首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - In this paper, we propose a new dual-image based reversible data hiding scheme through (7,4) Hamming code (RDHHC) using shared secret key. A block of seven...  相似文献   

2.
Multimedia Tools and Applications - Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding...  相似文献   

3.
The technique of reversible data hiding recovers the original image from a stego-image without distortion after the hidden data are extracted. A natural image usually contains several smooth areas. The difference between two adjacent pixels has a high probability of being a small value. Therefore, this study proposed a novel reversible data hiding method, Adjacent Pixel Difference (APD), which employs the histogram of the pixel difference sequence to increase the embedding capacity. Experimental results reveal that APD achieves a high embedded capacity and still maintains a high stego-image quality. Furthermore, the stego-image quality and embedded capacity of the APD method outperform those of NSAS, F&S and T&H.  相似文献   

4.
Multimedia Tools and Applications - In this paper, we propose a reversible data hiding scheme using (5, 3) Hamming code. A cover image is partitioned into blocks of five pixels. An adjusted (5, 3)...  相似文献   

5.
提出了一种基于相邻两像素差值的无损数据隐藏算法.只有当相邻两像素的差值为0时才可以隐藏数据,并修改像素的灰度值,当相邻两像素的灰度值不相等时,只修改灰度值不隐藏数据.大量的实验结果表明,隐藏数据后的载体图像的信噪比(PSNR)都在40dB以上,提取出隐藏数据后的载体图像的PSNR为∞,能够将隐藏信息后的载体图像完全恢复.  相似文献   

6.
基于纠错码的信息隐藏及其实现方法   总被引:1,自引:0,他引:1  
信息隐藏是信息安全领域的重要研究内容之一。介绍了基于纠错码的信息隐藏的一般原理,阐述了主要实现方法。针对一种基于纠错码编码冗余的信息隐藏算法框架,给出了以JPEG图像为载体的实现方法,并分析了其特点。最后指出了值得进一步研究的问题。  相似文献   

7.
为提高回声隐藏方法中水印信息的提取效果和准确率,在原始载体基本不变化的基础上加大水印信息的嵌入量,提出了一种使用双向回声核来增加隐藏效果和嵌入量并对水印信息进行BCH编码以利于提高提取准确率的方法,利用功率倒谱方法来确定水印嵌入位置便于增加水印信息的提取率.仿真实验结果表明,该方法算法简单、执行效率高、水印隐藏效果好,在受到恶意攻击后提取出的水印信息的准确率远远高于原方法.  相似文献   

8.
将信息隐藏中的两少一多问题转换为求二值域上变量元数不确定的非齐次线性方程组的最小权值解向量,构建了一个数学模型,对模型进行求解,作为问题模型的解给出了答案模型.解的不惟一性使得能够从解线性方程组入手设计出多种数据隐藏方案,这也是数据隐藏问题用数学思维来解决的一次尝试.给出的解模型在进行信息隐藏时可在长为n bit的宿主数据嵌入[log2 2n]bit的秘密数据,而对宿主数据的修改量平均不到3/2bit.  相似文献   

9.
为保护计算机磁盘上的敏感数据, 提出基于磁盘冗余空间的数据隐藏方法。该方法在分析磁盘分区策略和簇式文件系统的文件管理机制的基础上, 将分散的文件簇冗余空间有机组合以存储敏感数据, 并利用存储于分区策略冗余空间的数据结构来维护恢复原始数据所需数据。实验结果表明, 基于磁盘冗余空间的数据隐藏方法不占用文件系统有效空间, 具有隐蔽性高、系统开销小、隐藏容量与文件系统内部文件总量正相关, 以及抗干扰性易受到宿主文件稳定性影响等特点。此外, 当文件总量较大时, 隐藏容量将十分可观, 而通过选取稳定性强的文件作为宿主文件, 可提高该方法的抗干扰性。  相似文献   

10.
针对多数密文域可逆信息隐藏算法嵌入容量小、加密算法单一的问题,提出一种双重加密的方法,并利用码分多址复用(CDMA)的思想嵌入秘密信息。加密时将图像分块,先对像素块进行多粒度置乱加密,再对块中每个像素的中间2位用流密码加密。信息嵌入采用码分多址的思想,选取k个长为4的相互正交的矩阵嵌入k层秘密信息,利用矩阵的正交性实现秘密信息多层嵌入,在提高嵌入容量的同时保证了对像素点的较小改变。对不满足嵌入条件的像素块嵌入伪比特,可避免使用位置图。拥有信息提取密钥的合法接收者可以提取秘密信息;拥有图像解密密钥可以近似恢复原始图像;拥有两种密钥既可提取秘密信息又可无损恢复原始图像。实验结果表明,512×512灰度图像Lena在峰值信噪比(PSNR)大于36 dB时最大嵌入容量133 313 bit。所提算法增强了加密图像安全性,在保证可逆性的同时大大提高密文域可逆信息隐藏嵌入容量。  相似文献   

11.
Data hiding is to conceal the existence of secret data. A reversible data hiding method can extract the cover image without any distortion from the stego-image after the hidden data have been extracted. This paper proposes a new interpolation and a data hiding method. The proposed scaling-up neighbor mean interpolation method has a low-time complexity and high-calculation speed. The proposed data hiding method is based on interpolation. Comparison on data hiding methods is divided into reversible or not. Our experimental results show the proposed method can embed a large amount of secret data while keeping a very high visual quality, the PSNR is guaranteed to be higher than 35 dB compared with other reversible data hiding methods. And also capacity is larger than any other reversible data hiding methods and comparable to other data hiding methods.  相似文献   

