全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

优化参数化二元模映射信息隐藏

DOI: 10.11834/jig.20141002

Keywords: 数字图像,参数化设计,优化,模函数,隐写

Full-Text   Cite this paper   Add to My Lib

Abstract:

目的针对目前信息隐藏的嵌入和提取函数为固定表达式,存在容易被隐写分析和非法提取信息的安全隐患,以及基于模函数的隐写研究现状,提出信息隐藏参数化设计思想、优化参数化二元模映射隐写算法。方法首先提出信息隐藏参数化设计定义和分析参数化信息隐藏算法的安全性,然后提出优化参数化二元模映射隐写算法。优化参数化二元模映射隐写算法将两个像素值优化组合后的模运算结果映射到一位n2进制信息,从而实现信息隐藏。结果优化参数化二元模映射隐写算法的密钥空间大,载密图像均方差小于或等于同类算法。结论信息隐藏参数化设计可以有效提高信息隐藏算法的抗隐写分析能力和抗信息提取能力;优化参数化二元模映射隐写算法与同类算法相比,具有更好的载密图像视觉质量和安全性。

References

[1]  Shen C X, Zhang H G, Feng D G, et al. Survey of Information Security[J]. Sci China Ser E, 2007, 37(2): 129-150. [沈昌祥,张焕国,冯登国,等. 信息安全综述[J].中国科学E辑:信息科学,2007,37(2):129-150.]
[2]  Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journa, 1996,35(3-4): 313-336.
[3]  Zhou Z P, Kang H, Lin J J, et al. A LSB steganalysis algorithm based on image wavele detail information[J]. Journal of Image and Graphics, 2008,13(6):1090-1093.[周治平, 康辉, 林家骏,等.小波细节信息的LSB隐写分析算法[J].中国图象图形学报, 2008,13(6):1090-1093.][DOI:10.11834/jig.20080610]
[4]  Sharp T. An implementation of key-based digital signal steganography[C]// Proceedings of 4th International Workshop on Information Hiding Pittsburgh, PA, USA Springer, 2001,2137:13-26.
[5]  Luo X Y, Lu P Z, Liu F L. A dynamic compensation LSB steganography method defeating SPA[J]. Chinese Journal of Computers, 2007,30(3):463-473. [罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(3):463-473.]
[6]  Mielikainen J. LSB matching revisited[J]. IEEE Signal Processing Letters, 2006,13(5), 285-287.
[7]  Chan C K, Cheng L M. Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004,37(3): 469-474.
[8]  Fridrich J, Goljan M, Soukal D. Searching for the stego-key[C]// Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose, CA: SPEE 2004,5306: 70-82.
[9]  Liu J, Kang Z W, He Y G. A steganographic method based on wavelet contrast and LSB[J]. Acta Electronica Sinica,2007,35(7): 1391-1393. [刘劲,康志伟,何怡刚.一种基于小波对比度和LSB的密写[J].电子学报,2007,35(7):1391-1393.]
[10]  Tao R, Zhang T, Li W X, et al. Images steganography against blind detection using integer wavelet transform[J]. Journal of Applied Sciences, 2010, 28(6): 592-600. [陶然,张涛,李文祥,等.应用整数小波变换的抗盲检测图像隐写[J].应用科学学报,2010,28(6):592-600.]
[11]  Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497.
[12]  Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010,5(2):201-214.
[13]  Lou D C, Wu N I, Wang C M, et al. A novel adaptive steganography based on local complexity and human vision sensitivity[J]. The Journal of Systems and Software, 2010, 83(7); 1236-1248.
[14]  Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11): 781-783.
[15]  Lee C F, Wang Y R, Chang C C. A steganographic method with high embedding capacity by improving exploiting modification direction[C]// Proceedings of the 3rd International Conference on International Information Hiding and Multimedia Signal Processing. Washington, USA: IEEE Computer Society, 2007, 1: 497-500.
[16]  Kuo W C, Wuu L C, Shyi C N, et al. A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method[C]// Proceedings of the 9th International Conference on Hybrid Intelligent Systems. Washington, USA: IEEE Computer Society, 2009,3:69-72.
[17]  Chao R M, Wu H C, Lee C C, et al. A novel image data hiding scheme with diamond encoding[J]. EURASIP Journal on Information Security, 2009:658047(1-9).
[18]  Liao Q N. Secure steganography based on modulo and Its cyclical characteristic[J]. Journal of Image and Graphics, 2012,17(10): 1206-1212. [廖琪男. 利用模运算及其周期性特点的安全隐写算法[J]. 中国图象图形学报, 2012, 17(10): 1206-1212.][DOI:10.11834/jig.20121002]
[19]  Qu Z G, Fu Y, Niu X X, et al. Improved EMD steganography with great embedding rate and high embedding efficiency[C]// Proceeding of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Washington USA: IEEE Computer Society, 2009: 348-352.
[20]  Zhang X P, Liu H, Zhang Y C, et al. Efficient data embedding by combining modification direction modulation and wet paper code[J]. Journal of Shanghai University: Natural science, 2010, 16(1): 1-4. [张新鹏,刘焕, 张颖春,等. 融合方向编码和湿纸编码的高效信息隐藏[J]. 上海大学学报: 自然科学版, 2010, 16(1): 1-4.]
[21]  更多...
[22]  Kieu T D, Chang C C. A steganographic scheme by fully exploiting modification directions[J]. Expert Systems with Applications, 2011,38(8):10648-10657.
[23]  Wang X T, Chang C C, Lin C C, et al. A novel multi-group exploiting modification direction method based on switch map[J]. Signal Processing, 2012, 92(6):1525-1535.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133