首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 46 毫秒
1.
高级音频编码(AAC)的一种信息隐藏方法   总被引:2,自引:0,他引:2       下载免费PDF全文
唐步天  郭立  刘振华 《声学技术》2008,27(4):533-538
信息隐藏是20世纪90年代逐步兴起的研究课题。针对高级音频编(Advanced Audio Coding,简称AAC),简要描述了其编解码过程,说明了AAC信息隐藏的主要的概念性方法,然后提出了一种利用频域量化值的统计特性与霍夫曼码书选择间的相关性的信息隐藏的概念性方法,并描述了信息隐藏和信息提取的过程。实验在约3s的AAC压缩音频中隐藏了526bit的信息,证明了该概念性方法的可行性。还分析了目前的信息隐藏的对抗技术——隐秘信息检测技术对其的适应能力。  相似文献   

2.
阐述信息隐藏技术的基本概念、分类及主要特征,并对信息隐藏的原理和方法进行分析,概括它的主要应用领域.  相似文献   

3.
目的为了提高信息隐藏通信技术的安全性,提出一种自毁式数字水印隐藏通信技术,即使非法者截获信息的载体也无法获得信息内容。方法将生成的含水印信息的图像分切成图像碎片以此破坏内嵌的水印信息,使水印信息无法从单个的图像碎片中提取,必须经过图像碎片拼接算法合成原始含水印图像后才能提取水印信息。结果通过实验仿真分析,对于大小为32×32像素的8×8个图像碎片,复原的含水印图像无任何图像碎片拼接错位,拼接平均耗时为1.59 s,因此能实现实时在线拼接复原并顺利提取出水印信息。结论从信息的嵌入到最后信息的提取都能顺利地隐藏信息的内容和信息的存在,信息传递过程中信息的安全性能好,因此,自毁式数字水印信息隐藏通信技术是一种可行性极高的信息隐藏通信技术。  相似文献   

4.
信息隐藏是在网络环境下把机密信息隐藏在大量信息中不让对方发觉的一种方法,它在计算机网络中对于保护信息免于破坏起到了重要作用.信息隐藏的技术包括许多,特别是隐写术、数字水印、潜信道、隐匿协议等理论与技术的研究已经引起人们的重视,并逐渐发挥越来越重要的作用.  相似文献   

5.
针对电网正常运行时继电保护隐藏故障很难被发现的特性,利用小波时频局部化的特性,提出了基于小波的继电保护启动性能监测方法,介绍了继电保护隐藏故障和小波理论,重点分析基于小波分析的继电保护启动性能监测方法,通过该方法能够检测出继电保护系统启动元件中是否存在隐藏故障。  相似文献   

6.
王让定  胡文吉 《光电工程》2007,34(11):114-118,125
提出了基于云模型的音频水印技术.本文利用云模型的随机性和模糊性,设定云模型的参数作为密钥,通过正向云发生器产生水印信息,水印映射到坐标轴上是一幅云图.采用小波域自适应量化的方法,根据嵌入位置的不同选择不同的量化系数,将水印嵌入到载体音频中,提取时既可以对云进行视觉上的判断,又能通过逆向云发生器得到云模型的参数,并且给出了定量判断的方法.实验结果表明,基于云模型的音频水印具有较高的鲁棒性和不可感知性,可有效保护音频作品的版权.  相似文献   

7.
针对工程图的版权保护和现有相关算法鲁棒性不强的特点,提出了一种基于字符点阵式编码的工程图信息隐藏算法。该算法首先对隐藏信息进行点阵式编码处理,然后根据使用Logistic混沌系统产生的二值化混沌序列选择其中部分线段实体,结合HVS和隐藏信息对工程图的线宽进行微小修改,从而实现信息隐藏。实验结果显示该算法对工程图的平移、旋转、缩放和编辑等攻击具有较好的鲁棒性。  相似文献   

8.
本文提出一种基于视频数字水印的信息隐藏技术.原始信息经过扩频调制之后,生成水印信息;同时,每个视频帧经分块DCT变换之后,嵌入水印位;考虑到含水印视频帧再水印提取过程中的同步问题,在嵌入水印信息的过程中也嵌入了同步模板以抵抗可能的视频帧的几何失真,实验结果表明,本文提出的算法是可行的.  相似文献   

9.
段佳勇  郭昉  景灏 《硅谷》2013,(8):50-50,38
为改进传统LSB信息隐藏算法的安全性和不可见性,提出了基于双m序列的LSB信息隐藏算法。把m序列发生器的初始状态和本原多项式作为密钥,利用两个m序列发生器不同时刻的状态来分别确定秘密信息嵌入位置的行值和列值,再进行LSB信息隐藏。介绍了算法原理,并仿真实现了LSB(低4bit)的改进算法,实验结果表明:改进算法的图像降质更小,安全性更高。  相似文献   

10.
基于HVS与实体调色板的二维工程图信息隐藏算法   总被引:1,自引:1,他引:0  
基于HVS与实体调色板的特性,提出一种二维工程图的信息隐藏算法.该算法先获得工程图中的有序实体集,然后根据所产生的二值化混沌序列,选择其中部分实体,结合I-IVS和隐秘信息依次对选中实体的颜色进行微小修改,从而实现信息的隐藏.仿真结果表明,该信息隐藏算法对旋转、平移与均匀缩放等攻击具有较好的鲁棒性.  相似文献   

