首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Steganography is a technique that conceals secret data into a cover medium for delivering secret data over public computer networks. Reversible data hiding schemes not only can achieve secret data delivery, but also can restore the cover medium. Histogram shifting is one of the most popular reversible data hiding techniques. Luo et al. presented a reversible data hiding technique that shifts the histogram of prediction error. But the embedding payload of Luo et al.'s method can further be improved. The proposed method uses a difference segmentation strategy and pseudo pixel generation to increase the height of peak in the prediction error histogram. The experimental results show that the embedding payload of the proposed method is higher than that of Luo et al.'s method.  相似文献   

2.
几种图像数据隐藏方法的比较研究   总被引:4,自引:0,他引:4  
金聪  彭嘉雄 《信号处理》2004,20(2):127-132
近年来,图像数据隐藏技术得到了突飞猛进的发展,得到了很多鼓舞人心的成果。在图像隐藏技术中,使用最多的图像嵌入规则有三种:加法嵌入规则、乘法嵌入规则以及基于融合技术的图像嵌入规则。本文对这三种图像嵌入规则的性能进行了分析和研究,通过比较我们发现,如果将图像隐藏过程看作是一个水印信道模型,则基于融合技术的图像嵌入规则所能隐藏的信息量远远高于另两种嵌入规则,而乘法嵌入规则其水印信道容量不受原始图像DCT系数标准差变化的影响,因此,在原始图像DCT系数标准差不稳定的情况下,采用乘法嵌入规则是一个好的选择。  相似文献   

3.
基于大数据环境的多模态信息隐藏新体系   总被引:1,自引:0,他引:1       下载免费PDF全文
信息隐藏研究经过数十年的发展,在隐写术和隐写检测方面都积累了大量成果,但是信息隐藏的应用目前仍局限于实验室研究,聚焦于发现与抗发现的对抗,距实际应用仍有一定的距离.论文在对当前信息隐藏研究深入分析的基础上,借鉴密码学思想,提出建立适应于当前大数据环境,算法可变、修改模式可控的抗取证信息隐藏系统;通过全面整合信息隐藏算法和嵌入修改模式,构建多模态信息隐藏技术空间,实现用户通过输入密钥参与信息隐藏处理控制的全新研究思路和应用方式.论文通过理论分析和实验初步验证该系统的有效性和安全性.  相似文献   

4.
This paper presents a model‐based image steganography method based on Watson's visual model. Model‐based steganography assumes a model for cover image statistics. This approach, however, has some weaknesses, including perceptual detectability. We propose to use Watson's visual model to improve perceptual undetectability of model‐based steganography. The proposed method prevents visually perceptible changes during embedding. First, the maximum acceptable change in each discrete cosine transform coefficient is extracted based on Watson's visual model. Then, a model is fitted to a low‐precision histogram of such coefficients and the message bits are encoded to this model. Finally, the encoded message bits are embedded in those coefficients whose maximum possible changes are visually imperceptible. Experimental results show that changes resulting from the proposed method are perceptually undetectable, whereas model‐based steganography retains perceptually detectable changes. This perceptual undetectability is achieved while the perceptual quality — based on the structural similarity measure — and the security — based on two steganalysis methods — do not show any significant changes.  相似文献   

5.
提出了一种基于二维DCT变换的图像信息隐藏方法,经过二维DCT变换后的图像能量集中在低频部分,考虑到人眼的视觉特性,图像的高频部分可视为视觉冗余部分,可以把有用信息隐藏在变换载体图像的高频部分,即以牺牲图像高频信息来达到信息隐藏的效果,通过MATLAB实现这一思想,对隐藏后的图像质量做了特征分析,并对下一步实验做出了设想.  相似文献   

6.
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better hiding capacity with high ability of resisting security analysis.  相似文献   

7.
A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.  相似文献   

8.
真彩色图像隐藏与恢复   总被引:4,自引:0,他引:4  
基于信息隐藏技术和图像处理技术,提出了一种24位真彩色图像隐藏与恢复的技术,该技术将一幅待保密的24位真彩色图像隐藏到另一幅任意选取的足够大,可以公开的24位真彩色图像中,而且根据所生成的图像和选择载体图像还可无失真地恢复出原保密图像。  相似文献   

9.
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed method has a good performance in both hiding capacity and decrypted image quality.  相似文献   

