首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
为提供较大的隐写容量和保持良好的载密图像质量,提出一种基于视觉感知和菱形编码的图像隐写算法。根据人类视觉系统,针对人眼对图像的高中低灰度区、纹理区及平滑区的敏感度的不同,在不同区域选择嵌入不同数量的秘密信息;同时为了尽可能减少对图像像素值的改变,采用改进的菱形编码来嵌入秘密信息。实验结果表明,与HVS-OPAP算法相比,该算法图像的嵌入容量提高了4.09%,获取的隐写图像具有更好的不可感知性,同时峰值信噪比平均提高了1.5dB,而且该算法具有抗RS隐写分析能力,安全性更高。  相似文献   

2.
为了提供较大的秘密信息嵌入量并保持良好的载密图像质量,提出一种基于SOM(自组织特征映射神经网络)和HVS(人眼视觉特性)的小波域图像隐写.该方法先将载体图像分成固定大小的小块,以小波对比度之和以及小波系数方差作为特征量.然后,利用SOM将小块分为三类.最后,采用模算子隐写将秘密信息嵌入到小波系数中.实验结果表明,与WHS算法相比,该算法有更大的嵌入量并保持了良好的载密图像质量.  相似文献   

3.
基于Markov链安全性的LSB匹配隐写算法   总被引:1,自引:0,他引:1  
隐秘信息的安全性是隐写算法关注的核心问题之一,设计大容量、高安全性的隐写嵌入算法是隐写方法的研究重点.基于Markov链安全标准,以Markov链散度距离最小作为优化嵌入条件,指导LSB匹配嵌入函数,提出了一种优化LSB匹配隐写算法.实验表明该隐写算法在大容量嵌入的同时,保持了载密图像的二阶统计特性,提高了隐写的安全性.  相似文献   

4.
图像信息隐藏是保障信息安全的重要手段。随着深度学习的快速发展,各类基于该技术的以图藏图式隐写算法被提出,它们大多在图像质量、隐藏安全性或嵌入容量等方面的均衡性上存在不足。针对该问题,文章提出了一种基于跨域对抗适应的图像信息隐藏算法,首先,设计超分辨率网络,将秘密信息藏入放大和缩小后不变的图像内容中,提高秘密信息的嵌入容量;然后,在编码网络中加入注意力机制,使编码网络能够关注主要特征并抑制冗余特征,提高生成图像的分辨率;最后,在生成器网络中加入域适应损失指导载密图像的生成,模型整体采用生成对抗的方式进行训练,减小载体图像和载密图像之间的跨域差异。实验结果表明,与其他以图藏图隐写算法相比,文章所提算法在保证图像质量的同时,提高了信息隐藏的安全性和嵌入容量。  相似文献   

5.
基于空域失真模型的修正矩阵编码及其改进   总被引:1,自引:0,他引:1  
隐写编码是一种常用于提高隐写术安全性的方法,针对不同的载体对象,如何定义合适的失真模型又是隐写术设计中另外一个关键问题.首先针对空域图像定义了一种简单的失真模型,并将其应用于修正矩阵编码(modified matrix encoding,MME);然后提出一种可用于减少载体修改个数的隐写编码方法,并将其用于改进基于空域失真模型的修正矩阵编码.性能对比实验的结果表明:1)所定义的空域失真模型具有一定的合理性;2)所设计的隐写编码方法具有一定的有效性;3)所提出的隐写算法具有较好的安全性.  相似文献   

6.
对一种基于IP标识协议隐写的分析   总被引:3,自引:0,他引:3       下载免费PDF全文
针对一种基于IP标识位协议隐写算法进行了分析,提出可实现隐写分析的统计变量的构造方法,给出分析窗口内含密数据包比率的估计算法,对如何提高算法的安全性给出了改进策略,实验结果表明了该算法的有效性。  相似文献   

