期刊文献+

一种图像块旋转的马赛克拼图伪装隐写

A Mosaic Puzzle Camouflage Steganography with Image Block Rotation
下载PDF
导出
摘要 为了提高无载体隐写效率以及隐写鲁棒性,提出了一种图像块旋转的马赛克拼图伪装隐写方法。首先在发送端将共享图像库中利用密钥随机选择的图像缩小并调整色调,再依据秘密信息和密钥对每个图像块添加随机旋转角度形成编码图像,最后将编码图像按规则排列产生含密马赛克图像;接收端依据密钥去除随机旋转,读取编码图像旋转角度获得秘密信息。实验结果表明,所提方法在嵌入容量方面优于其他无载体隐写方法,在鲁棒性方面也有良好的性能。 In order to improve the efficiency and robustness of coverless steganography,a mosaic puzzle camouflage steganography with image block rotation is proposed.Firstly,the sender reduces the image randomly selected using the key in the shared image library and adjusts its tone.Then a random rotation angle is added to each image block according to the secret information and secret key to encode the image.Finally,the encoded image is arranged based on the rules to generate the secret mosaic image.The receiver removes the random rotation according to the secret key and obtains the secret information by reading the rotation angle of the encoded image.Experimental results show that the proposed method outperforms other coverless steganography methods in terms of embedding capacity and robustness.
作者 刘钊志 赵琰 LIU Zhaozhi;ZHAO Yan(College of Electronics&Information Engineering,Shanghai University of Electric Power,Shanghai 200090,China)
出处 《应用科学学报》 CAS CSCD 北大核心 2023年第2期311-325,共15页 Journal of Applied Sciences
基金 国家自然科学基金资助项目(No.61802250) 上海市科委部分地方院校能力建设项目(No.20020500700)资助。
关键词 马赛克拼图 无载体隐写 块旋转 极坐标变换 伪装隐写 mosaic puzzle coverless steganography block rotation polar coordinate transformation camouflage steganography
  • 相关文献

参考文献9

二级参考文献40

  • 1周艺华,曹元大,魏本杰,张洪欣.图像检索中基于记忆与半监督的主动相关反馈算法[J].北京理工大学学报,2006,26(1):45-48. 被引量:3
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 3SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:40
  • 4Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009. 被引量:1
  • 5Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82. 被引量:1
  • 6Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13. 被引量:1
  • 7Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395. 被引量:1
  • 8Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168. 被引量:1
  • 9Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270. 被引量:1
  • 10Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154. 被引量:1

共引文献86

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部