期刊文献+

基于构造纹理图像的数字隐写 被引量:16

Steganography by Constructing Texture Images
下载PDF
导出
摘要 提出一种通过构造纹理图像来隐藏信息的新型隐写方法.隐写者首先构建一个包含多种不同特征的单元库,用来表征二进制数据与图形单元之间的映射关系;根据秘密信息从单元库中选取图形,并确定图形在白纸上的摆放位置,绘制一幅含有隐写单元的图像;随后在其中添加背景元素,并通过可逆形变操作来生成一幅具有复杂纹理结构的含密图像.接收端在提取信息时,根据密钥对含密图像进行逆操作,去除背景图形后使用匹配滤波器识别源图像中的图形,通过分析其摆放位置和图形特征来提取秘密数据.实验结果表明,该方法生成的含密图像具有良好的视觉效果,使秘密数据得到了很好的隐蔽,而且通过调整参数还可以隐藏任意数量的秘密信息. This paper proposes a new steganography method using texture construction.The data-hider first constructs a database of elements containing many different patterns and features used to represent secret bits.The data-hider selects patterns and features from the database according to the secret message.The selected elements are painted onto specified positions on a white paper,and some background elements added to the painted paper.With pre-defined transforming functions,the data-hider transforms the painted image to construct a stego-image.On the receiver side,secret messages can be extracted from the stego-image using the inverse operations.Experimental results show that the constructed stego-image has good visual effects,and the secret messages can be properly hidden into the image.Meanwhile,any amount of message can be hidden by choosing different parameters.
出处 《应用科学学报》 CAS CSCD 北大核心 2016年第5期625-632,共8页 Journal of Applied Sciences
基金 国家自然科学基金(No.U1536108 No.61572308 No.61525203 No.61472235)资助
关键词 信息隐藏 隐写 纹理合成 information hiding steganography texture synthesis
  • 相关文献

参考文献18

  • 1Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009. 被引量:1
  • 2Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82. 被引量:1
  • 3Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13. 被引量:1
  • 4Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395. 被引量:1
  • 5Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168. 被引量:1
  • 6Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270. 被引量:1
  • 7Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154. 被引量:1
  • 8Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569. 被引量:1
  • 9Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14. 被引量:1
  • 10Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4. 被引量:1

同被引文献65

引证文献16

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部