7.
基于隐写编码和Markov模型的自适应图像隐写算法   总被引:3,自引:0,他引:3  
如何构造大容量、低失真和高统计安全的隐写算法一直是隐写研究的难点和热点.提出一种兼顾感知失真和二阶统计安全的自适应图像隐写算法设计思路.算法将载体各部分的平滑度引入隐写编码的生成过程,自适应地利用一簇隐写编码在载体各部分的合理运用降低载密图像失真度;在隐秘信息嵌入方式上利用基于Markov链模型的动态补偿方法提高载密图像统计安全性;算法对载体最低有效位和次最低有效位进行嵌入以保证嵌入容量.实验表明算法在相同嵌入量下相较双层随机LSB匹配算法以及仅使用一种隐写编码的算法,失真度更低且载体统计分布的改变更小,而在失真度和统计分布改变相近时嵌入容量更大.  相似文献   

8.
针对现有图像隐写模型存在网络训练不易收敛、梯度爆炸且生成样本质量差等问题,提出一种基于改进生成对抗网络的图像自适应隐写模型SWGAN-GP.将生成图像作为载体,使用HUGO自适应隐写算法进行信息隐藏;在损失函数中加入梯度惩罚,在网络结构中引入注意力机制,设置双判别器与生成器进行对抗训练.实验结果表明,该方法生成图像的IS值、PSNR值等均有提高,判别器分类效果明显改善.该模型可以提高收敛速度,使网络训练更稳定,载密图像更具安全性,有效抵御隐写分析算法的检测.  相似文献   

9.
奚玲  平西建  张涛 《计算机应用》2011,31(5):1280-1283
为了提高隐写系统抗统计检测的能力,对影响隐写算法统计安全性的因素进行了分析,得出减小载密图像统计失真的3条途径。以此为基础,提出一种基于双层湿纸嵌入的图像自适应隐写算法。该算法根据邻域相关性,选取局部环境噪声强的像素作为嵌入对象,利用“湿纸码(WPC)”在其最低有效位及次低有效位嵌入秘密信息。对未压缩图像库的实验表明,该方法比现有算法具有更好的抗统计检测性能。  相似文献   

10.
利用模运算及其周期性特点的安全隐写算法   总被引:1,自引:1,他引:0       下载免费PDF全文
为了提供较大的可调信息嵌入量和保持载密图像良好的视觉质量,提出一种基于模运算及其周期性特点的安全隐写算法。首先将秘密信息流转为n进制信息流表示,然后根据余数循环的特点,应用具有安全特性的模函数将一位n进制信息嵌入载体图像的一个像素中,直至信息嵌入完毕。选择不同的参数n可以得到不同的嵌入率和载密图像视觉质量。理论分析和实验结果表明,本文算法在保持高嵌入率的同时仍保持较好的载密图像视觉质量,且安全性好;其信息嵌入率选择具有高度弹性,可以根据实际要求选择在嵌入率和载密图像质量都很理想的隐写方案。与同类算法相比具有更强的实用性。  相似文献   

11.
袁超  王宏霞  何沛松 《软件学报》2024,35(3):1502-1514
随着深度学习与隐写技术的发展,深度神经网络在图像隐写领域的应用越发广泛,尤其是图像嵌入图像这一新兴的研究方向.主流的基于深度神经网络的图像嵌入图像隐写方法需要将载体图像和秘密图像一起输入隐写模型生成含密图像,而最近的研究表明,隐写模型仅需要秘密图像作为输入,然后将模型输出的含密扰动添加到载体图像上,即可完成秘密图像的嵌入过程.这种不依赖载体图像的嵌入方式极大地扩展了隐写的应用场景,实现了隐写的通用性.但这种嵌入方式目前仅验证了秘密图像嵌入和恢复的可行性,而对隐写更重要的评价标准,即隐蔽性,未进行考虑和验证.提出一种基于注意力机制的高容量通用图像隐写模型USGAN,利用注意力模块, USGAN的编码器可以在通道维度上对秘密图像中像素位置的扰动强度分布进行调整,从而减小含密扰动对载体图像的影响.此外,利用基于CNN的隐写分析模型作为USGAN的目标模型,通过与目标模型进行对抗训练促使编码器学习生成含密对抗扰动,从而使含密图像同时成为攻击隐写分析模型的对抗样本.实验结果表明,所提模型不仅可以实现不依赖载体图像的通用嵌入方式,还进一步提高了隐写的隐蔽性.  相似文献   

