首页 | 本学科首页   官方微博 | 高级检索  
     

数字隐写模型及形式化描述
引用本文:宋海涛,汤光明,孙怡峰,王洋. 数字隐写模型及形式化描述[J]. 网络与信息安全学报, 2020, 6(3): 59-65. DOI: 10.11959/j.issn.2096-109x.2020036
作者姓名:宋海涛  汤光明  孙怡峰  王洋
作者单位:信息工程大学,河南 郑州 450001
基金项目:国家自然科学基金(61601517)
摘    要:为了使数字隐写模型研究与隐写技术研究同步发展,从通用到具体,依次提出3个数字隐写模型,并对各模型进行形式化描述,总结梳理隐写算法的本质原理,以指导隐写技术的进一步发展。首先,针对已有模型无法描述新兴隐写算法的问题,提出一个通用数字隐写模型,以描述当前所有隐写算法;其次,鉴于载体修改式的隐写算法在隐写术研究中的重要地位,提出基于载体修改的加性噪声隐写模型;然后,针对当前主流的图像自适应隐写算法,提出具体的最小化失真的数字图像自适应隐写模型。选取4个典型的隐写算法实例,采用所提隐写模型进行对应描述,以验证所提模型的有效性。

关 键 词:隐写术  隐写模型  通用隐写模型  载体修改式隐写模型  自适应隐写模型

Digital steganography model and its formal description
Haitao SONG,Guangming TANG,Yifeng SUN,Yang WANG. Digital steganography model and its formal description[J]. Chinese Journal of Network and Information Security, 2020, 6(3): 59-65. DOI: 10.11959/j.issn.2096-109x.2020036
Authors:Haitao SONG  Guangming TANG  Yifeng SUN  Yang WANG
Affiliation:Information Engineering University,Zhengzhou 450001,China
Abstract:In order to make the research of digital steganography model develop synchronously with steganography research,three digital steganography models from general to specific are proposed,and each model was formalized.Through study on digital model,the essential principles of steganography algorithm were summarized to guide the further development of steganography.Firstly,aiming at the problem that the existing model cannot describe the emerging steganography algorithms,a general digital steganography model was proposed to describe nearly all steganography algorithms.Secondly,in view of the important position of the cover modification steganography algorithm in the research of steganography,a cover-modification digital steganography model was proposed.Then,for the current mainstream image adaptive steganography algorithm,a digital image adaptive steganography model with minimal distortion was proposed.Four typical steganography algorithm were selected as examples which were described by the proposed steganography model to validate the effectiveness of the proposed model.
Keywords:steganography  steganography model  general steganography model  cover-modification steganography model  adaptive steganography model  
本文献已被 维普 等数据库收录!
点击此处可从《网络与信息安全学报》浏览原始摘要信息
点击此处可从《网络与信息安全学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号