首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
目的 图像隐写是指将秘密信息隐藏到载体图像中,生成含密图像并在公共信道中传输。隐写分析旨在识别图像中是否隐藏秘密信息。不论何种隐写方案,都会在一定程度上被隐写分析识破,从而导致胁迫攻击,即攻击者找到发送方或接收方,胁迫其提交经过验证的秘密信息。为了保护秘密信息的隐蔽通信,对抗胁迫攻击的可否认方案亟待研究。在密码学领域,为了对抗胁迫攻击,已经提出了可否认加密的概念及相关方案并受到关注与研究。而在隐写领域,有研究提出可否认隐写的概念并设计了接收方可否认隐写的框架,但没有发送方可否认隐写的相关研究。对此,本文讨论发送方可否认隐写。方法 设计方案的通用框架,并构造两个方案:基于可逆网络的发送方可否认图像隐藏方案和基于可否认加密的发送方可否认图像隐写方案。在发送方可否认隐写的框架下,发送方可使用虚假的秘密信息生成与攻击者手中相同的含密图像,以欺骗攻击者,逃脱胁迫攻击,保护真实的秘密信息。结果 实验结果表明,两个方案都是可行且有效的,与原始隐写方案相比,可否认方案达到了发送方可否认功能的同时,均不会显著降低含密图像的视觉质量(峰值信噪比(peak signal-to-noise ratio,PSN...  相似文献   

2.
In this paper a data hiding method is proposed based on the combination of a secret sharing technique and a novel steganography method using integer wavelet transform. In this method in encoding phase, first a secret image is shared into n shares, using a secret sharing technique. Then, the shares and Fletcher-16 checksum of shares are hidden into n cover images using proposed wavelet based steganography method. In decoding phase, t out of n stego images are required to recover the secret image. In this phase, first t shares and their checksums are extracted from t stego images. Then, by using the Lagrange interpolation the secret image is revealed from the t shares. The proposed method is stable against serious attacks, including RS and supervisory training steganalysis methods, it has the lowest detection rate under global feature extraction classifier examination compared to the state-of-the-art techniques. Experimental results on a set of benchmarks showed that this method outperforms conventional methods in offering a high secure and robust mechanism for joining secret image sharing and steganography.  相似文献   

3.
目的 针对传统有意义分存方法存在的像素扩张和分发掩体图像视觉质量不高等问题,提出一种结合调整差值变换的(K,N)有意义图像分存方案,该方案可用于与掩体等大且同为自然图像的密图分存.方法 在分存阶段,首先用调整差值变换将密图转换为差值图和位置图;其次将差值图和位置图进行(K,N)分存,分别嵌入到掩体图像中,并使用密钥确定位置图分存信息的嵌入位置和根据位置图中不同的差值类型选择不同的差值嵌入方法;再次对密钥进行(K,N)分存,将子密钥和分发掩体对应的MD5值公布到第3方公信方作为认证码;最后将子密钥和分发掩体分发给参与者进行保管.在恢复阶段,首先核对参与者的子密钥和分发掩体对应的MD5值,若认证通过的人数小于K,则恢复失败;否则,使用认证通过的子密钥还原出密钥,然后根据密钥提取并恢复出位置图;其次根据位置图中的差值类型来提取和恢复出差值图;最后使用逆调整差值变换还原出最终密图.结果 同现有方法相比,所提策略不存在像素扩张且分发掩体图像视觉质量较高,具有较强的恶意参与者检测能力.结论 本文方法的掩体图像与密图等大且同为自然图像,同经典有意义图像分存方案相比,克服了像素扩张问题,嵌入信息后的掩体图像具有较高的视觉质量,使用第3方公信方存储的MD5值作为认证码,具有较强的恶意参与者识别能力.  相似文献   

4.
Ponuma  R.  Amutha  R.  Aparna  S.  Gopal  Gayatri 《Multimedia Tools and Applications》2019,78(18):25707-25729

A visually secure multiple image encryption using chaotic map and compressive sensing is proposed. The existing image encryption algorithms transform a secret image into a random noise like cipher image which can lead to cryptanalysis by an intruder. In the proposed method, compressive sampling is done using a chaos based, key controlled measurement matrix. An image dependent key generation scheme is used to generate the parameters of the chaotic map. The secret images are transformed into wavelet coefficients, and scrambled along a zigzag path, so that the high correlation among them can be reduced and thereby provide increased security level. The sparse coefficients are measured using the chaotic map-based measurement matrix, whose initial parameters are obtained from the keys generated. Then the reduced measurements are embedded into the sub-bands of the wavelet transformed cover image. Therefore, the proposed algorithm is highly sensitive to the secret images and can effectively withstand known-plaintext and chosen-plaintext attacks. Additionally, the cipher image and the secret images are of same size and do not require additional transmission bandwidth and storage space.