12.
In this paper, we present a novel image steganography algorithm that combines the strengths of edge detection and XOR coding, to conceal a secret message either in the spatial domain or an Integer Wavelet Transform (IWT) based transform domain of the cover image. Edge detection enables the identification of sharp edges in the cover image that when embedding in would cause less degradation to the image quality compared to embedding in a pre-specified set of pixels that do not differentiate between sharp and smooth areas. This is motivated by the fact that the human visual system (HVS) is less sensitive to changes in sharp contrast areas compared to uniform areas of the image. The edge detection method presented here is capable of estimating the exact edge intensities for both the cover and stego images (before and after embedding the message), which is essential when extracting the message. The XOR coding, on the other hand, is a simple, yet effective, process that helps in reducing differences between the cover and stego images. In order to embed three secret message bits, the algorithm requires four bits of the cover image, but due to the coding mechanism, no more than two of the four bits will be changed when producing the stego image. The proposed method utilizes the sharpest regions of the image first and then gradually moves to the less sharp regions. Experimental results demonstrate that the proposed method has achieved better imperceptibility results than other popular steganography methods. Furthermore, when applying a textural feature steganalytic algorithm to differentiate between cover and stego images produced using various embedding rates, the proposed method maintained a good level of security compared to other steganography methods.  相似文献   

13.
Steganalysis of stochastic modulation steganography   总被引:1,自引:0,他引:1  
Steganography[1] conceals the occurrence and real purpose of communication by em- bedding message into the cover medium, such as an image, audio or video. Because im- age is widely used in Internet and has much redundancy, it has been one of the most im- …  相似文献   

14.
Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in the selected area of an image which reduces the probability of detection. Most of the existing adaptive image steganography techniques achieve low embedding capacity. In this paper a high capacity Predictive Edge Adaptive image steganography technique is proposed where selective area of cover image is predicted using Modified Median Edge Detector (MMED) predictor to embed the binary payload (data). The cover image used to embed the payload is a grayscale image. Experimental results show that the proposed scheme achieves better embedding capacity with minimum level of distortion and higher level of security. The proposed scheme is compared with the existing image steganography schemes. Results show that the proposed scheme achieves better embedding rate with lower level of distortion.  相似文献   

15.
Replacement of least-significant bit plane is one of the popular steganography techniques in digital images because of its extreme simplicity. But it is more difficult to precisely estimate the rate of secret message embedded by replacement of multiple least-significant bit (MLSB) planes of a carrier object. In order to model the MLSB embedding, a lemma is introduced to prove the transition relationships among some trace subsets. Then, based on these transition relationships, two novel steganalysis frameworks are designed to detect two kinds of distinct MLSB embedding methods. A series of experiments show that the proposed steganalysis frameworks are highly sensitive to MLSB steganography, and can estimate the rate of secret message with higher accuracy. Furthermore, these frameworks can fully meet the need to distinguish stego images under low false positive rate, especially when the embedded message is short.   相似文献   

16.
目的 针对自适应隐写术可有效避免对载体敏感区大量修改的关键问题,为间接提高安全性和增大隐写容量,在四叉树分割和自适应像素对匹配(APPM)的基础上提出一种自适应空域隐写术。方法 首先该方法以图像块的纹理复杂度作为一致性测度并且设置图像块大小为判别准则进行图像分割,根据四叉树分割结果中面积较小的图像块属于复杂区域,较大的属于平滑区域,按照图像块面积大小将图像分成由高复杂、中复杂、低复杂三大区域构成。其次嵌密方式采用APPM,根据密信容量和载体图像选择进制数B。最后,为了保证安全性和提高容量,优先选择高复杂区嵌入不低于B进制的密信,在中复杂区进行B进制的密信嵌入,在低复杂区选择不高于B进制的密信嵌入。结果 为了验证提出的方法,选8幅经典图作为实验,在嵌入率1.92 bit/pixel的情况下,与已有PVD系列算法和DE算法相比具有更高的PSNR值,PSNR值高达48 dB。此外与APPM算法比较,在嵌入率2.5 bit/pixel情况下,该算法的平均KL距离相比传统APPM算法减小了25.37%,平均一阶Markov安全指标值相比传统APPM算法减小了12.11%,对应的平均PSNR值相比传统APPM算法提高0.43%,在嵌入率1.5 bit/pixel情况下,该算法的平均KL距离相比传统APPM算法减小了37.84%,平均一阶Markov安全指标值相比传统APPM算法减小了26.61%,对应的平均PSNR值相比传统APPM算法提高1.56%。此外,从RSP图库中随机选1 000幅图作为数据集,在嵌入率0.5,0.6,0.7,0.8,0.9和1.0 bit/pixel条件下,结合SPAM特征和SVM分类器的最小平均错误率均高于LSB系列经典算法和APPM算法。结论 1)考虑了人类视觉系统对图像不同区域的敏感性不同,通过对图像进行四叉树分割预处理,优先选择非敏感区进行隐写,保证了一定的安全性要求,低嵌入率下抗SPAM检测和统计不可见性方面比较有优势。2)在四叉树分割中,对于隐写前后图像的四叉树分割结果不同的异常情况,采用一种图像块纹理复杂度调整方案,保证了密信正确完整提取。3)利用了APPM算法的大容量特性,可以隐写嵌入率大于1 bit/pixel的密信,比较适用于大容量的密信隐写,而且可以嵌入任意进制的密信,最大程度地减少嵌入失真,此外,进行了四叉树分割预处理,在安全性方面优于传统APPM算法。  相似文献   

