期刊文献+

一种基于ICA的汉字信息隐秘传输方法 被引量:8

A Secret Transmission Method Based on ICA for Chinese Characters
下载PDF
导出
摘要 本文描述了一种基于独立成份分析 (ICA)的汉字信息隐密传输方法。该方法以彩色图像为寄主图像 ,对其进行ICA分解 ,求出其中的独立成分 ,再将汉字信息以编码形式 ,隐藏在对彩色图像质量影响最小的独立成分低位端 ,从而实现汉字信息的隐秘传输。该方法已经在PC机上进行了模拟 ,实验结果表明 ,该方法在保证图像质量条件下 ,有较高的嵌入率和较好的可靠性。 This paper describes a new method based on ICA to transmit hidden Chinese characters, where a color image is used as the host image and analyzed to get its independent components. After the Chinese characters having been coded, the code was embedded in the lower significant bits of the proper independent components. Thus an image with the Chinese characters hidden in it can be composed, and then transmitted on the Internet. By this method, the Chinese characters can be transmitted secretly. This method has been simulated in PC. The experiments show that using this method the transmission ratio of the Chinese characters and its security can be considerably high under the condition of keeping image quality relatively high.
出处 《中文信息学报》 CSCD 北大核心 2003年第4期59-65,共7页 Journal of Chinese Information Processing
关键词 汉字信息隐秘传输 ICA 独立成份分析 彩色图像 汉字编码 信息安全 图像传输 computer application Chinese information processing secret transmission independent component analysis(ICA) color image Chinese characters coding
  • 相关文献

参考文献7

  • 1Hyvaerinen, A and Oja. E.. Independent Component Analysis: Algorithms and Applications[J]. Neural Networks, 2000,13 (4 - 5) : 411 - 430. 被引量:1
  • 2Hyvaerinen and Oja. E.. A Fast Fixed-Point Algorithm for Independent Component Analysis[J ]. Neural Computation, 1997,9(7) : 1483 - 1492. 被引量:1
  • 3Lee Y K,Chen L H. High capacity image stegonagraphic model[J], IEE Proc, Vis. Image Signal Process, 2000,147(3) :288 - 294. 被引量:1
  • 4Fabien A.P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Information HidingA Survey [J]. Proceedings of the IEEE,special issue on protection of multimedia content, July 1999, 87(7) : 1062 - 1078. 被引量:1
  • 5Solanki, K. ; Jacobsen, N;. Chandrasekaran, S. ; Madhow, U. ; Manjunath. B. S. ; High-Volume Data Hiding In Images: Introducing Perceptual Criteria into Quantization Based Embedding [C]. Acoustics, Speech and Signal Processing, 2002. Proceedings. (ICASSP' 02). IEEE International Conference on, Volume: 4, 2002: 3485-3488. 被引量:1
  • 6Voloshynovskiy S. ; Pun, T. ; Capacity-Security Analysis Of Data Hiding Technologies [C]. Multimedia and Expo, 2002. Proceedings, 2002 IEEE International. Conference on, Volume: 2, 2002: 447-480. 被引量:1
  • 7A. Tirkel, G. Rankin, R. van Schyndel, W. Ho, N. Mee, C. Osborne. Electronic watermark[J ]. Proc DICTA, 1993,10:666 - 672. 被引量:1

同被引文献44

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2程义民,谢于明,王以孝,郭志川.一种彩色视频信息的隐秘传输方法[J].中国图象图形学报(A辑),2005,10(1):93-97. 被引量:11
  • 3[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078. 被引量:1
  • 4[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033. 被引量:1
  • 5[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276. 被引量:1
  • 6[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472. 被引量:1
  • 7[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112. 被引量:1
  • 8[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90. 被引量:1
  • 9[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396. 被引量:1
  • 10[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231. 被引量:1

引证文献8

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部