  相似文献   

5.
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414] and Yang et al. [Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076] proposed secret image sharing schemes combining steganography and authentication based on Shamir's polynomials. The schemes divide a secret image into some shadows which are then embedded in cover images in order to produce stego images for distributing among participants. To achieve better authentication ability Chang et al. [Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137] proposed in 2008 an improved scheme which enhances the visual quality of the stego images as well and the probability of successful verification for a fake stego block is 1/16.In this paper, we employ linear cellular automata, digital signatures, and hash functions to propose a novel (t,n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256. Employing cellular automata instead of Shamir's polynomials not only improves computational complexity from to O(n) but obviates the need to modify pixels of cover images unnecessarily. Compared to previous methods [C. Lin, W. Tsai, Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414; C. Yang, T. Chen, K. Yu, C. Wang, Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076; C. Chang, Y. Hsieh, C. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137], we use fewer number of bits in each pixel of cover images for embedding data so that a better visual quality is guaranteed. We further present some experimental results.  相似文献   

6.

This paper introduced an image steganography technique based on modified matrix encoding to enhance the perceptual quality of the stego images. Additionally, more pixel bit-planes are exploited in the data hiding process to improve the embedding capacity. The number of used image layers depends on the size of the given secret message and the texture characteristic of the cover image. The complexity of the pixel block is identified by the difference between the middle pixel and its neighbors. By performing the suitable embedding solutions of modified matrix encoding, the complexity is unchanged by the data hiding stage. Therefore, the used image regions could be determined precisely in the extraction process without using any additional information. The experimental results proved that the stego images created by the proposed approach achieved higher security against statistical and visual steganalysis techniques than the previous methods. The improvement of the security against detection by Ensemble Classifier is four times as secure as the best security performance of the existing methods.

  相似文献   

7.
目的 现有基于对抗图像的隐写算法大多只能针对一种隐写分析器设计对抗图像,且无法抵御隐写分析残差网络(steganalysis residual network,SRNet)、Zhu-Net等最新基于卷积神经网络隐写分析器的检测。针对这一现状,提出了一种联合多重对抗与通道注意力的高安全性图像隐写方法。方法 采用基于U-Net结构的生成对抗网络生成对抗样本图像,利用对抗网络的自学习特性实现多重对抗隐写网络参数迭代优化,并通过针对多种隐写分析算法的对抗训练,生成更适合内容隐写的载体图像。同时,通过在生成器中添加多个轻量级通道注意力模块,自适应调整对抗噪声在原始图像中的分布,提高生成对抗图像的抗隐写分析能力。其次,设计基于多重判别损失和均方误差损失相结合的动态加权组合方案,进一步增强对抗图像质量,并保障网络快速稳定收敛。结果 实验在BOSS Base 1.01数据集上与当前主流的4种方法进行比较,在使用原始隐写图像训练后,相比于基于U-Net结构的生成式多重对抗隐写算法等其他4种方法,使得当前性能优异的5种隐写分析器平均判别准确率降低了1.6%;在使用对抗图像和增强隐写图像再训练后,相比其他4种方法,仍使得当前性能优异的5种隐写分析器平均判别准确率降低了6.8%。同时也对对抗图像质量进行分析,基于测试集生成的2 000幅对抗图像的平均峰值信噪比(peak signal-tonoise ratio,PSNR)可达到39.925 1 dB,实验结果表明本文提出的隐写网络极大提升了隐写算法的安全性。结论 本文方法在隐写算法安全性领域取得了较优秀的性能,且生成的对抗图像具有很高的视觉质量。  相似文献   

