期刊文献+

Fast coding in digital steganography 被引量:1

Fast coding in digital steganography
原文传递
导出
摘要 Dynamical running coding was previously proposed as a method for construction of steganographic schemes in digital steganography.In this article,a new approach of fast coding is proposed to improve steganographic efficiency.Original embedding method is discussed in two cases of constructing different generating matrix;however,the proposed method generalizes the problem to only one case by changing the construction method from the original method.Therefore,the complexity of the proposed method is less than the original method.Meanwhile,both theoretical analysis and experiment results show better performance in terms of distortions and alterations of the cover objects when embedding the same amount of information data bits,which proves a better resistance against steganalysis.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第6期92-96,共5页 中国邮电高校学报(英文版)
基金 supported by the National Basic Research Program of China (2007CB311203) the National Natural Science Foundation of China (60821001) the Specialized Research Fund for the Doctoral Program of Higher Education (20070013007) the National 111 Project (B08004)
关键词 cover object fast coding secret message STEGANOGRAPHY cover object, fast coding, secret message, steganography
  • 相关文献

参考文献6

  • 1Fridrich J, Soukal D. Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390-394. 被引量:1
  • 2Westfeld A. High capacity despite better steganalysis (F5-A steganographic algorithm). Proceedings of the 4th Intemational Workshop on Information Hiding (II4W'O1), Apr 25-27, 2001, Pittsburgh, PA, USA. LNCS 2137. Berlin, Germany: Springer-Verlag, 2001:289-302. 被引量:1
  • 3Fridricb J, Goljan M, Lisonek P, et al. Writing on wet paper. IEEE Transcriptions on Signal Processing, 2005, 53(10-2): 3923-3935. 被引量:1
  • 4Zhang X P, Wang S Z. Dynamical running coding in digital steganography. IEEE Signal Processing Letters, 2006, 13(3): 165-168. 被引量:1
  • 5Ker A D. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 2005, 12 (6): 441-444. 被引量:1
  • 6Wang H Q, Wang S Z. Cyber warfare: steganography vs steganalysis. Communication of the ACM, 2004, 47(10): 76-82. 被引量:1

同被引文献11

  • 1Ker A D. Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters, 2005, 12(6) :441-444. 被引量:1
  • 2Kim Y, Duric Z, Richards D. Modified matrix encoding tech- nique for minimal distortion steganography[C]//Proc of the 8th Information Hiding, 2006 : 314-327. 被引量:1
  • 3Provos N. OutGuess[EB/OL]. [2012-10-01]. http://www. outguess org. 被引量:1
  • 4Westfeld A. FS-A steganographic algorithm:High capacity de- spite better steganalysis[C]//Proc of the 4th International Workshop on Information Hiding,2001:289-302. 被引量:1
  • 5Crandall R. Some notes on steganography [EB/OL]. [1998- 05-20]. http://os, inf. tu2dresden, de/-westfeld/Crandall, pdf. 被引量:1
  • 6Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG ima- ges: Breaking the F5 algorithm[C]//Proc of the 5th Infor- mation Hiding Workshop, 2002 : 7-9. 被引量:1
  • 7Liu Fen-lin, Liu Jiu-fen, Luo Xiang-yang, et al. Digital im- age steganalysis[M]. Beijing: China Machine Press, 2010. 被引量:1
  • 8Fu Yu. Research on the security and optimization of steg- anography algorithm[D]. Beijing:Beijing University of Posts and Telecommunications, 2010. 被引量:1
  • 9Zhang X P, Wang S. Dynamical running coding in digital steganography[J]. IEEE Signal Processing Letters, 2006, 13(3) : 165-168. 被引量:1
  • 10Wang C, Li X, Yang B, et al. A content-adaptive approach for reducing embedding impact in steganography[C]//Proc of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2010 : 1762-1765. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部