基于图像的信息掩密技术
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术可以被广泛地应用于保密通信、版权保护、数字票据防伪等领域,对信息隐藏技术的研究具有重要的实用价值。
     目前大部分的研究工作集中于数字水印技术,而用于秘密通信的掩密术则较少有人涉及。本文对信息隐藏领域的另一个重要方向——掩密技术进行了研究,着重讨论了其在数字图像中的应用。
     首先,介绍了信息隐藏的相关基本知识。然后,分别在空间域和DCT域对于以静止图像为载体的信息隐藏技术进行了探讨。
     在空间域内,利用人的视觉特性,我们提出了基于图象方差、图象平坦测度、模糊分类的隐藏算法,同时提出了基于差值矩阵的信息隐藏。
     在频率域内,研究了基于DCT变换的信息隐藏技术,提出了改进的DCT自适应隐藏算法、DCT域奇偶性嵌入方法和改进的融合算法,同时提出了差值矩阵的DCT域的隐藏算法,给出了这些算法的信息嵌入与恢复过程,并对频率域内的这些隐藏算法的鲁棒性进行了分析。
Information hiding techniques can be used in the fields of covert communication, copyright protection, digital receipt anti-counterfeiting, and so on. It's of great value to study them.
    At present time, most of the studies focus on digital watermarking techniques, and few are done on steganography, one of the most important directions in the field of information hiding. This thesis concerns the steganography. We also place emphasis on its applications in digital images.
    Firstly, the relative basic knowledges of information hiding are presented, and then the techniques of digital images based information hiding in the domain of spatial and DCT (Discrete Cosine Transform) respectively.
    In spatial domain, according to the characteristics of HVS (Human Visual System), we introduce several approachs based on images' deviation, images' flatness measurement, fuzzy classification, and an approach based on difference matrix as well.
    In frequency domain, we research DCT based information hiding techniques, and then give an adaptive technique, and a parity based approach in the DCT domain, and an approach based on improved integration algorithm. We also propose an approach based on difference matrix in DCT domain, and show all the approaches to embed/detect the secret messages, and their robust analysises.
引文
[1].汪小帆,戴跃伟,茅耀斌,信息隐藏技术方法与应用.机械工业出版社,北京,2001
    [2].尤新刚,周琳娜,郭云彪,信息隐藏学科的主要分支及术语,CIHW2001,pp.43.
    [3].基于彩色静止数字图像的信息隐藏技术研究,http://www-900.ibm.com/developerWorks/cn/seeurity/se-eshow/index.shtml
    [4]. R. G. Schyndel, A. Z. Tirkel, and C. F. Osborne, A digital watermark. In: Proceedings of IEEE International Conference of Image Processing, Austin, Texas. Nov. 1994,2, pp.86~90.
    [5]. Tutorial of JPEG 2000 Standard, http://www.jpeg.org/JPEG2000.htm
    [6]. http://www.cotse.com/tools/steqa.htm
    [7]. http://www.funet.fi/pub/crypt/steqanography/
    [8]. Simmons, G. J., The Prisoners' Problem and the Subliminal Channel, In Advance in Cryptlopy, Proceedings of CRYPTO'83, Plenum Press, 1984, pp. 51—67.
    [9].杨尚英,朱虹,李永盛,一种数字图像的信息伪装技术,CIHW2001,PP.172.
    [10].卢燕,赵德斌,高文,一种基于小波变换的数字图像水印加入与抽取算法,CIHW2001,pp.276.
    [11].丁玮,数字图像信息安全的算法研究,中科院博士论文,2000.5,北京,中科院计算机研究所.
    [12]. Ding Wei, Yan Wei-Qi, Qi Dong-Xu, Digital Image Scrambling Technology Based on Gray Code, Proc. of the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec.,1999, 3:900-904.
    [13].李国富,基于正交拉丁方的数字图象置乱方法,北方工业大学学报,Vol.23,No.1,2001,PP:14—17.