8.
目的 像素置换作为一种可逆信息隐藏方式具有良好的抗灰度直方图隐写分析能力,但嵌入容量偏小一直是其缺陷。针对这一问题,提出了一种基于像素置换的自适应可逆信息隐藏算法。方法 首先,与传统2×2像素块结构相比构造了尺寸更小的像素对结构,使得载体图像可以被更稠密地分割,为嵌入容量的提升提供了基数条件。其次,提出适用于该新像素结构的可嵌像素对(EPP)筛选条件,避免嵌入过程引起图像质量大幅下降。之后,根据EPP的灰度趋势差异对其进行自适应预编码,提高Huffman编码压缩比,进一步提升算法嵌入容量。最终,通过像素置换嵌入信息。结果 与2×2像素块结构的非自适应图像隐写算法相比,在同样保证灰度直方图稳定性的情况下该算法的PSNR提高了32%左右,嵌入容量提高了95%以上。其中自适应性对嵌入容量提升的贡献极大。结论 本文算法同时具有抗灰度直方图隐写分析能力与高嵌入容量性的可逆信息隐藏。算法构造了更高效的可嵌单位,并且针对不同载体图像的特点对其可嵌区域进行差异化编码。实验结果表明,本文算法在具有更好的不可见性的同时,嵌入容量得到大幅提升。  相似文献   

9.

In this paper we have proposed an LSB based data hiding method. Here, first cover image is encoded by LBP based method (call as ELBP). In ELBP method, a 3 × 3 block is encoded by k bits (1 ≤ k ≤ 9) respect to the central pixel. For data hiding purpose, the cover image is encoded by ELBP then r (1 ≤ r < k) bits are embedded into each neighbor pixel by replacing least r bits of the encoded stream and then modified pixel is processed by OPAP method to improve the quality of the stego image. Proposed method gives high quality stego images with higher embedding rate compare to the state-of-the-art methods. The security of the proposed data hiding method is tested against the attacks like RS steganalysis and Chi-square attack and these methods fail to detect hidden data.

  相似文献   

10.
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego images so as to be transmitted to authorized recipients securely. In addition, these schemes also involve their authentication mechanisms to verify the integrity of the stego images such that the secret image can be restored correctly. Unfortunately, these schemes still have two shortcomings. One is that the weak authentication cannot well protect the integrity of the stego images, so the secret image cannot be recovered completely. The other shortcoming is that the visual quality of the stego images is not good enough. To overcome such drawbacks, in this paper, we propose a novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT). The proposed scheme not only improves the authentication ability but also enhances the visual quality of the stego images. The experimental results show that the proposed scheme is superior to the previously existing methods.  相似文献   

11.

A new variant of image steganography based on exploiting modification directions (EMD) named advanced EMD (AEMD) is introduced. In this method the secret digits in mn -ary notional systems are embedded into a group of n pixels of the cover image. To increase data hiding capacity, edge masking characteristics of human visual system is exploited to embed more bits at image edge pixels than non-edge pixels. To do this, a neutrosophic set edge detector, named as MNSED is also introduced to classify cover image into 2?×?2 non-overlapping edge and non-edge blocks without any overhead information. Hence the secret digits in two different bases are embedded into the edge and non-edge blocks. Experimental results show that the proposed method provides higher embedding capacity and better quality compared to the existing schemes, while its resistance to steganographic attack is still higher.

  相似文献   

12.
In this paper, we present curvelet transform (CT) based image steganography that embeds scrambled secret image in appropriately selected cover image. Curvelet transform offers optimal nonadaptive sparse representation of objects with edges and possesses high directional sensitivity and anisotropy. Cover image is decomposed using curvelet transform and adaptive block based embedding is carried out only in non-uniform regions of high frequency curvelet coefficients. In addition, this work also demonstrates a new cover selection method to choose suitable cover from image database. Spatial information based image complexity is modelled using fuzzy logic to identify set of images that yields least detectable stego image. From this set of ranked images, best cover can be chosen for carrying secret information depending on amount of information to be embedded. Cover selection offers reduced risk of detectability and ensures security. It is evident from experimental results that proposed method outperforms conventional methods in terms of imperceptibility, robustness and security.  相似文献   

