首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
为了使信息隐藏算法在经受有损压缩后仍能可靠地提取嵌入的信息,提出一种信息隐藏和MPEG-2压缩编解码器一体化的方法。根据压缩程度和宿主内容,结合HVS约束、隐藏容量的需求及有损压缩失真影响等因素,利用MPEG-2压缩的控制参数调整信息隐藏的强度和数据量,从而自适应实现视觉质量、内嵌容量和鲁棒性等参数的折中。实验结果表明,该算法除了能抵抗较强的有损压缩外,对常见攻击,如低通滤波、噪声干扰、帧丢失以及转码等也具有鲁棒性,是一种在MPEG-2有损压缩框架下,用灵活的折中机制来隐藏和准确提取信息的有效的鲁棒信息隐藏算法。  相似文献   

2.
3.

Steganography has been a great interest since long time ago. There are a lot of methods that have been widely used since long past. Recently, there has been a growing interest in the use of sparse representation in signal processing. Sparse representation can efficiently model signals in different applications to facilitate processing. Much of the previous work was focused on image and audio sparse representation for steganography. In this paper, a new steganography scheme based on video sparse representation (VSR) is proposed. To exploit proper dictionary, KSVD algorithm is applied to DCT coefficients of Y component related to video (cover) frames. Both I and Q components of video frames are used for secure message insertion. The aim is to hide secret messages into non-zero coefficients of sparse representation of DCT called, I and Q video frames. Several experiments are performed to evaluate the performance of the proposed algorithm, in case of some metrics such as pick signal to noise ratio (PSNR), the hiding ratio (HR), bit error rate (BER) and similarity (Sim) of secret message, and also runtime. The simulation results show that the proposed method exhibits appropriate invisibility and robustness.

  相似文献   

4.
Multimedia Tools and Applications - In recent steganographic literature, video steganography becomes popular due to its capability of accommodating higher payload. Since the video is transmitted...  相似文献   

5.
Digital steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of digital steganography technology and its implications. Equally important are the ethical concerns of using steganography and steganalysis. Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden. Likewise, steganography is not about keeping your message from being known - it's about keeping its existence from being known  相似文献   

6.
Chen  Yi  Wang  Hongxia  Wu  Hanzhou  Liu  Yong 《Multimedia Tools and Applications》2019,78(16):23097-23115
Multimedia Tools and Applications - H.264/Advanced Video Coding (AVC) is one of the most commonly used video compression standard currently. In this paper, we propose a Reversible Data Hiding (RDH)...  相似文献   

7.
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.  相似文献   

8.

In this paper, a framework to hide privacy in video is proposed based on data hiding principals. A novel data hiding technique is proposed and implemented to hide the original frame into the in-painted one. The proposed hiding technique is carried out in the discrete wavelet transform domain of the cover video. The proposed technique is embedding video into video. Furthermore, the proposed data hiding method can blindly reconstruct the original frame from the fake one. Experimental results showed that the proposed method can successfully hide the complete frames of the original video into their corresponding in-painted ones that are as large as themselves. Simple visual inspection of the results showed that the quality of the stego-frames maintain very high (above 45 dB) while providing an acceptable visual quality for the retrieved original frames.

  相似文献   

9.
针对开放环境中秘密通信的安全性问题,提出一种基于信息隐藏技术的秘密通信方案。首先,将信息明文用私钥加密,然后将密文以数字水印的形式嵌入到载体数据库中,通过开放网络传送。接收者需要从载体数据库中提取信息密文,再用发送方的公钥解密。给出了秘密通信的系统模型以及相应的信息嵌入、提取算法。实验和分析表明该模型隐蔽性强、安全性好,有一定的实用性和可扩展性。  相似文献   

10.
11.

Data hiding in video is a method used to hide secret information within the video which is useful for secure multimedia data communication. The main goal of any video steganographic system is to reduce distortion of video and to secure the embedded data. A novel approach of hiding data using Oppositional Grey Wolf Optimization (OGWO) is proposed to minimize distortion and to enhance security so as to get superior video quality. In this work, scene changes are used to identify the key frames to hide the secret data. The scene changes are detected using Discrete Cosine Transform (DCT). Once the key frames are detected, OGWO is used at this stage to select the optimal region to embed the secret data. Lastly, the optimal region for entrenching is construed to embed the secret data using Discrete Wavelet Transform (DWT). Then, the payload and video are normalized using Inverse DWT to boost the video quality. The performance of the proposed system is measured using Peak Signal to Noise Ratio (PSNR), Embedding Capacity and Normalized Correlation (NC). The comparison results show that the proposed method delivers more security and minimizes distortions for improved video quality.

