首页 | 本学科首页   官方微博 | 高级检索  
     

改进的基于模函数的数据隐藏方案
引用本文:刘开会,徐江峰.改进的基于模函数的数据隐藏方案[J].计算机应用,2011,31(7):1917-1919.
作者姓名:刘开会  徐江峰
作者单位:郑州大学 信息工程学院,郑州 450001
摘    要:Lee等人(LEE C F, CHEN H L. A novel data hiding scheme based on modulus function. The Journal of Systems and Software, 2010, 83(5): 832-843)提出了一种基于模函数的数据隐写方法,在图像质量可接受的情况下,每个像素的最大嵌入容量为4位二进制数。但是当每个像素的嵌入量为4位时,隐写图像的质量较差,容易引起攻击者的注意。对该方法进行了改进,缩小了像素改变的范围。理论分析及模拟实验表明,改进方法不但保留了原方法的各种优点,而且使PSNR值增加1.5~3.5dB,提高了隐写图像的视觉不可见性及抵御RS攻击的能力。

关 键 词:隐写方法    模函数    峰值信噪比    RS攻击
收稿时间:2010-12-31
修稿时间:2011-01-31

Improved data hiding scheme based on modulus function
LIU Kai-hui,XU Jiang-feng.Improved data hiding scheme based on modulus function[J].journal of Computer Applications,2011,31(7):1917-1919.
Authors:LIU Kai-hui  XU Jiang-feng
Affiliation:School of Information Engineering, Zhengzhou University, Zhengzhou Henan 450001,China
Abstract:The new method proposed by Lee et al. (LEE C F, CHEN H L. A novel data hiding scheme based on modulus function. The Journal of Systems and Software, 2010, 83(5): 832-843) was based on modulus function. In this method, each pixel can carry a maximum of 4 bits with an acceptable visual quality. When each pixel is embedded with 4 bits, the quality of stego images is much worse; as a result, this may catch the attention of attackers. Consequently, this paper improved the method, which narrowed the range that pixels changed. The theoretical analysis and simulation results show that the new method not only keeps the various advantages of original method, but also makes the Peak Signal-to Noise Ratio (PSNR) value increase 1.5~3.5 dB. Thus, it can raise imperceptibility and the ability resisting RS attack of stego-images.
Keywords:steganographic method                                                                                                                        modulus operation                                                                                                                        Peak Signal-to-Noise Ratio (PSNR)                                                                                                                        RS attack
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号