transformation steganalysis least significant bit steganograph
  • 相关文献

参考文献6

二级参考文献33

  • 1张政馗,庞为光,谢文静,吕鸣松,王义.面向实时应用的深度学习研究综述[J].软件学报,2020(9):2654-2677. 被引量:36
  • 2Ker A D. Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters, 2005, 12(6) :441-444.
  • 3Kim Y, Duric Z, Richards D. Modified matrix encoding tech- nique for minimal distortion steganography[C]//Proc of the 8th Information Hiding, 2006 : 314-327.
  • 4Provos N. OutGuess[EB/OL]. [2012-10-01]. http://www. outguess org.
  • 5Westfeld A. FS-A steganographic algorithm:High capacity de- spite better steganalysis[C]//Proc of the 4th International Workshop on Information Hiding,2001:289-302.
  • 6Crandall R. Some notes on steganography [EB/OL]. [1998- 05-20]. http://os, inf. tu2dresden, de/-westfeld/Crandall, pdf.
  • 7Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG ima- ges: Breaking the F5 algorithm[C]//Proc of the 5th Infor- mation Hiding Workshop, 2002 : 7-9.
  • 8Liu Fen-lin, Liu Jiu-fen, Luo Xiang-yang, et al. Digital im- age steganalysis[M]. Beijing: China Machine Press, 2010.
  • 9Fu Yu. Research on the security and optimization of steg- anography algorithm[D]. Beijing:Beijing University of Posts and Telecommunications, 2010.
  • 10Zhang X P, Wang S. Dynamical running coding in digital steganography[J]. IEEE Signal Processing Letters, 2006, 13(3) : 165-168.

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部