  相似文献   

12.
Innovations in Systems and Software Engineering - Video steganography is the method of hiding the presence of data within the cover video. In this paper, a novel video steganography technique is...  相似文献   

13.
为了更好地增强加密通信的安全性和鲁棒性,提出一种基于整数小波变换(IWT)和最低有效位(LSB)替换的视频隐写算法,该算法可以对红绿蓝(RGB)三色构成的视频文件进行数据隐藏和提取。隐写过程首先将覆盖视频划分为8×8的RGB图像块,加密数据转化为二进制形式的文本;然后在覆盖视频上执行Haar IWT以获取IWT系数;最后,将二进制文本嵌入到IWT系数的LSBs中。其中数据隐藏的反向过程用于提取隐写视频中的嵌入文本。采用音频视频交错(AVI)文件执行本文算法,实验结果表明,本算法的失真最低。  相似文献   

14.
In this research, we consider exploiting the large volume of audio/video data streams in compressed video clips/files for effective steganography. By observing that most of the distributed video files employ H.264 Advanced Video Coding (AVC) and MPEG Advanced Audio Coding (AAC) for video/audio compression, we examine the coding features in these data streams to determine appropriate data for modification so that the reliable high-volume information hiding can be achieved. Such issues as the perceptual quality, compressed bit-stream length, payload of embedding, effectiveness of extraction and efficiency of execution will be taken into consideration. First, the effects of using different coding features are investigated separately and three embedding profiles, i.e. High, Medium and Low, which indicate the amount of payload, will then be presented. The High profile is used to embed the maximum amount of hidden information when the high payload is the only major concern in the target application. The Medium profile is recommended since it is designed to achieve a good balance among several requirements. The Low profile is an efficient implementation for faster information embedding. The performances of these three profiles are reported and the suggested Medium profile can hide more than 10% of the compressed video file size in common Flash Video (FLV) files.  相似文献   

15.
Techniques for text data hiding are different from image data hiding, video data hiding and audio data hiding. To break through the difficulty of text data hiding, Sun, Lou and Huang proposed a novel Chinese text data hiding scheme called the L-R scheme. In the L-R scheme, Sun et al. embedded secrets into Chinese characters that can be divided into left and right components. This paper describes how our proposed scheme extends the component concept to incorporate the up and down components of Chinese characters rather than the left and right components only, to significantly enhance hiding capacity. In addition, this paper adds a reversible function to Sun et al.’s L-R scheme to make it possible for receivers to obtain the original cover text and use it repeatedly for later transmission of secrets after the initial hidden secrets have been extracted. Finally, the extended scheme simplifies the extracting procedure and efficiently reduces the memory required on the receiver side during the secret extracting phase by using a new comparison method. Experimental results confirm the improved functions offered by the proposed scheme.  相似文献   

16.
17.
杨刚  张敏情  张震 《计算机应用研究》2013,30(11):3411-3413
基于图像在加性隐写模型下隐写前后差分直方图离散傅里叶变换与隐写信息离散傅里叶变换间的对应关系, 从隐写前后差分直方图离散傅里叶变换相角的变化入手, 提取特征, 在理论上加以论证并从实验上得到验证。对UCID V2标准图库进行实验, 结果表明, 本方法对加性隐写模型具有很好的检测效果。  相似文献   

18.
In the digital world, secure data communication has an important role in mass media and Internet technology. With the increase in modern malicious technologies, confidential data are exposed at a greater risk during data communication. For secured communication, recent technologies and the Internet have introduced steganography, a new way to hide data. Steganography is the growing practice of concealing data in multimedia files for secure data transfer. Nowadays, videos are more commonly chosen as cover media than other multimedia files because of the moving sequence of images and audio files. Despite its popularity, video steganography faces a significant challenge, which is a lack of a fast retrieval system of the hidden data. This study proposes a novel video steganography technique in which an enhanced hidden Markov model (EHMM) is employed to improve the speed of retrieving hidden data. EHMM mathematical formulations are used to enhance the speed of embedding and extracting secret data. The data embedding and retrieving operations were performed using the conditional states and the state transition dynamics between the video frames. The proposed EHMM is extensively evaluated using three benchmark functions, and experimental evaluations are conducted to test the speed of data retrieval using differently sized cover-videos. Results indicate that the proposed EHMM yields better results by reducing the data hiding time by 3–50%, improving the data retrieval rate by 22–77% with a minimum computational cost of 20–91%, and improving the security by 4–77% compared with state-of-the-art methods.  相似文献   

19.
20.
It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号