用户名: 密码: 验证码:
基于多变换的LSB隐写算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术是信息安全领域的一个研究热点,其原理是利用载体中存在的冗余信息来隐藏秘密对象。隐写术和数字水印是信息隐藏的两个主要的技术分支。隐写技术通过隐藏秘密通信过程的存在来获得通信的安全。
     本文主要研究基于置乱变换和改进的LSB嵌入方案的信息伪装算法,包含以下三个方面的内容:
     (1)分析了传统LSB嵌入算法在安全性上存在的问题,提出了一个改进方案,并从抵御RS分析法和期望统计分析法两个方面,说明了改进方案的抗隐写分析性能。
     (2)对数字图像的置乱技术进行了研究。在对几种常用置乱变换、置乱变换周期性及性能评价标准深入分析的基础上,给出了一种新的图像置乱算法,该方法可用来提高信息伪装的安全性。
     (3)运用改进的幻方变换对载体图像进行了预处理,并设计了一基于幻方置乱变换与改进LSB嵌入方案的信息隐藏系统。
Information hiding has become a hot interest area recently in the research of information security .It is to embed private messages in seemingly innocuous cover messages making use of the redundancy information. Steganography and digital watermarking are two main sub-disciplines of information hiding. Steganography is the art and science of communicating in a way which hides the existence of the communication.
     This thesis is focused on steganography algorithm based on two-dimensional Arnold transform and modified LSB embedding scheme.The main content of this thesis is summarized as follows:
     (1) A modified LSB embedding schemes are proposed.Through analyzing thoroughly the switch rule of pair of values caused by traditional LSB replacement scheme and two steganglysis algorithms which can reliably detect the message embedded by traditional LSB replacement(RS method and math method).
     (2) Based on the study of image scrambling technique,the periodicity and the evaluation criterion of scrambling technique's performance,we point out that the security of steganograohy can be improved by scrambling cover-image.
     (3) The steganography system based on modified transform and modified LSB embedding is constructed.
引文
[1] I. J. Cox, F. T. Leighton, T. Shamoon. Secure spreadspectrum watermarking for multimedia. IEEE Transac2tions on Image Processing, 1997,6 (12) : 1673-1687.
    [2] N.F. Johnson, S. Jajodia. Exploring Steganography :seeing the unseen. IEEE Transactions on Computer ,1998,31 (2): 26-34.
    [3] W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM System Journal, 1996,35(3):313-336.
    [4] Stefan Katzenbeisser, FabienA .P.Petitcola:编.吴秋新.钮心忻,杨义先,罗守山,杨晓兵译.信息隐藏技术—隐写术与数字水印.北京:人民邮电出版社,2001
    [5] 1672—7304(2005)01-0065一04 左伟明,秦姣华.信息隐藏技术研究.湖南城市学院学报(自然科学版),2005,14(1):65
    [6] Fridrich J, Goljan M. Practical Steganalysis of Digital Images- State of the Art. In Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE, 4675.San Jose, USA, Jan 2002, 1-13
    [7] Jiri Fridrich, Rui Du,Meng Long.Steganalysis of LSB Encoding in Color Images. IE EE International Conference on Multimedia and Expo(ICME),30 July—2 August2000,NY, USA. 1279-1282.
    [8] Jessica Fridrich,Miroslav Goljan, Rui Du. Detecting LSB Steganography in Color and Gray- Scale Images. IEEE Multimedia and Security,2001,8(4):22-28.
    [9] Jessica Fridrich, Miroslav Goljan, Rui Du. Reliable Detection of LSB Steganography in Color and Grayscale Images. In Processing of ACM Workshop on Multimedia and Security ,2001,27-30.
    [10] Jessica Fridrich, Miroslav Goljan, Rui Du. Steganalysis Based on JPEG C ompatibility. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SP IE Multimedia System and Applications Ⅳ, Denver, CO,August20-24,2001,pp .275-280
    [11] Jessica Fridrich, Miroslav Goljan, Dorin Hogea. Steganalysis of JPEG Images: Breaking the F5 Algorithm. The 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, O ctober2002.
    [12] Jessica Fridrich, Miroslav Goljan, Dorin Hogea. New methodology for breaking steganographic techniques for JPEGs. In Proceeding of E1 SPEI Santa Clara, Security and Watermarking of Multimedia Contents V ,CA, Jan2003
    [13] 胡昊熊.JPEG图像LSB匹配隐写的检测研究,华东理工大学硕士论文,2005
    [14] Miroslav Goljan. Lossless Data Embedding Methods for Digital Images and Detectionof Steganography. PhD Thesis. Binghamton University, State University of New York.2001.
    [15] Neil F .Johnson, Sushil Jajodia. Steganalysis of Images Created Using Current Steganography Software. Proceedings of 2nd Information Hiding Workshop. LNCS vol.1525. Springer-Verlag, 1998
    [16] 丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):838-843
    [17] 吴发恩,邹建成.数字图像二维Arnold变换周期的一组必要条件.北方交通大学学报,2001.25(6):26-32
    [18] 孙伟.关于Arnold变换的周期性,北方工业大学学报,1999,11 1:29-32
    [19] 丁玮,闰伟齐,齐东旭.基于Arnold变换的数字图像置乱技术.计算机辅助设计与图形学学报,2001,4:67-73
    [20] 朱桂斌,曹长修,张邦礼等.一类图像置乱的快速算法.计算机工程,2003,29(7):11-12
    [21] 曹秀英.异步语音置乱算法的理论基础及频域算法.通信技术,1996,9(43):16-25
    [22] 王炳锡,陈琦,邓峰森.数字水印技术[M].西安电子科技大学出版社,2003.
    [23] Eiji Kawaguchi, Richard O.Eason. Principle and applications of BPCS-Steganoaraphy. In Processing of SPIE. Multimedia Systems and Application,. 3258, 1998, 464-473,.
    [24] J Fridrich, M Goljan , R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia (Special Issue on Security), 2001,8 (4) :22-28
    [25] J Fridrich , R Du, M Long. Steganalysis of LSB encoding in color Images. ICME'2000, New York, USA, 2000.
    [26] 邓倩岚,林家骏.基于统计的LSB隐写分析方法.计算机安全,2006,1:23-24
    [27] 齐东旭,邹建成,韩效.一类新的置乱变换及其在图像信息隐蔽中的应用.中国科学(E辑),2000,30(5):440-447.
    [28] 王道顺,杨地莲,齐东旭.数字图像的两类非线性变换及其周期性.计算机辅助设计与图形学学报,2001,13(9):828-831

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700