12.
Due to its compact binary codes and efficient search scheme, image hashing method is suitable for large-scale image retrieval. In image hashing methods, Hamming distance is used to measure similarity between two points. For K-bit binary codes, the Hamming distance is an int and bounded by K. Therefore, there are many returned images sharing the same Hamming distances with the query. In this paper, we propose two efficient image ranking methods, which are distance weights based reranking method (DWR) and bit importance based reranking method (BIR). DWR method aim to rerank PCA hash codes. DWR averages Euclidean distance of equal hash bits to these bits with different values, so as to obtain the weights of hash codes. BIR method is suitable for all type of binary codes. Firstly, feedback technology is adopted to detect the importance of each binary bit, and then big weights are assigned to important bits and small weights are assigned to minor bits. The advantage of this proposed method is calculation efficiency. Evaluations on two large-scale image data sets demonstrate the efficacy of our methods.  相似文献   

13.
文章首先介绍了Turbo码的编码结构和用于Turbo码迭代译码的最大后验概率译码算法;然后提出了在几种不同方案下Turbo码的信息隐藏技术,对隐藏信息前后的译码效果进行了理论分析最后通过实验对各种隐藏方案进行性能比较.  相似文献   

14.
文章首先介绍了Turbo码的编码结构和用于Turbo码迭代译码的最大后验概率译码算法;然后提出了在几种不同方案下Turbo码的信息隐藏技术,对隐藏信息前后的译码效果进行了理论分析;最后通过实验对各种隐藏方案进行性能比较。  相似文献   

15.
The VQ-based data hiding technique has not received much attention compared to various spatial domain-based data hiding techniques in digital images. Consequently, a new data hiding scheme, applied in the VQ-compressed domain of cover images, is introduced in this article. To provide more hiding capacity for secret data and to keep an acceptable bit rate for the compressed cover images, the search-order-coding (SOC) algorithm was implemented to compress the VQ indices of the cover images in the process of data hiding. During the process of data hiding, the proposed scheme embeds secret data into the compressed VQ indices of the cover image adaptively, adjusting the bit rate according to the size of the secret data and the compressed cover image. In addition, the hiding process induces no extra coding distortion. Experiments show that the receiver can efficiently receive both the secret data and the compressed cover image simultaneously with an acceptable bit rate. Simulation results also demonstrate that our proposed scheme outperforms earlier proposed methods.  相似文献   

16.
In this paper, three data hiding methods are proposed, based upon properties of DNA sequences. It is highlighted that DNA sequences possess some interesting properties which can be utilized to hide data. These three methods are: the Insertion Method, the Complementary Pair Method and the Substitution Method. For each method, a reference DNA sequence S is selected and the secret message M is incorporated into it so that S is obtained. S is then sent to the receiver and the receiver is able to identify and extract the message M hidden in S. Furthermore, the robustness and the tightly embedded capacity analysis of the three proposed methods are demonstrated. Finally, experimental results indicate a better performance of the proposed methods compared to the performance of the competing methods with respect to several parameters such as capacity, payload and bpn.  相似文献   

17.
Multimedia Tools and Applications - Recently, a reversible data hiding (RDH) scheme based on code division multiplexing (CDM) has been reported, in which secret information and pseudo bits are...  相似文献   

18.
针对现有物流系统中的用户隐私信息容易泄露的问题,提出了一种基于二维码和信息隐藏的物流系统隐私保护方案。该方案使用信息隐藏技术将用户隐私信息嵌入快递面单上的二维码中,完成对隐私信息的访问权限控制。为了提升用户隐私信息的安全性,在该方案中设计了一种用于二维码的JPEG图像隐写算法。实验结果表明,该算法使在二维码图像中嵌入的用户隐私信息具有较高的抗检测性能,同时不影响载密二维码的正确扫描和解码。使用本文所提方案,在物流系统中具有访问权限的机构或个人才能够获取这些重要的隐私信息,既确保了快件的正确投递,也保障了用户的隐私安全。  相似文献   

19.
In this paper we propose a data hiding method that utilizes image interpolation and an edge detection algorithm. Image interpolation algorithm enlarges a cover image before hiding secret data in order to embed a large amount of secret data. Edge detection algorithm is applied to improve a quality of stego-image. Experimental results show that the proposed method can embed a large amount of secret data while keeping visual quality better than previous works. We demonstrate that the average capacity is 391,115bits, and the PSNR and quality index are 44.71dB, 0.9568 for gray images when threshold value is 4 and the embedding bits are given to 2 respectively.  相似文献   

20.
Data hiding research has focused mainly on determining how to embed secret data into various public host media, and to also ensure the host medium is not changed to a degree such that it can be perceived by the human eye. In 2014, Chang et al. proposed a novel concept, named the turtle shell matrix, to embed secret data. This scheme has obvious advantages with respect to its hiding capacity and image quality. However, its disadvantage is lack of flexibility due to the fixed turtle shell matrix structure. In this paper, we extend this turtle shell matrix structure into a different matrix model to meet different hiding capacity and image quality needs. Meanwhile, a general extraction function is derived to generate a matrix having a different turtle shell model. The values of the pixel pairs in the cover image are modified according to guidance provided by the turtle shell to hide a secret digit in an N-ary notational system. The experimental results show that the proposed scheme not only has better flexibility in balancing the trade-off between hiding capacity and stego-image quality, but also provides higher hiding capacity and stego-images with better visual quality than previous schemes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号