13.
目的 搜索式无载体信息隐藏容量小、搜索量大,涉及大量载体密集传输;纹理构造式隐藏只能生成简单非自然纹理;纹理合成式隐藏存在固定映射以及编码、非编码小块的明显区别特征,且未考虑样本小块差异度和遭受攻击时的类别提取错误,抵抗攻击能力十分有限。针对以上问题,提出一种差异聚类和误差纹理合成的生成式信息隐藏。方法 在嵌入时,通过差异均值聚类获取编码样本小块,结合多重映射将代表秘密信息的编码样本小块随机放置在空白图像上,按最小误差优先拼接策略生成含密纹理。在提取时,通过密钥截取样本小块,寻找最接近编码样本小块,并结合秘密信息MD5(message-digest algorithm 5)值和随机坐标来恢复秘密信息。结果 所提方法与MD5值和密钥紧密绑定,密钥参数、MD5值以及样例图的改变都将导致秘密信息的提取误码率趋近于0.5。同现有方法相比,结合最小误差优先拼接策略,所提方法的像素累计差异更小,含密纹理视觉质量较好且对密钥极度敏感,以实验样本为例,当遭受质量因子为5070的JPEG压缩和5% 15%的椒盐噪声攻击时,秘密信息可完整提取。即使遭受25% 40%的椒盐噪声攻击,提取误码率低于7%。结论 所提方法避免了固定映射和编码、非编码小块的区别特征,含密掩体视觉质量较好且具有较强的抗攻击能力。  相似文献   

14.
目的 传统构造式图像信息隐藏算法通常直接将图像空域特征与秘密信息关联,对算法的安全性造成威胁。因此,本文将曲线绘制函数与信息隐藏相结合,提出一种以B样条控制点为特征,在图像空域间接隐藏信息的算法。方法 算法主要分为信息隐藏及信息提取两阶段。在信息隐藏阶段,发送方首先通过选取初始控制点、仿射变换及B样条曲线绘制生成多条参考曲线,然后利用曲线控制点的位置隐藏信息,最后为图像填充颜色,即完成含密纹理图像的构造。在信息提取阶段,提取方根据纹理曲线和图像颜色获得含密曲线及参考曲线,经对照计算即可提取出秘密信息。结果 本算法具有较高的隐藏容量、鲁棒性和安全性。实验结果表明,由本文算法生成的800×800像素图像,其最高隐藏容量可达2870bits,分别是另两种典型构造式信息隐藏算法的6.7和3.4倍,且在质量因子为10的JPEG(joint photographic experts group)压缩攻击下的提取误码率可低至0,优于鲁棒较强的选择式信息隐藏算法LDA-DCT(robust coverless image steganography based on DCT and LDA topic classification)以及与之类似的构造式信息隐藏算法。同时,抗隐写分析检测实验表明,在隐藏容量小于250bits时检测误差趋近于0.5。结论 本文以B样条曲线控制点为特征,在纹理图像的绘制过程中隐藏信息,有效提高了传统构造式图像信息隐藏算法的安全性、隐藏容量和鲁棒性。  相似文献   

15.
Data hiding is an important technique for covert communication that embeds secret data into a cover image with minimal perceptible degradation. Lossless data hiding is a special type of data hiding technique that guarantees not only the secret data but the cover media can be reconstructed without any distortion. In this paper, a novel path optional lossless data hiding scheme based on the joint neighboring coding (JNC) of the vector quantization (VQ) index table is proposed. The proposed scheme generates a VQ index table based on the cover image first. Next, according to an initial key and secret data content, different adjacent indices may be chosen to perform joint neighboring coding for each index and hide secret data. Finally, an appropriate output codestream is generated based on the minimal length principle. Our main contributions lie in three aspects: (1) the method combines the novel path_based shift method with the traditional JNC method to improve the capacity and stego image quality simultaneously. (2) The secret data extraction and cover image recovering processes are separated and both can be publicized to users. (3) The method is path optional to meet various users’ requirements. To testify the superiority of the proposed method, we compare it with the side match VQ (SMVQ)-based and modified fast correlation VQ (MFCVQ)-based algorithms. According to the experimental results, the proposed scheme outperforms the SMVQ-based and MFCVQ-based algorithms in four aspects, i.e., hiding capacity, stego image quality, transmission efficiency and security level.  相似文献   

16.
Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in the selected area of an image which reduces the probability of detection. Most of the existing adaptive image steganography techniques achieve low embedding capacity. In this paper a high capacity Predictive Edge Adaptive image steganography technique is proposed where selective area of cover image is predicted using Modified Median Edge Detector (MMED) predictor to embed the binary payload (data). The cover image used to embed the payload is a grayscale image. Experimental results show that the proposed scheme achieves better embedding capacity with minimum level of distortion and higher level of security. The proposed scheme is compared with the existing image steganography schemes. Results show that the proposed scheme achieves better embedding rate with lower level of distortion.  相似文献   

17.

