首页 | 本学科首页   官方微博 | 高级检索  
     

基于迭代混合的数字图像隐藏技术
引用本文:张贵仓,王让定,章毓晋.基于迭代混合的数字图像隐藏技术[J].计算机学报,2003,26(5):569-574.
作者姓名:张贵仓  王让定  章毓晋
作者单位:1. 西北师范大学信息与计算科学系,兰州,730070
2. 宁波大学信息学院,宁波,315211
3. 清华大学电子工程系,北京,100084
基金项目:西北师范大学“知识与科技创新工程”项目 (NWNU KJCXGC 0 2 13 ),浙江省创新项目 (ZJZSCX 0 2 11 2 4)资助
摘    要:提出了数字图像的单幅迭代混合和多幅迭代混合思想.利用图像的迭代混合可以将一幅图像隐藏于另一幅图像之中,多幅迭代混合可将一幅图像通过一组图像隐藏起来,迭代混合参数还可以作为隐藏图像的密钥,极大地提高了系统的安全性和隐藏图像的健壮性,图像迭代混合思想还可以应用到数字水印的研究与应用中.实验分析显示,该方法简单易行,并且算法具有一定程度的鲁棒性.

关 键 词:数字图像隐藏技术  迭代混合  数字水印  图像处理  信息隐藏
修稿时间:2002年1月15日

Digital Image Information Hiding Technology Based on Iterative Blending
ZHANG Gui-Cang,WANG Rang-Ding,ZHANG Yu-Jin.Digital Image Information Hiding Technology Based on Iterative Blending[J].Chinese Journal of Computers,2003,26(5):569-574.
Authors:ZHANG Gui-Cang  WANG Rang-Ding  ZHANG Yu-Jin
Affiliation:ZHANG Gui-Cang 1) WANG Rang-Ding 2) ZHANG Yu-Jin 3) 1)
Abstract:The digital image blending is introduced, and the single iterative digital image blending and multiple iterative digital image blending are firstly proposed. With the digital image iterative blending, new kinds of digital image information hiding schemes are presented. Firstly, with the single iterative image blending, a secret image can be hidden in one carrier image, a self-adaptive image hiding algorithm is obtained. The carrier image and the blending parameter can act as the private keys. But, if a malicious attacker get the carrier image and the blending image, it is totally possible for him to recover the secret image. So authors developed the multiple iterative image blending, with which a secret image can be hidden in one carrier image through many images. An image hiding algorithm is obtained. The blending images and the blending parameters and the sequences of the images blended can act as the private keys. It is impossible for an attacker to get all the blending images and the blending parameters, even if the attacker get all the blending images and parameters, he still can not recover the secret image due to the lack of the processes of the blending. Furthermore, the single iterative image blending scheme and the multiple iterative image blending scheme can be used together, which could much more enhance the security and robustness of the hidden image. In order to even more enhance the security and robustness of the hidden image , the scrambling technology can be used as pre-process and post-process of digital image information hiding. The examples show that the schemes can be expediently realized and they are robust in some extent. The techniques also can be used in digital watermarking and other digital application areas.
Keywords:digital image  information hiding  blending  iteration  digital watermarking
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号