11.
The techniques that allow to obtain hidden data and recover the image has recently been much sought after. The basic objective of the method provided in this study was to analyse coefficients of digital images achieved by wavelet transform in the frequency space, to hide data, and to recover original image without loss. Wavelet transform is an efficient method to find pixel coefficient characteristic of digital images. The proposed method (NON-R) hides data using shifted histogram high-frequency Haar coefficients without rounding into integer. Thus, both hidden data and cover image can be easily recovered. Reversibility is provided by retrieving the cover image after hiding into high-frequency wavelet coefficients and extracting the message from wavelet coefficients. Experimental results show that the NON-R has a better performance than its counterparts in terms of statistical and perceptual outcomes.  相似文献   

12.
《中国工程学刊》2012,35(5):523-528
Information hiding and secret communication is one of the most interesting and fascinating domains. This hiding method exploits some features of audio signals to be able to hide data from perception robustly. Every year researchers introduce their work and discuss how to make these techniques more and more robust against different types of attacks. In this article, we present an improved audio steganography approach that reduces distortion of the stego audio. Using the proposed algorithm, secret information is strongly protected from hackers and sent to its destination in a safe manner.  相似文献   

13.
《成像科学杂志》2013,61(7):378-388
Abstract

A low bit rate information hiding scheme is important for efficient communication. According to our observation, in a search order coding based (SOC based) hiding method, the case distribution generated from different images and from different secret strings is different. Based on this characteristic, we designed a dynamic selective, SOC based, information hiding scheme to achieve a desirable compression effect. That is, depending on different case distributions, we used different coding modes to reduce the bit rate more effectively. The main concept of our design is to let the two cases that occur most frequently use one-bit indicators and to let the remaining two cases use four-bit indicators to indicate the following coding types. The experimental results showed that the proposed scheme has a lower bit rate than other SOC based information hiding schemes. As a result, the proposed information hiding scheme is more practical for real world applications.  相似文献   

14.
《成像科学杂志》2013,61(2):195-203
Abstract

In this paper, we propose two reversible information hiding schemes based on side-match vector quantisation (SMVQ). In 2006, Chang et al. proposed a data-hiding scheme based on SMVQ coding. In order to increase both the image quality and the embedding capacity, we improve their method by embedding multiple secret bits into a block and finding out the second selected codeword from the full codebook. In addition, we propose another reversible information hiding scheme whose output is a pure VQ index table. The weighted bipartite graph is used to model our scheme and the matching approach is used to find out the best solution. Compared with Chang et al.’s scheme, we have higher visual quality in the experimental results.  相似文献   

15.
黄清龙  刘建岚  陈瑾 《光电工程》2007,34(9):35-40,77
提出了一种新的基于多重菲涅耳衍射变换和像素替代的盲信息隐藏算法.需隐藏的图像经多重菲涅耳衍射变换为一密文复矩阵,然后将其实部和虚部分别嵌入到原始宿主图像中,同时将此已嵌入信息的原像素值用其近邻的未嵌入信息的像素均值来替代,从而实现盲信息隐藏.数值仿真计算结果表明:该隐藏算法对JPEG有损压缩、图像剪切,噪声污染、重采样攻击和亮度、对比度、直方图、灰度曲线调整等具有一定的抵抗能力;由于采用一系列加密密钥(光波长、透镜焦距,多个衍射距离等),只有当所有密钥都正确时,才能解密恢复所隐藏的信息,所以该算法具有较强的鲁棒性和很高的安全性.  相似文献   

16.
In this paper, we propose a robust information hiding scheme such that the secret information is restorable upon cover image tampering. The secret information is first translated into a binary image, and then the binary image is encoded into an ‘index table’ via Vector Quantisation (VQ). Without noticeable damage to image quality, the secret information codes (VQ index table of secret information) are hidden repeatedly into the cover image. Using our proposed scheme, the extracted secret codes can be almost completely restored to their original state even when the cover image has been tampered with. Experimental results show that our proposed scheme restores the secret information perfectly under many types of tampering attacks.  相似文献   

17.
18.
王让定  陈金儿 《光电工程》2004,31(12):68-71
提出了量化 MCLT 变换系数的音频数字水印盲检新算法。嵌入的水印为视觉可辨的二值标志图像,对水印降维处理后,利用密钥通过 PN 序列发生器产生的伪随机序列调制水印信息,然后通过量化 MCLT 系数的方法将其嵌入音频中。通过大量实验,得到了决定水印鲁棒性和不可感知性的量化参数选择上限。实验结果表明,该算法对所嵌水印的音频质量未见降低,对信号处理和随机裁剪型的攻击具有很高的鲁棒性。  相似文献   

19.
Execution of a complex product development project is facilitated through its decomposition into an interrelated set of localized development tasks. When a local task is completed, its output is integrated through an iterative cycle of system-wide integration activities. Integration is often accompanied by inadvertent information hiding due to the asynchronous information exchanges. We show that information hiding leads to persistent recurrence of problems (termed the design churn effect) such that progress oscillates between being on schedule and falling behind. The oscillatory nature of the PD process confounds progress measurement and makes it difficult to judge whether the project is on schedule or slipping. We develop a dynamic model of work transformation to derive conditions under which churn is observed as an unintended consequence of information hiding due to local and system task decomposition. We illustrate these conditions with a case example from an automotive development project and discuss strategies to mitigate design churn.
Ali YassineEmail: Phone: 217-333-8765Fax: 217-244-6165
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号