数字图像信息隐藏技术的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络和现代通信技术的飞速发展,信息隐藏技术已经成为信息安全领域一个新的研究热点。其原理是利用载体中存在的冗余信息来隐藏秘密信息。它通过隐藏通信过程的存在来获得通信的安全。作为信息安全的新领域,信息隐藏在隐蔽通信和版权保护方面发挥着越来越重要的作用,尤其在军事和国家安全等对信息的安全性和机密性有更高要求的领域,信息隐藏技术的应用前景更是广阔。
     本文研究的是以数字图像为载体的信息隐藏技术,主要从以下几个方面进行分析与研究。文中首先介绍了信息隐藏技术的基本理论及数字图像的基本知识,并简单介绍了信息隐藏技术中的主要算法;接着分析和介绍了对信息进行预处理的加密技术,加密技术和隐藏技术的结合可以更好的保障信息安全,该部分主要包括对加密与信息隐藏的关系的分析以及对文本信息加密算法RSA和图像置乱算法Arnold进行的研究与实现;然后重点研究了空间域信息隐藏算法,结合空间域视觉模型,对传统的LSB算法进行改进,改进的算法通过随机序列选择嵌入位置,提高了算法的安全性,参考亮度公式来改变载体图像RGB分量的不同位数,在保持好的感知性的同时提高了隐藏率,并对改进后的算法进行了系统实现及结果分析,结果表明该算法隐藏容量大且隐藏效果好;最后,对频域算法进行了研究,并仿真了一种基于DWT的频域信息隐藏算法,对仿真结果进行了分析,结果表明了该算法的有效性和较好的鲁棒性。
With the rapid development of Internet and the modern telecommunication technology, information hiding technology has become a new hot topic in the domain of information security. The principle of information hiding technology is embedding private messages in the redundant information of the carrier. It gets the security of communications through hiding the existence of the communication process. As a new domain of information security, information hiding plays a more and more important role in covert communication and copyright protection, especially in the domain of military affairs and national security which have higher requirements on the confidentiality and security of information.
     This paper studies on the information hiding technology using digital image as the carrier and focuses on the following aspects to analyze and research. This paper first introduces basic theory of information hiding technology and basic knowledge of the digital image. Also,the main algorithms of information hiding technology are simply introduced. Subsequently, the paper analyzes and discusses the encryption technology which is used to pretreat information. The combination of encryption technology and information hiding technology can better guarantee information security. This part is mainly about the analysis of the relationship between information hiding and encryption, as well as the research and implementation of text information encryption algorithm RSA and image scrambling algorithm Arnold. Then the paper focuses on spatial domain algorithm and the traditional information hiding algorithm Least Significant Bit (LSB) is improved associated the spatial domain visual model. The improved algorithm embeds information in the random sequence position to improve the security of information hiding algorithm and change different digits of carrier images RGB component according to the brightness formula in keeping the good apperceiveness while improving the hidden rate. Also,the information hiding system of improved algorithm was implemented and the experimental results were analyzed, the results showed that the algorithm had large hidden capacity and the hidden effect was good. Finally, the frequency-domain algorithm is studied and a kind of hiding information algorithm of frequency domain based on Discrete Wavelet Transform (DWT) is simulated. The simulation results were analyzed and the results verified that the algorithm is effective and robust.
