全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

应用DCT块标准差的自适应隐写算法

DOI: 10.11834/jig.20140309

Keywords: 自适应隐写,JPEG图像,标准差,失真函数,网络码(STC)

Full-Text   Cite this paper   Add to My Lib

Abstract:

目的为提高隐写方案的安全性,提出一种基于DCT(discretecosinetransform)块标准差的JPEG图像自适应隐写算法。方法DCT块标准差可以反映图像各区域的复杂情况,为此根据取整失真、量化步长以及标准差设计了失真函数,然后结合STC(syndrome-trelliscode)编码设计了隐写算法。结果引入DCT块标准差可使失真函数定义更合理,因此图像经隐写后总体失真减小,安全性能得到提高。结论实验结果表明,本文算法与其他同类算法相比具有更强的抵抗隐写检测能力,在质量因子为75时安全容量可达到0.35(嵌入总量和非零AC(交流)DCT系数个数之比)。

References

[1]  Fridrich J,Goljan M,Soukal D. Perturbed quantization steganography[J]. ACM Multimedia and Security Journal,2005,11(2):98-107.
[2]  Kim Y,Duric Z,Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of the 8th International Conference on Information Hiding. New York:Springer-Verlag Press,2006:314-327.
[3]  Sachnev V,Kim J H,Zhang R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. Princeton,NJ: ACM 2009:131-140.
[4]  Huang F J,Huang J W,Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics and Security, 2012,7(4):1181-1191.
[5]  Filler T,Judas J,Fridrich J. Minimizing embedding impact in steganography using Trellis-coded quantization[C]//Proceedings of SPIE,Media Forensics and Security Ⅻ. San Jose,USA: SPIE, 2010, 7541:7541,5(1-14).
[6]  Filler T,Judas J,Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security,2011,6(3):920-935.
[7]  Filler T,Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010,5(4):705-720.
[8]  Xi L. Research on content based adaptive image steganography[D]. Zhengzhou:The PLA Information Engineering University,2011.[奚玲. 基于内容特征的自适应图像隐写技术研究[D]. 郑州:信息工程大学,2011.]
[9]  Filler T,Pevny T,Bas P. Break our steganography system[EB/OL].2010-07-02[2013-01-08]. http://www.agents.cz/boss.
[10]  Chang C C,Lin C J. LIBSVM:a Library for support vector machines[EB/OL].2012-03-02[2013-01-08]. http://www. csie. ntu.edu.tw/[XC范围号.TIF,JZ]cjlin/libsvm/index.html.
[11]  Kodovsky J,Fridrich J. Cabibration revisited[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. Princeton,NJ: ACM, 2009:63-74.
[12]  Kodovsk? J,Fridrich J,Holub V. On dangers of overtraining steganography to incomplete cover model[C]//Proceedings of the 13th ACM Multimedia & Security Workshop. Niagara Falls,NY: ACM, 2011:29-30.
[13]  Chen C,Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations[C]//IEEE International Symposium on Circuits and Systems. Seattle,WA: IEEE, 2008:18-21.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133