全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

高效±k自适应图像隐写术

DOI: 10.3724/SP.J.1004.2013.01594, PP. 1594-1601

Keywords: 信息隐藏,隐写术,自适应隐写,湿纸编码,边信息

Full-Text   Cite this paper   Add to My Lib

Abstract:

?自适应隐写可避免修改载体的敏感区域,有效提高隐写术的安全性.总结分析了现有自适应隐写的边信息同步方法.通过推广单调纹理函数思想,构造一种基于自由度的纹理保序函数,实现了自适应隐写边信息的快速同步.结合湿纸编码和多层嵌入思想,提出自适应±1和±2隐写算法.新算法既保证通信双方能快速同步边信息,同时具有很高的抗检测性能.理论分析和实验结果均表明了算法的有效性.

References

[1]  Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 1-14
[2]  Fridrich J, Goljan M, Lisonek P, Soukal D. Writing on wet paper. IEEE Transactions on Signal Processing, 2005, 53(10): 3923-3935
[3]  Lu Y F, Li X L, Yang B. A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kyoto, Japan: IEEE, 2009. 1046-1051
[4]  Singh Kh M, Singh L S, Singh A B, Devi Kh S. Hiding secret message in edges of the image. In: Proceedings of the 2007 International Conference on Information and Communication Technology. Dhaka, Bangladesh: IEEE, 2007. 238-241
[5]  Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214
[6]  Fridrich J, Goljan M, Soukal D. Efficient wet paper codes. In: Proceedings of the 7th International Workshop on Information Hiding. Barcelona, Spain: LNCS, 2005. 204-218
[7]  Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 24-26
[8]  Cai K W, Li X L, Zeng T Y, Yang B, Lu X Q. Reliable histogram features for detecting LSB matching. In: Proceedings of the 17th International Conference on Image Processing. Hong Kong, China: IEEE, 2010. 1761-1764
[9]  Zhang X, Zhang W, Wang S. Efficient double-layered steganographic embedding. IET Electronics Letters, 2007, 43(8): 482-483
[10]  Cheng Wei-Dong, Huang Ji-Wu, Liu Hong-Mei. A 3D-DCT-Based information hiding algorithm for color images. Acta Automatica Sinica, 2003, 29 (2): 258-266(程卫东, 黄继武, 刘红梅. 一种基于3D-DCT的彩色图像信息隐藏算法. 自动化学报, 2003, 29(2): 258-266)
[11]  Fridrich J, Kodovsky J, Goljan M, Holub V. Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Conference on Information Hiding. Prague, Czech Republic: LNCS, 2011. 102-117
[12]  Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the 7th Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2009. 1-14
[13]  Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters, 2005, 12(1): 67-70
[14]  Yang C H, Weng C Y, Wang S J, Sun H M. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497
[15]  Liu G J, Liu W W, Dai Y W, Lian S G. An adaptive matrix embedding for image steganography. In: Proceedings of the 3rd International Conference on Multimedia Information Networking and Security. Shanghai, China: IEEE, 2011. 642-646
[16]  Fridrich J. Minimizing the embedding impact in steganography. In: Proceedings of the 8th Workshop on ACM Multimedia and Security. Geneva, Switzerland: ACM, 2006. 2-10
[17]  Schaefer G, Stich M. UCID: an uncompressed color image database. In: Proceedings of the 2nd Storage and Retrieval Methods and Applications for Multimedia. San Jose, USA: SPIE, 2003. 472-480
[18]  Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224
[19]  Zhang W M, Zhang X P, Wang S Z. Near-optimal codes for information embedding in gray-scale signals. IEEE Transactions on Information Theory, 2010, 55(3): 1262-1270

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133