共查询到20条相似文献,搜索用时 31 毫秒
1.
Grid Colorings in Steganography 总被引:3,自引:0,他引:3
Fridrich J. Lisonek P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(4):1547-1549
A proper vertex coloring of a graph is called rainbow if, for each vertex v, all neighbors of v receive distinct colors. A k-regular graph G is called rainbow (or domatically full) if it admits a rainbow (k+1)-coloring. The d-dimensional grid graph Gd is the graph whose vertices are the points of Zopfd and two vertices are adjacent if and only if their l1-distance is 1. We use a simple construction to prove that Gd is rainbow for all d ges 1. We discuss an important application of this result in steganography 相似文献
2.
To solve the problems due to restriction of handheld devices and the improperness of traditional steganography schemes in m-commerce applications, a new steganography scheme based on (N, t) threshold is proposed. This scheme can significantly reduce the computing complexity and the requirements for the communication devices 相似文献
3.
利用人类视觉系统对文本行间距和行起始位置的信息不敏感这一特性,提出了一种增加信息隐藏容量的基于文本的信息隐藏算法。通过改变每行基线的起始横坐标来改进信息的隐藏容量。算法通过JAVA语言实现,结果表明此算法的容量是传统算法容量的2倍。 相似文献
4.
5.
基于翻译的信息隐藏(Translation-Based Steganography,TBS)是一类文本信息隐藏算法,它利用不同的翻译机对同一个句子翻译产生的结果一般不同这一特性,使用多台翻译机翻译同一段文本,最终译文的每个句子根据隐藏信息来选择不同翻译机的翻译结果以形成隐藏文本.这种方法基本保证了隐藏文本语法的正确性和语义的连贯性,传统的检测算法很难发现隐藏文本.本文研究发现,在知道TBS算法所使用的翻译机集合的条件下存在一种TBS检测算法,因此对TBS算法所使用的翻译机集合保密是TBS算法安全的关键.文章从理论上分析了检测算法的有效性,并给出了算法的过程和实验结果.另外,我们还给出了增强TBS安全性的方法. 相似文献
6.
7.
8.
9.
Shikata J. Matsumoto T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2690-2705
In this paper, we study unconditionally secure stegosystems against active attacks over an insecure channel in which an adversary can read and write a message. More specifically, we propose an information-theoretic model for steganography in the presence of active adversaries by extending both Simmons' and Cachin's works; and we show a generic construction of stegosystems secure against active attacks by using authenticated encryption in unconditional setting. Although the idea behind this construction is already used in different models (i.e., computational models and/or information-theoretic models with passive adversaries) of steganography, our contribution lies in showing the construction methodology provides provable and unconditional security against active adversaries. 相似文献
10.
Image steganography aims to securely embed secret information into cover images. Until now, adaptive embedding algorithms such as S-UNIWARD or Mi-POD, were among the most secure and most often used methods for image steganography. With the arrival of deep learning and more specifically, Generative Adversarial Networks (GAN), new steganography techniques have appeared. Among them is the 3-player game approach, where three networks compete against each other. In this paper, we propose three different architectures based on the 3-player game. The first architecture is proposed as a rigorous alternative to two recent publications. The second takes into account stego noise power. Finally, our third architecture enriches the second one with a better interaction between embedding and extracting networks. Our method achieves better results compared to existing works Hayes and Danezis (2017), Zhu et al. (2018), and paves the way for future research on this topic. 相似文献
11.
一种基于JPEG2000的小波域信息隐藏算法 总被引:1,自引:0,他引:1
针对JPEG2000基本压缩编码的特点,提出了一种应用于隐蔽通信的基于小波域统计特征的隐写算法.该算法首先利用置乱变换对待隐藏图像进行变换处理,并对载体图像进行多分辨率小波分解,然后根据人类视觉系统的掩蔽特性选择重要小波系数,将隐秘信息分别嵌入到重要小波系数的不同频率域中.实验结果表明,算法提高了信息隐藏的容量,较好地... 相似文献
12.
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its
entropy and the ability to sample from it. On the negative side, we show that the number of samples the sender must obtain
from the channel is exponential in the rate of the stegosystem. On the positive side, we present the first secret-key stegosystem
that essentially matches this lower bound regardless of the entropy of the underlying channel. Furthermore, for high-entropy
channels, we present the first secret-key stegosystem that matches this lower bound statelessly (i.e., without requiring synchronized state between sender and receiver).
Preliminary version appears in TCC 2005 [5]. 相似文献
13.
14.
15.
16.
17.
18.
数字隐写和隐写分析是信息隐藏技术的重要分支。JPEG图像是隐写术最常见的载体,因而研究以JPEG图像为载体的隐写和隐写分析具有重要意义。剖析了JPEG文件结构,提出了基于JPEG格式的隐写方案;并针对该方案提出了相应的隐写分析方案;然后通过大量统计,建立了两个数据库,并最终构建了一个准实时隐藏信息提取系统。该系统从5万幅互联网上的JPEG图像提出了信息,并有效攻击了11种互联网上的隐写软件。 相似文献
19.
20.
图像自适应隐写和隐写分析技术是近年来信息隐藏领域的研究热点和难点.自适应隐写通过自适应选择嵌入更改位置并结合高效编码方法提高了隐写安全性,而相应隐写分析技术主要通过捕捉图像统计特性改变来发现隐写行为.首先对图像自适应隐写的基本原理进行了介绍,然后梳理总结了图像自适应隐写和隐写分析技术的研究进展并指出了现有研究存在的问题,最后对图像自适应隐写和隐写分析技术研究进行了展望. 相似文献