Reversible data hiding (RDH) is a technology that embeds secret data into a carrier where both the secret data and the carrier can be recovered without any data loss. Inspired by dual images technology, this article proposes to employ a high capacity RDH scheme that is based on turtle shell (TS). We start by constructing a newly designed TS-based reference matrix. Then, two meaningful shadows will be generated after hiding the secret data in the cover image with the reference matrix’s help. Meanwhile, the location conflict problem is solved. On the decoder side, when both shadows are gathered, the data extraction and image recovery can be accomplished using the orientation relationship between two stego pixels that are located at the same coordinates in the two shadows and the reference matrix. Moreover, we introduce a security enhancement technology that improves the security of data extraction. The experiment shows that compared with other state-of-the-art RDH schemes, a higher embedding capacity is achieved by this method, and a good visual quality is retained. Simultaneously, the proposed scheme is effective against attacks on pixel value difference histograms (PDH) and regular singular (RS) analysis.

  相似文献   

18.
目的 搜索式无载体信息隐藏容量低,涉及大量载体密集传输;纹理合成无载体隐藏只能生成简单质地的纹理图像;马赛克拼图信息隐藏尽管能产生有意义图像,但需修改嵌入参数。针对以上问题,提出一种结合块旋转和马赛克拼图的生成式伪装方法。方法 将灰度图像进行圆形化并添加随机转角构建马赛克,通过随机坐标决定秘密信息的隐藏位置;在隐藏位置,根据密钥和放置位置来放置代表秘密比特串的圆形图像和施加认证转角,对于非隐藏位置则放置最接近圆形图像来掩盖秘密信息;将放置过程产生的偏差通过误差扩散分散给周围未处理像素。在提取时,结合质心旋转匹配提取秘密比特并进行转角认证。结果 采用圆形图像表达秘密信息而不涉及修改式嵌入,通过马赛克拼图产生有意义含密掩体,可通过质心旋转匹配提取秘密比特并进行转角认证。对密钥严格依赖,在遭受质量因子为50~80的JPEG压缩和随机转角攻击时,秘密信息可完整恢复,在遭受强度为8%~20%的椒盐噪声攻击时,提取信息的误码率低于5%,且对秘密信息的认证成功率均在80%以上。结论 所提方法具有较好的抗攻击能力,可抵御信道攻击且具备较高的安全性。  相似文献   

19.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods.  相似文献   

20.
随着互联网技术的发展和社交网络的普及,可逆信息隐藏技术因其具有无损恢复载体信息的特性而被广泛应用于医疗、军事等领域的隐蔽信息传输。传统的可逆信息隐藏方案大多聚焦于嵌入容量提升和载密图像失真率降低,并未过多关注人们对图像视觉细节的要求,难以抵抗隐藏信息检测方法。针对上述挑战,从增强图像视觉平滑度方面入手,提出了一种增强图像平滑度的可逆信息隐藏方案,在嵌入隐蔽信息的同时提升载密图像最终的视觉质量。具体来说,所提方案将目标图像分为参考区域与非参考区域,利用非参考区域的图像像素预测值与原始像素值的差值作为信息嵌入的判断依据,通过差值平移来嵌入信息;进而构造图像平滑机制,采用高斯滤波作为秘密信息嵌入时像素值修改的模板,对预测值进行滤波计算,将滤波差值无损地加入载体图像中,以达到图像平滑的效果;同时将参考区域的像素值作为边信息,用于实现信息提取方对原始载体图像和秘密信息的无损恢复和提取;并以高斯函数中的滤波系数作为预置秘密信息对嵌入信息进行加密处理以保证嵌入信息的机密性。大量经典图像数据集的测试与分析结果表明,所提方案处理过的载密图像视觉平滑度得到了显著增强,具有较低的失真率、较高的嵌入率和较高的嵌入提取效率。在典型环境下,其生成的载密图像与高斯滤波后的图像相似度可达0.996 3,且可获得37.346的峰值信噪比和0.328 9的嵌入容量。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号