基于文本的信息隐藏算法的设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术、通信技术和多媒体信号处理技术的迅速发展及其应用的深入,信息安全问题日益突出。信息隐藏作为一种新兴的密码技术,已成为多媒体信息安全领域研究的一个热点。由于互联网上海量的文本数据、以及扫描成文本图像的个人档案和学历证明等,在人们日常生活中起到越来越重要的作用,文本数据的存储管理、产权保护及内容验证等安全问题成为信息安全领域的一个重要问题。
     针对文本信息隐藏技术的发展及其应用需求,本文主要研究文本信息隐藏算法的设计,研究结果如下:
     1.提出一种基于汉字部件的文本Hash算法
     针对汉字的特征,将汉字拆分为部件,提出一种基于汉字部件的文本Hash,并应用于文本零水印的构造和信息处理。实验结果表明:应用该算法构造的零水印具有较强的稳健性;而该算法应用于信息处理时具有较好的过滤效果。
     2.提出一种基于线性移位寄存器的文本水印算法
     首先利用LSFR序列的性质,构造一种适用于一维数据载体的水印信息模型;然后根据文本标点符号的编码特点及显示效果,提出一种信息嵌入方法;最后使用该方法将经水印信息模型产生的水印信息嵌入载体。该算法不增加文本数据占用的存储空间,不改变载体的文字内容,充分维护原创。实验结果表明:利用载体的任意一段都能恢复水印,且在较大的破坏力度下,仍能成功检测水印,具有较强的稳健性。
     3.提出一种基于块匹配和隐写码的灰度文本图像隐写方案
     (1)分析文本图像的特点,提出视觉同义块、视觉近义块以及文字内容语义稳健性的概念;提出一种多元码转换算法,该算法具有较高的转换效率;
     (2)利用同义块和近义块通过载体文本图像对秘密文本图像进行块匹配,将匹配块的位置信息作为嵌入信息;使用提出的转换算法将位置信息转换为多元码,进一步提高多元码的实际隐藏容量;为实现对任意嵌入率的编码,将几种隐写编码进行线性组合,利用隐写编码提高嵌入效率,增强算法的安全性。
     实验结果表明:在将文本图像作为隐藏对象时,该方案产生的秘密图像与原秘密图像具有较高的视觉相似性;同目前的大容量隐藏算法相比,该方案的安全性能和嵌入容量都得到较大的提高。
With the rapid development and in-depth application of the network technology, communication technology and multimedia signal processing, the problem of information security is increasingly salient. As a new cryptographic technique, data hiding becomes a cutting-edge of the multimedia information security area. There is huge text data on the internet and text images scanned from personal document, educational certification and so on, which play a more and more important role in everyday life. Thus,security problems become a crucial issue in information security area, such as storage management, intellectual property protection and content validation.
     Targeting on the development and application requirements of the text information hiding technology, the bodies of the studies would be outlined as follows:
     1. Proposing a text hashing based on components of Chinese characters. We split Chinese characters into components by its structure, and propose a text hashing based on components of Chinese characters. It is robust against attacks when used in text zero-watermarking,such as copying,reversing,removing, and synonym substitution, etc, and it performs a strong function when used in information processing.
     2. Proposing a scheme of digital text watermarking based on LSFR. First, through analyzing text coding and the property of LSFR, a digital text watermarking model based on LSFR is proposed, which applied to single dimensional data. Second, we propose a new method used of embedding information based on space and punctuation. At last, we use the method to embed watermarking message which was produced by the watermarking model in the text. There's no need to change character contents for protecting the authorship, and it doesn't increase bytes of the text. The simulation results show that, any part of the text can recover the watermarking message and has good robustness against attacks.
     3. Proposing a text image hiding scheme based on block-matching and steganographic codes.
     (1) Through analyzing the characteristics of text image, we present the concept of semantic robustness, synonymous block and almost synonymous block in text image; and then a conversion algorithm between binary and polynary system is presented, the algorithm has higher conversion efficiency.
     (2) We use carrier text image to match synonymous block and almost synonymous block for secret text image, and embed the position information of matched block into carrier text image. Then we use the conversion algorithm to switch the position information into plurality codes, which make further improvement on the embedding capacity. We combine some steganographic codes to obtain steganographic codes in any embedding capacities, which could improve the embedding efficiency, i.e. improve the secure performance.
     The experimental results show that when the scheme is used for hiding text image, the extracted secret text image is similar to the original secret text image. Comparing with some methods with large embedding capacity, the scheme has great improvement on the secure performance and embedding capacity.
