期刊文献+

抗隐写密钥分析的LSB隐写算法 被引量:2

LSB Information Hiding Algorithm to Key Recovery
下载PDF
导出
摘要 LSB算法是一种典型的空间域信息隐藏算法,由于嵌入信息量大、算法简单而成为最常见的信息隐藏算法,也同时成为了隐写分析者很感兴趣的对象。针对隐写位置密钥的攻击,本文提出了一种改进的LSB隐写算法,先在图像各像素的LSB位嵌入噪声信息,再在密钥的控制下有选择性地在部分像素点嵌入隐藏信息。在已知载体图像或已知多幅用同一载体进行信息隐藏的载密图像的情况下,可以有效抵御针对隐写位置密钥的攻击,提高了LSB算法的安全性。同时该思想也可应用于基于DCT域等频域的隐藏算法中。 LSB algorithm is a typical latent algorithm of space domain information. As a most commonly used algorithm in information concealment,it can be realized easily and offers a large capacity of information embedment,meanwhile,it becomes latent writing analyzers target. According to the attacking position of LSB latent writing secret keys,this essay advances an improved algorithm which first adds noise to the LSB of each pixel of an image and then,under the control of the secret key,inserts concealed informati...
出处 《微型电脑应用》 2010年第5期14-15,22+72,共4页 Microcomputer Applications
关键词 信息隐藏 LSB算法 隐写分析 Information Hiding LSB Algorithm Steganalysis
  • 相关文献

参考文献3

二级参考文献37

  • 1[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34 被引量:1
  • 2[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05 被引量:1
  • 3[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23 被引量:1
  • 4[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230 被引量:1
  • 5[5]Avcbas, B Sankur. Statistical analysis of image quality measures. The 10th European Signal Processing Conf(EUSIPCO'2000), Tampere, Finland, 2000 被引量:1
  • 6[6]A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proc of Information Hiding, Third Int'l Workshop, LNCS 1768. Berlin Heidelberg: Springer-Verlag, 2000. 61~76 被引量:1
  • 7[7]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia(Special Issue on Security), 2001, 8(4): 22~28 被引量:1
  • 8[8]J Fridrich, R Du, M Long. Steganalysis of LSB encoding in color images. ICME'2000, New York, USA, 2000 被引量:1
  • 9[9]Y K Lee, L H Chen. An adaptive image steganographic model based on minimum-error LSB replacement. The 9th National Conf on Information Security, Taichung, Taiwan, 1999 被引量:1
  • 10[10]H Farid. Detecting steganographic messages in digital images. Dartmouth College, Tech Rep: TR2001-412, 2000 被引量:1

共引文献43

同被引文献14

  • 1Cole E,Krutz R D.Hiding in plain sight:Steganography and the art of covert communication[M].John Wiley&Sons,Inc.,2003. 被引量:1
  • 2Balaji R,Naveen G.Secure data transmission using video Steganography[C]//Electro/Information Technology(EIT),2011 IEEE International Conference on.IEEE,2011:1-5. 被引量:1
  • 3Djebbar F,Ayad B,Hamam H,et al.A view on latest audio steganography techniques[C]//Innovations in Information Technology(IIT),2011 International Conference on.IEEE,2011:409-414. 被引量:1
  • 4Adhiya K P,Patil S A.Hiding Text in Audio Using LSB Based Steganography[J].Information and Knowledge Management.2012,2(3):8-14. 被引量:1
  • 5Ashwini Mane,Gajanan Galshetwar,Amutha Jeyakumar.DATA HIDING TECHNIQUE:AUDIO STEGANOGRAPHYUSING LSB TECHNIQUE[J].International Journal of Engineering Research and Applications(IJERA),2012,2(3):1123-1125. 被引量:1
  • 6Jayaram P,Ranganatha H R,Anupama H S.Information Hiding Using Audio Steganography–A Survey[J].The International Journal of Multimedia&Its Applications(IJMA),2011,3:86-96. 被引量:1
  • 7Kekre H B,Athawale A,Halarnkar P N.Increased Capacity of Information Hiding in LSBs Method for Text and Image[J].International Journal of Electrical,Computer and Systems Engineering,2008,2(4):246-249. 被引量:1
  • 8Chaudhary A,Vasavada J,Raheja J L,et al.A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images[C]//The22nd International Conference on Computer Graphics and Vision,2012:80-83. 被引量:1
  • 9Lou D C,Hu C H.LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis[J].Information Sciences,2012,188:346-358. 被引量:1
  • 10Jain V.PUBLIC-KEY STEGANOGRAPHY BASED ON MODIFIED LSB METHOD[J].Journal of Global Research in Computer Science,2012,3(4):26-29. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部