10.
基于图像融合的数字图像隐藏技术   总被引:1,自引:1,他引:1  
在图像融合方法的基础上,给出了针对不同大小图像的数字图像隐藏的方法,在图像融合过程中,用改进的混沌序列来代替融合参数,使得该方法具有很好的安全性。实验表明,该方法具有较好的效率和安全性。  相似文献   

11.
信息隐藏技术对于版权保护和通信保密非常重要。论文将信息隐藏技术用于实现语音安全通信,对语音安全通信的一种新方法——语音回声隐藏技术进行分析和研究,给出了实现该技术的系统方案,并进行仿真和分析,从人耳听觉特性具体要求的角度讨论了该系统的实现细节。  相似文献   

12.
基于位运算的数字图像隐藏技术   总被引:1,自引:0,他引:1  
为了能够实现对数字图像内容信息的有效保护,文章结合基于混沌系统的数字图像加密算法,给出了一种基于位运算的数字图像隐藏技术。实验结果表明,该算法具有较好的隐藏效果和恢复效果,结合混沌加密算法,能实现对数字图像内容信息的有效保护。  相似文献   

13.
基于XML语言的文本隐藏方法研究   总被引:1,自引:0,他引:1  
在分析XML文档语法结构的基础上,提出了几种新的基于XML语言的文本信息隐藏方法.根据已有的XML文档信息隐藏方法,对网上典型的XML文档的信息隐藏容量进行了统计.结果表明,XML文档的隐藏率超过0.7%,在512 kbit/s的文本流中隐藏一路2.4~3.2 kbit/s的数据流是可能的.  相似文献   

14.
阐述了信息隐藏技术的基本原理、信息隐藏系统的一般模型和设计要求,分析了信息隐藏技术的两个主要分支——隐写术和数字水印对性能指标的不同要求,探讨了以数字图像作为载体的隐藏算法的实现方法,以及信息隐藏技术在通信保密和版权保护等方面的应用。  相似文献   

15.
为了增强图像隐藏的安全性,文章在传统的数字图像隐藏方法的基础上,结合混沌序列和图像加密技术,提出了一种改进的图像隐藏方法。首先应用混沌系统的产生混沌序列,用混沌序列来替换图像的隐藏参数进行图像隐藏,然后对隐藏的结果图像做进一步处理,包括行列双向异或置乱和图像像素置乱。实验结果表明,该方法具有较好的安全性,较高的加密效率,能够有效抵抗已知明文攻击。  相似文献   

16.
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments.  相似文献   

17.
基于代码搬移的PE文件信息隐藏   总被引:2,自引:0,他引:2  
朱天明  刘嘉勇 《通信技术》2010,43(8):184-186
根据PE文件代码段的结构特点,对代码段子程序进行了分析,提出了将子程序进行搬移,而将信息隐藏到原来子程序位置处的信息隐藏方案。该方案将信息隐藏在代码段代码之中,使隐藏信息和PE文件原有数据紧密结合。隐藏后信息分散在PE文件各个位置,具有很高的隐蔽性,不易被察觉。和已有的一些方案相比,该方案通过提高隐藏信息的分散性增强了信息的隐蔽性,通过对隐藏信息进行加密,增强了信息的安全性。  相似文献   

18.
Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et al.'s scheme. The experiment result of the proposed scheme compared with that of the Wang et al.'s scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average.  相似文献   

19.
不同于传统的失真补偿量化索引调制,该文提出了动态失真补偿量化索引调制的概念。两者的区别在于量化步长和失真补偿参数是否可变。首先推导出动态失真补偿量化索引调制可逆性的成立条件,然后推导出失真补偿参数的可允许范围,最后利用可逆性设计一个具体的可逆数据隐藏算法。在只执行一遍时,它的数据隐藏率高达1 bit每像素,高于其他可逆数据隐藏算法。另外,算法的动态特性有利于防止参数泄露。实验结果表明:不管初始条件如何,该算法既能正确解码出秘密信息,又能准确恢复原始载体。  相似文献   

20.
论文介绍了文本信息隐藏技术、Div CSS结构文档重构技术。研究并分析了在基于Web标准的Div CSS文档中嵌入和提取隐藏信息的方法,并针对存在的问题,提出了进一步改进的方法和意见。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号