引文
[1]陈至立.语言隐写术的分析与设计研究[D].中国科学技术大学博士学位论文, 2009.
    [2]王丽娜,张焕国.信息隐藏技术与应用[M].武汉:武汉大学出版社,2003:1-13.
    [3]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2005:52-66.
    [4] G. Schott. Schola StegaNographica, In Classes Octo Distributa(Whipple Collection) [M]. Gambridge, U.K: Cambridge, Univ, 1680.
    [5] EL. Baner. Decrypted Secrets Methods and Maxims of Crytology [M]. Berlin, Heidelberg, Germany: springer-Verlag, 1997.
    [6] R. Venkatesan, S. Koon, M. Jakubowski, et al. Robust Image Hashing[A]. In: Proc of IEEE Conference Image Processing [C]. Vancounver, Canada, 2000:664-666.
    [7]程玉柱,孙星明,黄华军.一种新的基于混沌映射的文本零水印算法[J].计算机应用, 2005, 25(12):2753-2754.
    [8] S. Wang, X. Zhang. Recent development of Perceptual image Hashing [J], Journal of University (English Edition), 2007,11(4):323-331.
    [9]罗纲,孙星明.基于汉字数学表达式的文本数字水印方法研究[D].湖南大学硕士论文, 2005.
    [10]胡敬禹.字元汉字学. http://www.yywzw.com/jt/hjy/.
    [11]刘超,孙星明.基于模糊聚类方法的盲文本数字水印研究[D],湖南大学硕士论文, 2006.
    [12]李庆成,张振华,张金.基于汉字结构的自然型文本水印算法[J].计算机应用研究, 2009, 26(4):1520-1522.
    [13]胡建国,文登敏.基于文本信息过滤技术的短信防火墙系统设计与实现[D].西南交通大学硕士研究生学位论文,2008.
    [14]平龙妹,张宇.基于数字水印算法的文本信息隐藏研究[J].电脑知识与技术, 2009, 5(3): 683-684.
    [15]陈青,周黎敏.基于word文档的数字水印算法的研究[J].图像处理, 2010, 26(8-4): 197-199.
    [16] Young-Won Kim and II-Seok Oh. Watermarking text document images using edge direction histograms[J].Pattern Recognition Letters,2004,25: 1243–1251.
    [17]赵星阳,孙继银.一种可抗二值化攻击的文本图像可见水印算法[J].计算机应用, 2009, 29(1): 165-167.
    [18] C. Gan, X. SUN, Y. LIU et al. An improved steganographic algorithm based on synonymy substitution for Chinese text [J]. Journal of Southeast University: Natural Science Edition, 2007, 37(1S): 137-140.
    [19]林建滨,何路,李天智等.一种抗攻击的中文同义词替换文本水印算法[J].西北大学学报(自然科学版),2010,40(3): 433-436.
    [20] Bailer, W. webStego Steganography Toll[EB/OL], http://www.wbailer.com/wbstego. 2001.
    [21] Steganos. SteganosⅡ[Web page][EB/OL], http://www.steganos.com. 2003.
    [22] Compris[company]. TextHide[EB/OL], http://www.compris.com/TextHide/en/. 2007.
    [23]袁树雄,孙星明.中文文本多重水印算法应用研究[J].计算机工程与应用, 2009,45(13): 96-99.
    [24] C. Yang, C. Weng, S. Wang, et al. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics and Security, 2008,3(3): 488-497.
    [25] X. Liao, Q. Wen, J. Zhang. A steganographic method for digital images with four-pixel differencing and modified LSB substitution [J]. J. Vis. Commun. Image R, 2010.
    [26] C. Lee, C. Chang, K. Wang. An improvement of EMD embedding method for large payloads by pixel segmentation strategy [J]. Image and Vision Computing, 2008: 1670–1676.
    [27]张磊,平西建.文本图像信息隐藏技术研究[D].郑州,信息工程大学. 2009.
    [28]王晓雪,苏杏丽.数字图像处理在车牌识别中的应用[J].自动化仪表,2010, 31(7): 22-25.
    [29]王恺,靳简明,史广顺等.基于特征点的汉字字体识别研究[J].电子与信息学报, 2008, 30(2): 272-276.
    [30]郁滨,王翠.像素不扩展的MSM视觉密码方案[J].信息工程大学学报, 2007, 8(2): 156-160.
    [31] R. