首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
基于信道编码的信息隐藏技术研究   总被引:2,自引:0,他引:2  
研究了一种新颖的利用信道编码作为载体的信息隐藏技术,给出了基于信道编码的信息隐藏技术的具体实现方案。实验仿真了基于BCH码、RS码和卷积码的信息隐藏方案,并对实验数据进行了分析。仿真结果表明基于信道编码的信息隐藏技术具有较好的不可检测性和较高的安全性。  相似文献   

2.
不同于传统的失真补偿量化索引调制,该文提出了动态失真补偿量化索引调制的概念。两者的区别在于量化步长和失真补偿参数是否可变。首先推导出动态失真补偿量化索引调制可逆性的成立条件,然后推导出失真补偿参数的可允许范围,最后利用可逆性设计一个具体的可逆数据隐藏算法。在只执行一遍时,它的数据隐藏率高达1 bit每像素,高于其他可逆数据隐藏算法。另外,算法的动态特性有利于防止参数泄露。实验结果表明:不管初始条件如何,该算法既能正确解码出秘密信息,又能准确恢复原始载体。  相似文献   

3.
基于Turbo码的信息隐藏方案研究   总被引:1,自引:1,他引:0  
Turbo码被看作是信道编码理论发展史上的一个里程碑,随着网络和现代通信技术的飞速发展,现代化多媒体信息的安全问题日益突出,与Turbo码相结合的信息隐藏技术的研究受到了人们的关注。首先介绍了Turbo码的编译码结构和原理以及Turbo码的译码算法,然后就Turbo码提出了两种信息隐藏技术方案,通过理论和仿真实验对隐藏方案的性能进行了分析并得出结论。  相似文献   

4.
信息隐藏技术及其应用性能分析   总被引:7,自引:0,他引:7  
近年来,随着网络和多媒体技术的快速发展,信息隐藏技术已经成为信息安全领域的一个研究热点一首先综述了信息隐藏的基本概念和原理,进而分析了各种信息隐藏技术的典型算法和特点,并结合具体应用领域讨论了隐藏算法的性能,最后指出了信息隐藏算法有待进一步深入研究的方向和可能的解决方法.  相似文献   

5.
信息隐藏理论与关键技术研究   总被引:8,自引:0,他引:8  
本项目主要研究了信息隐藏的基本模型,在数字图像、音频、视频、文本中的信息隐藏和数字水印算法,以及信息隐藏检测的基本方法.  相似文献   

6.
信道信息隐藏中秘密信息的预处理研究   总被引:3,自引:0,他引:3  
文章研究了基于信道编码的信息隐藏技术,提出了新的秘密信息预处理方法—采用RS码M公钥密码体制对秘密信息进行编码。理论分析和实际计算表明,该方法能够极大地提高秘密信息的安全性。  相似文献   

7.
数字图像信息隐藏技术研究   总被引:2,自引:0,他引:2  
阐述了信息隐藏的基本概念及其与信息加密的区别,给出了用数字图像作为掩护媒体的信息隐藏算法,为了提高信息隐藏的安全性,引入了混沌序列对秘密信息进行加密的方法,实验结果表明,算法很好的实现了信息隐藏功能。  相似文献   

8.
信息隐藏与数字水印技术及其应用   总被引:4,自引:0,他引:4  
介绍了信息隐藏的概念和基本原理,阐明了数字水印的分类和对数字水印的要求,说明了数字水印嵌入和检测的基本原理,简要分析了Cox提出的水印技术。最后列举了数字水印在现实中的应用,介绍了对数字水印常见的几类攻击方法。  相似文献   

9.
信息隐藏技术及其应用   总被引:12,自引:0,他引:12  
随着数字化和网络化的飞速发展,数字信息隐藏技术成为当前信息科学领域研究的热点,而其中数字水印是当前研究最为活跃的一个分支。因此对信息隐藏系统的基本模型、基本特性、算法实现、应用领域及研究动态进行了介绍。  相似文献   

10.
文章介绍了卫星电视的数字化传输技术,重点介绍其中的数字信道编码和调制技术,内容包括扰码、RS编码、交织编码、卷积编码和QPSK调制技术,及其相应的接收技术。  相似文献   

11.
针对普通的一级秘密信息隐藏的方法具有安全性低,视觉效果差的问题,本文提出了一种多级别信息隐藏的方法.该方法使一级秘密信息在一级密钥作用下成为宿主图像,提高了信息隐藏的安全性,再将宿主图像分成3×3的图像块,在二级密钥的控制下成功将二级秘密信息嵌入.采用图像置乱和LSB算法的结合方法,并在两级秘密信息的作用下,使得载密图...  相似文献   

12.
Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of “set 1” and “set 0” for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on “1” boundary, it comes by set 1 operation. If it lies on “0” boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference.  相似文献   

