期刊文献+

基于直方图技术的无损数据隐藏 被引量:2

Lossless Data Hiding Based on Histogram Technique
下载PDF
导出
摘要 提出一种无损图像数据隐藏的方法。该方法基于无损数据隐藏的基本原理,选择灰度图像作为载体及要隐藏的数据,采用直方图调整技术来防止灰度图像边界数据值的溢出,用整数小波的提升变换及直方图峰值点移动形成空位的方法完成数据的嵌入。实验结果表明该算法不仅嵌入信息量大,而且失真小易重构,被广泛应用于医学、法律、军事等领域。 This paper presents a method of lossless data hiding for image. This method chooses the digital image as the original and to-be-embedded data according to the basic principles of lossless data hiding. It modifies the histogram to avoid the overflow of the borderline data, and uses the integer wavelet lifting and the histogram bit-shift to realize the data hiding. The result shows this algorithm has large hiding amounts, little distortion and easy reconstruction. It has been applied in many fields such as medical treatment, law and military affairs.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第16期235-237,共3页 Computer Engineering
关键词 直方图调整 整数小波提升变换 无损数据隐藏 modification of histogram transform of integer wavelet lifting lossless data hiding
  • 相关文献

参考文献1

二级参考文献5

  • 1Jessica Fridrich, M Goljan, Rui Du. Invertible Authentication[C].In:Proc SPIE Photonics West,Security and Watermarking of Multimedia Contents Ⅲ,San Jose,California,2001-01 ;3971:197~208. 被引量:1
  • 2M Celik,G Sharma,A M Tekalp et al. Reversible data hiding[C].In:Proceedings of the International Conference on Image Processing 2002,Rochester, NY, 2002. 被引量:1
  • 3Guorong Xuan,Jiang Zhu,Jidong Chen et al. Distortionless Data Hiding Based on Integer Wavelet Transform[J].IEE Journal,Electronics Letters,2002 ;38 (25): 1646~1648. 被引量:1
  • 4Jun Tian. Reversible Data Embedding Using a Difference Expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003; 13 ( 8 ): 890~896. 被引量:1
  • 5Bian Yang,Martin Schmucker,Wolfgang Funk et al. Integer DCT-based Reversible Watermarking for Images Using Companding Technique[C].In:Proceedings of SPIE,5306-41. 被引量:1

共引文献1

同被引文献27

  • 1刘鸿霞,夏春和.图像隐写分析现状研究[J].计算机工程与设计,2006,27(1):21-25. 被引量:9
  • 2宣国荣,姚秋明,柴佩琪,季洪飞,施云庆.基于整数小波阈值嵌入的无损数据隐藏[J].计算机应用,2006,26(12):2890-2893. 被引量:8
  • 3刘昌鑫,朱平,夏春和.F5隐写算法及其隐写分析研究[J].计算机工程与设计,2007,28(4):884-887. 被引量:6
  • 4姚国祥 林良超.RSA密钥对高效生成算法.计算机工程,2007,33(20):148-149,152. 被引量:7
  • 5FRIDRICH J, GOLJAN M, DU R. Invertible authentication watermark for JPEG images[ C]//International Conference on Information Technology. Washington, DC: IEEE Computer Society, 2001:223 - 227. 被引量:1
  • 6TIAN J. Reversible data embedding using a difference expansion [ J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8) : 890 - 896. 被引量:1
  • 7THODI D M, RODR1QUEZ J J. Prediction-error based reversible watermarking[ C]// International Conference on Image Processing. Washington, DC: IEEE Computer Society, 2004: 1549-1552. 被引量:1
  • 8SACHNEV V, KIM H J, NAN J, et al. Reversible watermarking algorithm using sorting and prediction[ J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(7) :989 -999. 被引量:1
  • 9XUAN GUORONG, SH/YUNQ, CHAI PEIQ1, et al. Optimum histogram pair based image lossless data embedding[ C]// IWDW'07 Proceedings of the 6th international Workshop on Digital Watermarking, LNCS 5510. Berlin: Springer, 2007:264 -278. 被引量:1
  • 10XUAN GUORONG, SHI Y Q, TENG JIANZHONG, et al. Doublethreshold reversible data hiding[ C]// ISCAS: Proceedings of 2010 IEEE International Symposium on Circuits and Systems. Washington, DC: IEEE Computer Society, 2010:1129 - 1132. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部