引文
[1]王炳锡,彭天强.信息隐藏技术[M].北京:国防工业出版社,2007:1-21
    [2]王丽娜,张焕国,叶登攀.信息隐藏技术与应用[M].武汉:武汉大学出版社,2009:7
    [3]王育民,张彤,黄继武.信息隐藏—理论与技术[M].北京:清华大学出版社,2006:31-45
    [4] Simmons G J. The prisoners’problem and the subliminal channel[C]. Advances in Cryptology: Proceedings of CRYPTO’83, Plenum Press ,1983:51-67
    [5] Kutter M,and F A P Petitcolas. Fair Benchmarking for Image Watermarking System[C]. In Proceeding Of the SPIE3657 Security and Watermarking of Mulitimedia Contents,1999:226-239
    [6] Petitcolas F.A.P, R J Anderson. Evaluation of copyright marking system[C]. IEEE Multimedia System, Florence, 1999
    [7]钟桦,张小华,焦李成.数字水印与图像认证[M].西安:西安电子科技大学出版社,2006:27-28,1
    [8]章毓晋.图像工程[M].北京:清华大学出版社,2006:1-2,276
    [9]尹德辉.利用图像融合技术实现信息隐藏和版权保护[D].四川大学,2005
    [10]李健乾.图像隐藏信息检测[D].中山大学,2005
    [11]谢剑锋.信息隐藏的算法研究[D].复旦大学,2004
    [12]龚声蓉,刘纯平,王强等.数字图像处理与分析[M].北京:清华大学出版社,2006:23-28
    [13] Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3&4): 313-336
    [14] Van Schyndel R, Tirkel A, Osborne C. A digital watermark[C]. IEEE Proceeding on International Conference on Image Processing, IEEE Press, 1994: 86-90
    [15] Maxemchuk N F. Electronic document distribution[J]. AT&T Technical Journal, 1994, 73 (5): 73-80
    [16] Cvejic N, Seppanen T. Increasing robustness of LSB audio steganography by reduced distortion LSB coding[J]. Journal of Universal Computer Science,2005,11(1):56-65
    [17] Ker A D. A general framework for structual steganalysis of LSB replacement[C]. Processings of 7th International Workshop, IH2005, Barcelona, Spain, Lecture Notes in Computer Science, Springer-Verlag, 2005:296-311
    [18]陈雅.基于数字图像的信息隐藏技术综述[J].福建电脑,2008(2):6
    [19] Brassil J, Low S, Maxemchuk N, Gorman L O. Electronic marking and identification techniques[C]. Proceedings of ICIP, 1994,1278-1287
    [20] Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling[C]. SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 92-99
    [21] Hui Xiang. Digital Watermarking Systems with Chaotic Sequences[C]. SPIE Proceeding on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657: 449-457
    [22] Hartung F, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding[C]. SPIE Proceeding on Multimedia Computing and Networking, San Jose, 1997, 3020: 264-273
    [23] Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio[C]. In Proceedings of SPIE on Security and Watermarking of Multimedia Contents, 1999, 3657:194-202
    [24]向辉.基于信息重组思想的多媒体数据压缩与多媒体数据安全技术研究[D].杭州:浙江大学CAD&CG国家重点实验室,1999
    [25] Delaigle F,Vleshouwer C D,and Macq B. Watermarking algorithm based on a human visual model[J]. Signal Processing,1998,66(3):319-336
    [26] Cox I J, Kilian J, Leighton T. A secure robust watermark for multimedia[C]. Proceedings of Information Hiding,Cambridge University, London, 1996: 185-206
    [27] Cox I J, Kilian J, Leighton T. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997, 6 (12): 1673-1687
    [28] Puate J, Jordan F,and Kutter M. Using fractal compression scheme to embed a digital signature into an image[C]. Proceedings of SPIE Photonics East Symposium, Boston, USA,1996, 11:18-22
    [29]杨波.现代密码学[M].北京:清华大学出版社,2003:07
    [30] Diffie W, Hellman M E. New directions in cryptography[J]. IEEE transactions on information theory,1976,22(6):644-654
    [31]陈少真.密码学基础[M].北京:科学出版社,2008:173
    [32]杨源.密钥[J].信息安全与通信保密,1986(2):19-23
    [33]许春香,李发根,聂旭云等.现代密码学[M ].成都:电子科技大学出版社,2008:59-61
    [34]刘芳,贾云得.一种新的Arnold反变换在数字水印中的应用[C].第十二届全国图像图形学学术会议论文集.北京:中国图象图形学学会,2005,172-175
    [35]柏森,曹长修.一类基于行列式计算思想的图像置乱加密算法[J].计算机工程与应用,2002.38(8):37-39
    [36]李扬,樊养余,郝重阳.基于图像二级置乱的信息隐藏技术[J].中国图象图形学报,2006,11(8):1087-1090
    [37]黎罗罗. Arnold型置乱变换周期分析[J].中山大学学报(自然科学版),2005,44(2):1-4
    [38]乔小燕,孙兴华,杨静宇.基于视觉冗余性的图像信息隐藏[J].计算机应用,2006,26(1):96-98
    [39]谢建全.面向数字图像的大容量信息隐藏算法研究[D].中南大学,2009
    [40]一种基于子带DCT的彩色图像盲水印算法[EB/OL].(2006-06-18). http://mydown.mpegnet.cn/view.asp?id=1695
    [41]蒋铭,孙水发,汪京培等.视觉自适应灰度级数字水印算法[J].武汉大学学报(理学版),2009,55(1):97-100
    [42]刘九芬,黄达人,胡军全.数字水印中的正交小波基[J].电子与信息学报,2003, 25(4):453-459
    [43]汪新凡.小波基选择及其优化[J].株洲工学院学报, 2003, 17(5): 33-35
    [44]金聪.数字水印理论与技术[M].北京:清华大学出版社,2008:36-38
    [45] Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for images, Audio and Video[C]. IEEE International Conference on Image Processing ICIP, 1996,3:243-246

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700