共查询到19条相似文献,搜索用时 68 毫秒
1.
2.
刘晓义 《计算机应用与软件》2011,28(5)
在信息安全传输领域,为弥补密码技术的不足,在分析功能要求的基础上,提出了压缩软件、加密软件和密写软件相结合的信息安全传输方案,给出方案的详细处理过程,并重点设计了密写软件,对其嵌入部分和提取部分的实现过程分别进行了设计说明。实验表明,该方案切实可行,安全性较只使用加密技术有所提高。 相似文献
3.
对空域BPCS密写的统计分析 总被引:7,自引:0,他引:7
位面复杂度分割(BPCS)密写法将复杂度较高的位平面小块用秘密信息替换,可以嵌入较多的秘密信息并维持较好的隐蔽性,但含密图像的位平面小块复杂度直方图中存在两个明显的不连续点.据此,提出了针对BPCS密写的分析方法,由复杂度直方图的不连续性可以判断秘密信息的存在性,并确定秘密信息块的复杂度范围,准确测算秘密信息嵌入量.这种分析方法的原理同样适用于变换域位面复杂度分割密写. 相似文献
4.
5.
6.
数字水印在信息隐藏中的应用 总被引:1,自引:0,他引:1
随着因特网的日益普及,多媒体信息及流达到了前所未有的深度和广度,作品侵权也随之更加容易,篡改也更加方便,因此,如何保护数字产品版权越工受到人们的高度得视,如今,信息隐藏技术,特别是数字水印技术作为版权保护的重要手段,已得到广泛的应用,本文对数字水印技术进行了较全面的论述,包括数字水印的系统模型,特点,主要应用领域,算法分类以及数字水印可能遭受的攻击。 相似文献
7.
8.
密写(Steganography)是信息隐藏(Information Hiding)的一个重要分支.鉴于密写比信息加密更安全以及网络与信息安全问题变得越来越重要,密写已经成为当前国际上的研究热点.JPEG是一种常见的图像格式,在JPEG图像中进行密写有着重要的实际意义.文章主要研究了以JPEG图像为载体进行数据密写的基本模型,以及目前国内外以JPEG图像为载体的密写算法. 相似文献
9.
基于多混沌系统的数字密写技术 总被引:3,自引:0,他引:3
提出了一种新的基于多混沌系统的数字密写技术设计与实现方法,介绍了应用程序的实现方案,给出了系统组成方框图。实验结果表明,算法很好地实现了文本的嵌入和信息隐藏,且对传统攻击具有良好的鲁棒性。通过对图片的数字密写来进行汉字文本信息传输,较好地解决了在互联网上信息传输的通信安全问题,实践表明,系统具有推广和应用价值。 相似文献
10.
基于对最低比特位匹配密写方法及利用图像直方图对其进行密写分析方法的研究,提出了一种基于直方图信息表补偿的最低比特位密写方法。该方法在密写过程中定义动态改变的直方图信息表,以记录图像秘密信息嵌入位置像素的增减,并根据信息表内的记录在下一次同样灰度值的像素嵌入秘密信息时对直方图信息表进行补偿处理,而总体原则是尽量保证密写后的直方图信息表变化最小。实验表明,经本方法密写后的图像直方图基本保持了原有峰值和变化趋势等属性,对一些针对图像直方图攻击方法有很好的效果。 相似文献
11.
12.
13.
One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such
as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we
aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm
called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to
notice that some text has been hidden in the original cover image.
As most of the researchers and practitioners in security field argue, stenographic techniques alone are not sufficient for protecting sensitive information and thus must be used together with encryption algorithms. Therefore, the proposed approach integrates E-LSB with an encryption algorithm. E-LSB does not modify the file size and allows the flexibility of choosing one of well-known encryption algorithms including RSA, AES and CAESAR, but others can be implemented in it. With a set of experiments, the proposed approach is compared with the traditional LSB based embedding approach, and its efficiency and usability is analyzed. A set of performance evaluations realized with the developed software tool based on E-LSB algorithm show that E-LSB is better than the traditional LSB algorithm from security point of view. 相似文献
As most of the researchers and practitioners in security field argue, stenographic techniques alone are not sufficient for protecting sensitive information and thus must be used together with encryption algorithms. Therefore, the proposed approach integrates E-LSB with an encryption algorithm. E-LSB does not modify the file size and allows the flexibility of choosing one of well-known encryption algorithms including RSA, AES and CAESAR, but others can be implemented in it. With a set of experiments, the proposed approach is compared with the traditional LSB based embedding approach, and its efficiency and usability is analyzed. A set of performance evaluations realized with the developed software tool based on E-LSB algorithm show that E-LSB is better than the traditional LSB algorithm from security point of view. 相似文献
14.
15.
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions 总被引:1,自引:0,他引:1
This paper presents a least significant bit (LSB) matching steganography detection method based on statistical modeling of pixel difference distributions. Previous research indicates that natural images are highly correlated in a local neighborhood and that the value zero appears most frequently in intensity differences between adjacent pixels. The statistical model of the distribution of pixel difference can be established using the Laplace distribution. LSB matching steganography randomly increases or decreases the pixel value by 1 when the message is embedded; thus, the frequency of occurrence of the value zero in pixel differences changes most dramatically during message embedding. Based on the Laplacian model of pixel difference distributions, this paper proposes a method to estimate the number of the zero difference value using the number of non-zero difference values from stego-images and uses the relative estimation error between the estimated and actual values of the number of the zero difference value as the classification feature. Experimental results indicate that the proposed algorithm is effective in detecting LSB matching steganography and can achieve better detection performance than the local extreme method under most circumstances. 相似文献
16.
17.
针对安全性较高的最不重要位(LSB)匹配隐写算法,通过计算待检测图像像素水平和垂直方向的二阶差分,得到二阶差分矩阵并将其作为敏感特征提取源,提取差分矩阵的二阶Markov转移概率矩阵作为特征,提出了一种隐写检测算法。实验结果表明:与基于一阶差分Markov转移概率矩阵的算法相比,该算法在保证检测较高正确率的情况下,在很大程度上提高了算法的检测速度,增强了算法的性能和实用性。 相似文献
18.
基于位平面的LSB图像隐藏算法分析及改进 总被引:6,自引:0,他引:6
介绍图像信息隐藏技术中基于空间域方法中位平面的思想,分析了传统的最低有效位(LSB)隐藏算法以及在此基础上改进的奇偶标识位隐藏算法,提出了一种失真度更低、安全性更高的新隐藏方法——索引数据链隐藏算法。实验证明,采用该方法对载体数据的改变量要少于常规方法,可以有效地提高隐藏信息的安全性。 相似文献
19.
基于LSB和量化思想的倒谱域音频水印算法 总被引:2,自引:0,他引:2
为了达到版权保护目的,采用基于最不重要位(LSB)和量化思想,提出了一种新颖的小波域内倒谱水印算法。首先将音频数据进行分段处理和小波变换,并计算每段音频小波系数的倒谱域均值,然后计算每段均值的LSB位,最后通过LSB位的奇偶量化来完成秘密水印的嵌入。提取时,只需要判断倒谱域均值的LSB奇偶来恢复秘密水印。算法完全属于盲提取。算法嵌入过程中不依赖于任何阈值,更有利于算法的实际应用。实验结果表明,算法对于重采样、重量化、低通滤波和幅度攻击等都有很好的鲁棒性。 相似文献