排序方式: 共有163条查询结果,搜索用时 125 毫秒
1.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods. 相似文献
2.
Currently, few general methods have been suggested to quantitate the imperceptibility among var- ious hiding algorithms. Especially, it is a challenge to quantitate the imperceptibility of the hiding-vector, which is consisted of orthogonal hiding algorithms in the multi- dimensional hiding space. In this paper, a novel model of general imperceptibility quantitation was proposed. Ac- cording to this model, a quantitation method based on the relative entropy was designed. It is proved under this quantitation method that there exists the global maximal imperceptibility for any specified hiding-vector capacity. An optimization algorithm was proposed to approach this maximum by adjusting the allocation of secret message into each components of the hiding-vector. Experiments with VoIP and bitmap multi-dimensional hiding space validated the effectiveness of the designed quantitation method and the proposed optimization algorithm. 相似文献
3.
Most of the real-world signals we encounter in real-life applications have low information content. In other words, these signals can be well approximated by sparse signals in a proper basis. Compressive sensing framework uses this fact and attempts to represent signals by using far fewer measurements as compared to conventional acquisition systems. While the CS acquisition is linear, the reconstruction of the signal from its sparse samples is nonlinear and complex. The sparse nature of the signal allows enough room for some additional data sequence to be inserted and exactly recovered along with the reconstructed signal. In this study, we propose to linearly embed and hide data in compressively sensed signals and nonlinearly reconstruct both of them using a deflationary approach. We investigate the embedding capacity as a function of signal sparsity and signal compression, as well as the noise sensitivity of the proposed algorithm. 相似文献
4.
5.
This paper presents an active steganalysis technique for echo hiding (EH). This approach can differentiate stego audios (with hidden message) from nature ones (without hidden message), and then extract sequential EH messages in stego audios without prior knowledge about the EH technique. The procedure of this algorithm can be simplified as follows: (i) Sliding Windowed Cepstrum (SWC) is obtained by employing a Sliding Window (SW) to move over the audio signal sample by sample. (ii) The echo detector is designed based on statistical analysis of the Cepstrum Peak Location Aggregation Degree (CPLAD). (iii) For stego signals, both echo delay and the range of segment length are estimated by exploring the changing rule of the SWC. (iv) The accurate estimation of segment length and synchronism position is acquired by the grid search algorithm. (v) Finally, the binary secret message can be extracted using the estimated parameters in the previous steps. The proposed method has been implemented and tested to extract the message which is embedded into audio clips by using EH techniques with different kernels. The experimental results show that the accuracy of extraction is no less than 90% when attenuation is greater than 0.45. 相似文献
6.
7.
针对自适应空域隐写术设计的关键问题,该文结合Canny边缘检测和校验格编码(STC)提出一种不需要同步边信息的自适应空域隐写方法.首先,根据秘密消息长度、载体图像等因素确定Canny边缘检测算法中的参数取值,进而根据相应的参数取值使用Canny边缘检测算法来选择载体图像的边缘区域.然后,分别定义边缘区域像素和非边缘区域像素的嵌入失真;最后,在载体像素的多个最低有效位平面(LSB)使用STC嵌入秘密消息.实验结果表明:该隐写方法在4种嵌入率情况下抵抗常见通用隐写分析的性能优于3种已有的隐写方法,且在较小嵌入率情况下与空域通用小波相对失真方法(S-UNIWARD)相当. 相似文献
8.
A novel data hiding scheme based on modulus function 总被引:1,自引:0,他引:1
Chin-Feng Lee Author Vitae Hsing-Ling Chen Author Vitae 《Journal of Systems and Software》2010,83(5):832-843
Four criteria are generally used to evaluate the performance of data hiding scheme: the embedding capacity, the visual quality of the stego-image, the security, and the complexity of the data-embedding algorithm. However, data hiding schemes seldom take all these factors into consideration. This paper proposes a novel data hiding scheme that uses a simple modulus function to address all the performance criteria listed above. According to the input secret keys, the encoder and decoder use the same set-generation functions Hr() and Hc() to first generate two sets Kr and Kc. A variant Cartesian product is then created using Kr and Kc. Each cover pixel then forms a pixel group with its neighboring pixels by exploiting an efficient modulus function; the secret data are then embedded or extracted via a mapping process between the variant of the Cartesian product and each pixel group. The proposed scheme offers several advantages, namely (1) the embedding capacity can be scaled, (2) a good visual quality of the stego-image can be achieved, (3) the computational cost of embedding or extracting the secret data is low and requires little memory space, (4) secret keys are used to protect the secret data and (5) the problem of overflow or underflow does not occur, regardless of the nature of the cover pixels.We tested the performance of the proposed scheme by comparing it with Mielikainen’s and Zhang and Wang’s schemes for gray-scale images. The experimental results showed that our proposed scheme outperforms Mielikainen’s in three respects, namely scalable embedding capacity, embedding rate, and level of security. Our data hiding scheme also achieved a higher embedding capacity than Zhang and Wang’s. The proposed scheme can easily be applied to both gray-scale and color images. Analyses of its performance showed that our proposed scheme outperforms Tsai and Wang’s in terms of its time complexity and memory space requirement. 相似文献
9.
In this paper, we proposed a novel adjustable data hiding method. Our proposed method, which is based on exploiting modification direction (EMD) method, is called the “multi-group exploiting modification direction” method. In the multi-group method, we combine several pixel-groups to embed secret data according to the constructed switch map to simply avoid the conversion redundancy of the EMD method and the spatial redundancy of the section-wise strategy, as well as to efficiently increase the probability of achieving larger embedding capacity. According to the experimental results and mathematical justification, we verified that the multi-group method can achieve higher embedding payload and better visual quality of the image than the EMD method and section-wise strategy for simulated and real secret data. 相似文献
10.