基于边缘检测的内容自适应三进制隐藏研究与实现
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Content-Adaptive Ternary Steganography by Using Edge Detection
  • 作者:莫佳 ; 谭素琴
  • 英文作者:MO Jia;TAN Su-qin;School of Information Engineering,East China Jiaotong University;School of Foreign Languages,East China Jiaotong University;
  • 关键词:信息安全 ; 边缘检测 ; 三进制隐写 ; 内容自适应
  • 英文关键词:information security;;edge detection;;ternary steganography;;content adaptation
  • 中文刊名:QZDX
  • 英文刊名:Journal of Hainan Tropical Ocean University
  • 机构:华东交通大学信息工程学院;华东交通大学外语学院;
  • 出版日期:2018-04-26
  • 出版单位:海南热带海洋学院学报
  • 年:2018
  • 期:v.25;No.119
  • 基金:教育部人文社会科学研究青年基金项目(15YJCZH119);; 江西省教育厅科技项目(GJJ14370)
  • 语种:中文;
  • 页:QZDX201802010
  • 页数:5
  • CN:02
  • ISSN:46-1085/G4
  • 分类号:59-63
摘要
讨论了信息隐藏基本机理,阐述了图像边缘检测方法,设计了内容自适应的三进制隐藏算法.首先利用Canny算子分析出图像纹理及边缘部分,从而得到载体图像纹理分布,形成隐藏空间;然后使用LSBM方法随机在隐藏空间写入-1,0,+1.仿真结果表明,与其他方法相比,该隐写算法具有较好的抗检测性,隐蔽性和图像保真性.
        A content-adaptive ternary steganography was designed in this paper to explore image edge detection method based on fundamental principles of information hiding. First of all,canny operator was used to analyze image texture and image edge,in order to get the distribution of image texture and thus form the hiding space. Then-1,0,+ 1 were randomly written into the space by using LSBM. The simulated experiment found that compared with some traditional methods,the current hidden algorithm enjoys better anti-detection ability,improved confidentiality and image fidelity.
引文
[1]王世伟,曹磊,罗天雨.论信息安全、网络安全、网络空间安全[J].中国图书馆学报,2016,42(225):4-28.
    [2]李应勇,马玉春,李壮.网络环境下的主机信息安全研究[J].琼州学院学报,2011,18(5):31-34.
    [3]朱晓静,林元乖.基于虚拟化实验环境的网络信息安全课程的实践教学改革[J].琼州学院学报,2015,22(5):120-124.
    [4]邓惠俊.基于J2EE的网络安全防御系统设计[J].琼州学院学报,2016,23(2):23-27.
    [5]张焕国,赫彦军,王丽娜.数字水印、密码学比较研究[J].计算机工程与应用,2003(9):63-67.
    [6]刘雍.基于ARM 9的嵌入式视频监控系统的设计与实现[J].琼州学院学报,2015,22(2):35-38.
    [7]Van SCHYNDEL R G,TIRKEL A Z,OSBORNE C F.A Digital Watermark[A].Proc.of the IEEE Int.conf.on Image Processing[C].Texas:IEEE,1994(2):86-90.
    [8]陈雅.基于数字图像的信息隐藏技术综述[J].福建电脑,2008(2):6+18.
    [9]WU D C,TSAI W H.A steganographic method for images by pixel-vale differencing[J].Pattern Recognition Letters,2003(24):1613-1626.
    [10]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.
    [11]FILLER T,JUDAS J,FRIDRICH J.Minimizing embedding impact in steganography using trellis-coded quantization[J].Proceedings of SPIE-The International Society for Optical Engineering,2010,6(1):175-178.
    [12]包震坤,张卫明,程森,等.基于像素链动态失真和校验格码的±1隐写编码[J].计算机研究与发展,2014,51(8):1739-1747.
    [13]潘琳,钱振兴,张新鹏.基于构造纹理图像的数字隐写[J].应用科学学报,2016,34(5):625-632.
    [14]LUO W,HUANG F,HUANG J.Edge Adaptive Image Steganography Based on LSB Matching Revisited[J].IEEE Transactions on Information Forensics&Security,2010,5(2):201-214.
    [15]CANNY J.A Computational Approach to Edge Detection[J].IEEE Trans Pattern Analysis and Machine Intelligence,1986,8(6):679-698.
    [16]FILLER T,Pevny T,Bas P.BOSS(Break Our Steganography System)[EB/OL].(2010-09-09)[2018-03-10].http://www.agents.cz/boss.
    [17]PEVNT,FILLER T,BAS P.Using High-Dimensional Image Models to Perform Highly Undetectable Steganography[J].Lecture Notes in Computer Science,2010(6387):161-177.
    [18]FRIDRICH J,KODOVSKJ.Multivariate gaussian model for designing additive distortion for steganography[A].IEEE International Conference on Acoustics,Speech and Signal Processing[C].Vancouver:IEEE,2013:2949-2953.
    [19]黄颖,李婉佳.Prewitt边缘检测与钻石编码结合的隐写算法[J/OL].(2017-03-21)[2018-03-10].http://www.arocmag.com/article/02-2018-03-045.html.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700