13.
In this paper, a simple and practical system based on a switched diversity scheme with adaptive modulation is presented. This system provides a reduced number of channel estimation while offering the optimum spectral efficiency given by a selection diversity system. In addition, the switching threshold is easily manipulated so as to make an efficient use of the tradeoff between spectral efficiency and channel estimation overhead. An extension of switched diversity into a multiuser scheduling is later also considered. This switch-based multiuser access scheme results in a lower average feedback load than that for the optimal selection-based multiuser scheme. Numerical results show that we can obtain a trade-off between spectral efficiency and the feedback load by choosing the switching threshold appropriately.  相似文献   

14.
基于DCT域QIM的音频信息伪装算法   总被引:1,自引:0,他引:1  
音频与图像相比具有信息冗余大、随机性强的特点,在音频中实现无误码的信息提取的难度更大.提出一种基于DCT域QIM(quantization index modulation)的音频信息伪装算法,算法特点如下:应用QIM原理,以量化的方式嵌入信息,根据量化区间与信息比特的映射关系提取信息,可实现盲提取;采用改进的QIM方案,针对信息提取的误码,在嵌入端与提取端进行容错处理,保证了隐藏信息的强顽健性;隐藏容量大,可达357.6biffs.实验表明,算法与传统QIM方法相比具有更好的不可感知性,100%嵌入的载密音频的信噪比在30dB以上,并且对于MP3压缩、重量化、重采样、低通滤波等攻击具有很强的顽健性,同时算法运算量小,易于实现,实用性强.  相似文献   

15.
High Efficiency Video Coding (HEVC) is well-known as an internationally popular video coding standard, and HEVC-based steganography has received increasing attention. In this paper, a new adaptive HEVC video information hiding method based on Prediction Unit (PU) partition mode and double-layer embedding strategy is proposed. Double-layer embedding is a method to complete the first-layer embedding using the mapping rules of PU partition mode, and to perform the second-layer embedding after the first-layer embedding. The cost assignment function designed in this paper can accurately evaluate the second-layer data embedding distortion. The frame position, motion properties and block size of PU are taken into consideration for the second-layer data embedding, and the syndrome-trellis codes (STCs) are used to minimize the embedding distortion. Experimental results show that the proposed adaptive double-layer embedding algorithm has better embedding efficiency and less embedding distortion in most cases.  相似文献   

16.
一种针对BMP格式图像的LSB数字隐藏方法   总被引:1,自引:0,他引:1  
介绍了一种针对BMP格式图像的数字隐藏方法。该方法对图像LSB(Lest Significant Bit) 平面进行随机嵌入。具有良好的隐蔽性,非法用户从载密图片中很难恢复出隐藏信息,可用于保密通信中。  相似文献   

17.
A new hybrid compression and data hiding scheme based on quantisation index modulation and lattice vector quantisation is presented. The design of an appropriate vector dead zone and an adapted indexing technique makes this hybrid quantisation strategy very efficient, particularly in the field of image compression using wavelet transform.  相似文献   

18.
Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable 6G network. However, Simultaneous Wireless Information and Power Transfer (SWIPT) in the same RF bands is challenging. The majority of previous studies compared SWIPT performance to Gaussian signaling with an infinite alphabet, which is impossible to implement in any realistic communication system. In contrast, we study the SWIPT system in a well-known Nakagami-m wireless fading channel using practical modulation techniques with finite alphabet. The attainable rate-energy-reliability tradeoff and the corresponding rationale are revealed for fixed modulation schemes. Furthermore, an adaptive modulation-based transceiver is provided for further expanding the attainable rate-energy-reliability region based on various SWIPT performances of different modulation schemes. The modulation switching thresholds and transmit power allocation at the SWIPT transmitter and the power splitting ratios at the SWIPT receiver are jointly optimized to maximize the attainable spectrum efficiency of wireless information transfer while satisfying the WPT requirement and the instantaneous and average BER constraints. Numerical results demonstrate the SWIPT performance of various fixed modulation schemes in different fading conditions. The advantage of the adaptive modulation-based SWIPT transceiver is validated.  相似文献   

19.
给出了一个W^(L)矩阵,及相关的性质,并在此基础上,提出了一种新的数据嵌入方法,可在(2L+1)bit宿主信息中,嵌入2L bit数据而最多只需要修改L bit宿主信息。这种方法,有较大的数据嵌入率,且对宿主信息的改变也较少,比较适用于大信息量,特别是流媒体数据的隐藏及隐秘传输。  相似文献   

20.
谭伟杰 《信息技术》2007,31(12):125-127
信息隐匿技术是信息安全研究的一个新领域,为了确保隐匿信息安全,研究了一种利用压缩编码作为载体的信息隐藏技术,给出了基于压缩编码思想的通用信息隐匿模型的具体实现方案。讨论了该模型的两种关键技术:数据变换和数据选择技术。运用文中所给的通用模型,通过实验得出图像嵌入量和图像质量的关系。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号