2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

高效±k自适应图像隐写术

陈嘉勇 张卫明 韩涛 祝跃飞 郭东辉

陈嘉勇, 张卫明, 韩涛, 祝跃飞, 郭东辉. 高效±k自适应图像隐写术. 自动化学报, 2013, 39(10): 1594-1601. doi: 10.3724/SP.J.1004.2013.01594
引用本文: 陈嘉勇, 张卫明, 韩涛, 祝跃飞, 郭东辉. 高效±k自适应图像隐写术. 自动化学报, 2013, 39(10): 1594-1601. doi: 10.3724/SP.J.1004.2013.01594
CHEN Jia-Yong, ZHANG Wei-Ming, HAN Tao, ZHU Yue-Fei, GUO Dong-Hui. An Efficient Adaptive Image Steganographic Method for ± k Embedding. ACTA AUTOMATICA SINICA, 2013, 39(10): 1594-1601. doi: 10.3724/SP.J.1004.2013.01594
Citation: CHEN Jia-Yong, ZHANG Wei-Ming, HAN Tao, ZHU Yue-Fei, GUO Dong-Hui. An Efficient Adaptive Image Steganographic Method for ± k Embedding. ACTA AUTOMATICA SINICA, 2013, 39(10): 1594-1601. doi: 10.3724/SP.J.1004.2013.01594

高效±k自适应图像隐写术

doi: 10.3724/SP.J.1004.2013.01594
基金项目: 

国家自然科学基金(60803155, 61170234, 60970141, 60902102, 61274133), 郑州市科技创新团队项目(10CXTD150), 中国科学院战略性先导专项课题(XDA06030601), 国家重大科技专项(2010ZX03004-003)资助

详细信息
    作者简介:

    张卫明 解放军信息工程大学信息工程学院副教授.主要研究方向为信息隐藏和密码学.E-mail:weimingzhang@shu.edu.cn

An Efficient Adaptive Image Steganographic Method for ± k Embedding

Funds: 

Supported by National Natural Science Foundation of China (60803155, 61170234, 60970141, 60902102, 61274133), Science and Technology Innovation Team of Zhengzhou (10CXTD150), Strategic and Piloted Project of Chinese Academy of Sciences (XDA06030601), National Science and Technology Major Project of China (2010ZX03004-003)

  • 摘要: 自适应隐写可避免修改载体的敏感区域, 有效提高隐写术的安全性. 总结分析了现有自适应隐写的边信息同步方法. 通过推广单调纹理函数思想, 构造一种基于自由度的纹理保序函数, 实现了自适应隐写边信息的快速同步. 结合湿纸编码和多层嵌入思想, 提出自适应 ± 1和± 2 隐写算法. 新算法既保证通信双方能快速同步边信息, 同时具有很高的抗检测性能. 理论分析和实验结果均表明了算法的有效性.
  • [1] Cheng Wei-Dong, Huang Ji-Wu, Liu Hong-Mei. A 3D-DCT-Based information hiding algorithm for color images. Acta Automatica Sinica, 2003, 29 (2): 258-266(程卫东, 黄继武, 刘红梅. 一种基于3D-DCT的彩色图像信息隐藏算法. 自动化学报, 2003, 29(2): 258-266)
    [2] Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 1-14
    [3] Fridrich J, Kodovský J, Goljan M, Holub V. Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Conference on Information Hiding. Prague, Czech Republic: LNCS, 2011. 102-117
    [4] Fridrich J, Goljan M, Lisonek P, Soukal D. Writing on wet paper. IEEE Transactions on Signal Processing, 2005, 53(10): 3923-3935
    [5] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the 7th Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2009. 1-14
    [6] Lu Y F, Li X L, Yang B. A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kyoto, Japan: IEEE, 2009. 1046-1051
    [7] Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters, 2005, 12(1): 67-70
    [8] Singh Kh M, Singh L S, Singh A B, Devi Kh S. Hiding secret message in edges of the image. In: Proceedings of the 2007 International Conference on Information and Communication Technology. Dhaka, Bangladesh: IEEE, 2007. 238-241
    [9] Yang C H, Weng C Y, Wang S J, Sun H M. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497
    [10] Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214
    [11] Liu G J, Liu W W, Dai Y W, Lian S G. An adaptive matrix embedding for image steganography. In: Proceedings of the 3rd International Conference on Multimedia Information Networking and Security. Shanghai, China: IEEE, 2011. 642-646
    [12] Fridrich J, Goljan M, Soukal D. Efficient wet paper codes. In: Proceedings of the 7th International Workshop on Information Hiding. Barcelona, Spain: LNCS, 2005. 204-218
    [13] Fridrich J. Minimizing the embedding impact in steganography. In: Proceedings of the 8th Workshop on ACM Multimedia and Security. Geneva, Switzerland: ACM, 2006. 2-10
    [14] Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 24-26
    [15] Schaefer G, Stich M. UCID: an uncompressed color image database. In: Proceedings of the 2nd Storage and Retrieval Methods and Applications for Multimedia. San Jose, USA: SPIE, 2003. 472-480
    [16] Cai K W, Li X L, Zeng T Y, Yang B, Lu X Q. Reliable histogram features for detecting LSB matching. In: Proceedings of the 17th International Conference on Image Processing. Hong Kong, China: IEEE, 2010. 1761-1764
    [17] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224
    [18] Zhang X, Zhang W, Wang S. Efficient double-layered steganographic embedding. IET Electronics Letters, 2007, 43(8): 482-483
    [19] Zhang W M, Zhang X P, Wang S Z. Near-optimal codes for information embedding in gray-scale signals. IEEE Transactions on Information Theory, 2010, 55(3): 1262-1270
  • 加载中
计量
  • 文章访问数:  2109
  • HTML全文浏览量:  116
  • PDF下载量:  1365
  • 被引次数: 0
出版历程
  • 收稿日期:  2012-01-12
  • 修回日期:  2012-08-02
  • 刊出日期:  2013-10-20

目录

    /

    返回文章
    返回