摘要
讨论了信息隐藏基本机理,阐述了图像边缘检测方法,设计了内容自适应的三进制隐藏算法.首先利用Canny算子分析出图像纹理及边缘部分,从而得到载体图像纹理分布,形成隐藏空间;然后使用LSBM方法随机在隐藏空间写入-1,0,+1.仿真结果表明,与其他方法相比,该隐写算法具有较好的抗检测性,隐蔽性和图像保真性.
A content-adaptive ternary steganography was designed in this paper to explore image edge detection method based on fundamental principles of information hiding. First of all,canny operator was used to analyze image texture and image edge,in order to get the distribution of image texture and thus form the hiding space. Then-1,0,+ 1 were randomly written into the space by using LSBM. The simulated experiment found that compared with some traditional methods,the current hidden algorithm enjoys better anti-detection ability,improved confidentiality and image fidelity.
引文
[1]王世伟,曹磊,罗天雨.论信息安全、网络安全、网络空间安全[J].中国图书馆学报,2016,42(225):4-28.
[2]李应勇,马玉春,李壮.网络环境下的主机信息安全研究[J].琼州学院学报,2011,18(5):31-34.
[3]朱晓静,林元乖.基于虚拟化实验环境的网络信息安全课程的实践教学改革[J].琼州学院学报,2015,22(5):120-124.
[4]邓惠俊.基于J2EE的网络安全防御系统设计[J].琼州学院学报,2016,23(2):23-27.
[5]张焕国,赫彦军,王丽娜.数字水印、密码学比较研究[J].计算机工程与应用,2003(9):63-67.
[6]刘雍.基于ARM 9的嵌入式视频监控系统的设计与实现[J].琼州学院学报,2015,22(2):35-38.
[7]Van SCHYNDEL R G,TIRKEL A Z,OSBORNE C F.A Digital Watermark[A].Proc.of the IEEE Int.conf.on Image Processing[C].Texas:IEEE,1994(2):86-90.
[8]陈雅.基于数字图像的信息隐藏技术综述[J].福建电脑,2008(2):6+18.
[9]WU D C,TSAI W H.A steganographic method for images by pixel-vale differencing[J].Pattern Recognition Letters,2003(24):1613-1626.
[10]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.
[11]FILLER T,JUDAS J,FRIDRICH J.Minimizing embedding impact in steganography using trellis-coded quantization[J].Proceedings of SPIE-The International Society for Optical Engineering,2010,6(1):175-178.
[12]包震坤,张卫明,程森,等.基于像素链动态失真和校验格码的±1隐写编码[J].计算机研究与发展,2014,51(8):1739-1747.
[13]潘琳,钱振兴,张新鹏.基于构造纹理图像的数字隐写[J].应用科学学报,2016,34(5):625-632.
[14]LUO W,HUANG F,HUANG J.Edge Adaptive Image Steganography Based on LSB Matching Revisited[J].IEEE Transactions on Information Forensics&Security,2010,5(2):201-214.
[15]CANNY J.A Computational Approach to Edge Detection[J].IEEE Trans Pattern Analysis and Machine Intelligence,1986,8(6):679-698.
[16]FILLER T,Pevny T,Bas P.BOSS(Break Our Steganography System)[EB/OL].(2010-09-09)[2018-03-10].http://www.agents.cz/boss.
[17]PEVNT,FILLER T,BAS P.Using High-Dimensional Image Models to Perform Highly Undetectable Steganography[J].Lecture Notes in Computer Science,2010(6387):161-177.
[18]FRIDRICH J,KODOVSKJ.Multivariate gaussian model for designing additive distortion for steganography[A].IEEE International Conference on Acoustics,Speech and Signal Processing[C].Vancouver:IEEE,2013:2949-2953.
[19]黄颖,李婉佳.Prewitt边缘检测与钻石编码结合的隐写算法[J/OL].(2017-03-21)[2018-03-10].http://www.arocmag.com/article/02-2018-03-045.html.