期刊文献+

一种抗掩密分析的图像LSB掩密算法 被引量:2

LSB image steganographic algorithm of resisting steganalysis
下载PDF
导出
摘要 信息隐藏是在不影响载体数据可用性的前提下,将信息隐藏在数字多媒体诸如图像、视频和语音信号中的一种信息安全技术。针对传统LSB掩密算法仅在图像像素值上进行秘密信息掩藏的缺点,提出了一种基于灰度值扩散的图像LSB掩密算法,该算法首先利用混沌影射将载体图像进行像素灰度值扩散,然后在扩散后的灰度值上进行LSB掩密嵌入,最后进行灰度值逆扩散得到含密图像。实验结果表明,本算法不仅可以很好地保持掩密图像的质量,而且对于信息量估计法、RS分析法以及GPC分析法等掩密分析都具有很好的抵抗性。 Information hiding is an information security technology of secretly embedding information into digital multimedia, such as image, video and audio signals, without changing the perceptual quality of the cover data. An LSB steganographic method in still images based on gray value diffusion operation is proposed. The cover-image firstly was processed by the gray value diffusion operation based on chaotic mapping, then using the LSB method, the information was embedded in the diffused gray value, and the stego-image has gained by adverse operation. Experimental results show that the proposed method can preserve good steganographic image quality and has a good performance in resisting to information quantity estimation, RS and GPC steganalysis method.
作者 陈勇源
出处 《重庆邮电大学学报(自然科学版)》 2008年第6期758-762,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
关键词 信息隐藏 掩密术 掩密分析 灰度值扩散 LSB information hiding steganography steganalysis grey value diffusion least significant bit (LSB)
  • 相关文献

参考文献7

  • 1[1]KATZENBEISSER S,PETITCOLAS F A P.Information Hiding Techniques for Steganography and Digital Watermarking[M].Boston:Artech House Inc.,2000. 被引量:1
  • 2[2]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for Data Hiding[J].IBM System Journal,1995,35(3,4):313-336. 被引量:1
  • 3[3]PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information Hiding-A Survey[J].Proceedings of the IEEE special issue on protection of multimedia content,1999,87(7):1062-1078. 被引量:1
  • 4[4]Steganographic software[EB/OL].[2008-04-11].http://www.jjtc.com/Steganography/toolmatrix.html. 被引量:1
  • 5[5]FRIDRICH J,DU R,GOLJAN M.Detecting LSB Steganography in Color and Grey-Scale Images[J].Magazine of IEEE Multimedia Special Issue on Security,2001,8(4):22-28. 被引量:1
  • 6[6]ANDREAS W,ANDREAS P.Attacks on Steganographic Systems[C]// Proceedings of the Third International Workshop on Information Hiding.London,UK:Springer-Verlag,1999,1768:61-76. 被引量:1
  • 7王朔中,张新鹏,张开文著..数字密写和密写分析 互联网时代的信息战技术[M].北京:清华大学出版社,2005:177.

同被引文献22

  • 1黄良永,肖德贵.二值图像Arnold变换的最佳置乱度[J].计算机应用,2009,29(2):474-476. 被引量:23
  • 2石磊,钟铭,洪帆.抵抗几何变换的基于量化的水印技术[J].计算机辅助设计与图形学学报,2004,16(6):850-855. 被引量:18
  • 3尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 4Yang H,et al.A new block cipher based on chaotic map and group theory[J].Chaos,Solitons & Fractals,2005(10):10-16. 被引量:1
  • 5Tang G,Liao X F.A method for designing dynamical S-boxes based on discretized chaotic map[J].Chaos,Solitons & Fratals,2005,23:1901-1909. 被引量:1
  • 6Xun Yi,Chik How Tan,Chee Kheong Siew.A New Block Cipher Based on Chaotic Tent Maps[J].IEEE Trans.Circuits and Systems,2002,49 (12):1826-1829. 被引量:1
  • 7Jakimoski G,Kocarev L.Chaos and cryptography:Block encryption ciphers based on chaotic maps[J].IEEE Trans.Circuits Syst,2001,48(2):163-169. 被引量:1
  • 8Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅰ:Analysis[J].IEEE Trans.Circuits Syst,2001,48(3):281-288. 被引量:1
  • 9Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅱ:Practical realization[J].IEEE Trans.Circuits Syst,2001,48(3):382-385. 被引量:1
  • 10Wong W K,Lee L P,Wong K W.A modified chaotic cryptographic method[J].Comput Phys Commun,2000,138:234-236. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部