17.
Jphide是一种基于控制表的隐写算法,通过控制表确定嵌入位置和消息嵌入方式,其设计原理复杂,安全性较高,目前尚没有较好的攻击方法。基于此,从嵌入数据组成、选位方法、嵌密方式等3个方面剖析Jphide原理,提出Jphide的2个新统计特征,给出针对性的检测方法,并且在嵌入率为10%~50%时可以准确估计出嵌入率。  相似文献   

18.
A linguistic steganalysis method is proposed to detect synonym substitution-based steganography, which embeds secret message into a text by substituting words with their synonyms. First, attribute pair of a synonym is introduced to represent its position in an ordered synonym set sorting in descending frequency order and the number of its synonyms. As a result of synonym substitutions, the number of high frequency attribute pairs may be reduced while the number of low frequency attribute pairs would be increased. By theoretically analyzing the changes of the statistical characteristics of attribute pairs caused by SS steganography, a feature vector based on the difference of the relative frequencies of different attribute pairs is utilized to detect the secret message. Finally, the impact on the extracted feature vector caused by synonym coding strategies is analyzed. Experimental results demonstrate that the proposed linguistic steganalysis method can achieve better detection performance than previous methods.  相似文献   

19.
Song  Xiaofeng  Yang  Chunfang  Han  Kun  Ding  Shichang 《Multimedia Tools and Applications》2022,81(25):36453-36472

Social media platform such as WeChat provides rich cover images for covert communication by steganography. However, in order to save band-width, storage space and make images load faster, the images often will be compressed, which makes the image steganography algorithms designed for lossless network channels unusable. Based on DCT and SVD in nonsubsampled shearlet transform domain, a robust JPEG steganography algorithm is proposed, which can resist image compression and correctly extract the embedded secret message from the compressed stego image. First, by combining the advantages of nonsubsampled shearlet transform, DCT and SVD, the construction method for robust embedding domain is proposed. Then, based on minimal distortion principle, the framework of the proposed robust JPEG steganography algorithm is given and the key steps are described in details. The experimental results show that the proposed JPEG steganography algorithm can achieve competitive robustness and anti-detection capability in contrast to the state-of-the-art robust steganography algorithms. Moreover, it can extract the secret message correctly even if the stego image is compressed by WeChat.

  相似文献   

20.
序贯LSB隐写术的提取攻击   总被引:2,自引:0,他引:2       下载免费PDF全文
序贯LSB隐写术在载体中通过连续LSB替换嵌入消息,其提取攻击问题本质上是消息嵌入起止点的估计问题。该文建立针对序贯LSB隐写术的提取攻击模型,将提取攻击问题转化为一类排序问题。对嵌入率未知情形,提出计算复杂度为O(n)的提取攻击算法。对嵌入率已知情形,给出计算复杂度为O(2logn)的快速提取攻击算法。实现了对序贯JSteg算法的提取攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号