    [14]. Human Visual System Features Enabling Watermarking,
    
    http://www-it.et.tudelft.nl/~inald/pubs/Watermarking/ICME2002.pdf
    [15]. Jiri Fridrich, Rui Du, Meng Long: Steganalysis of LSB Encoding in Color Images, ICME (2000)
    [16].陈默,李维钊,图像块平坦测度与系数扫描方式选择,计算机与信息技术2001年第1—2期,pp:76-80
    [17].贾志科,崔慧娟,唐昆等,H.263活动图象编码器控制研究,通信学报,20(7)1999,pp:1-7.
    [18].张哲峰,刘红梅,黄继武,黄夏菱,大容量无失真数据隐藏算法,CIHW2002论文集,pp.1
    [19].张益贞,刘滔,Visual C++实现MPEG/JPEG编解码技术,人民邮电出版社,2002.
    [20]. Mohanty, S. P., Ramakrishnan, K. R., Kankanhalli, M. S., A DCT domain visible watermarking technique for images. IEEE International Conference on Multimedia and Expo, 2000, pp: 1029-1032.
    [21]. Lin, S. D., Chin-Feng Chen, A robust DCT-based watermarking for copyright protection, International Conference on Consumer Electronics, 2000, pp: 10-11.
    [22]. M. Barni, F. Bartolini, V. Cappellini, A. Piva, A DCT domain system for robust image image watermarking, Signal Processing, Vol.66, No.3, 1998, pp357-372.
    [23]. D. Tzovaras, N. Karagiannis, M. G. Strintzis, Robust image watermarking in the subband or discrete cosine transform domain, in 9th European Signal Processing Conference(EUSIPCO'98), Island of Rhodes, Greece,8-11 Sept. 1998, pp:2285-2288.
    [24]. Young Liang Guan, Jing Jin, An objective comparison between spatial and DCT watermarking schemes for MPEG video, Information Technology: Coding and Computing, 2001, pp: 207-211.
    [25]. Guo-rui Feng, Ling-ge Jiang, Chen He, Dong-jian Wang, A novel algorithm for embedding and detecting digital watermarks, 2003 IEEE International
    
    Conference on Acoustics, Speech, and Signal Processing, Vol. 3,2003, pp: 549-552.
    [26]. Lam E Y, Goodman J W. A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. On Image Processing, Vol. 9, No. 10, 2000, pp:1661-1666.
    [27]. Wen-Nung Lie, Guo-Shiang Lin, Chih-Liang Wu, Ta-Chun Wang, Robust image watermarking on the DCT domain, IEEE International Symposium on Circuits and Systems, Vol. 1, 2000. pp:228-231.
    [28]. Suthaharan, S., Transform domain technique: robust watermarking for digital images, Proceedings of the IEEE, 2000, pp: 407-412.
    [29]. Lin, S. D., Chin-Feng Chen, A robust DCT-based watermarking for copyright protection, International Conference on Consumer Electronics, 2000, pp: 10-11.
    [30]. Han-Seung Jung, Nam-Ik Cho, Sang-Uk Lee, Image-adaptive watermarking based on warped discrete cosine transform, IEEE International Symposium on Circuits and Systems, Vol. 3, 2002, pp: 209-212.
    [31].钟声,图象压缩技术及其应用,电子学报,Vol.23 No.10 1995:117-123
    [32]. Christine I. Podilchuk, Wenjun Zeng, Image-Adaptive Watermarking Using Visual Models, IEEE Journal on Selected Areas in Communications, 1998,Vol.16, No. 4:525-540
    [33].易开祥,数字图象加密与数字水印技术研究,浙江大学博士论文,2001,7
    [34].丁玮,闫伟齐,齐东旭,基于置乱与融合的数字图象隐藏技术及其应用,中国图象图形学报,Vol.5,No.8,2000.
    [35].卢朝阳,周幸妮,一种新的数据信息置乱算法,计算机工程与科学,Vol.20,No.3,1998,pp:28-31.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700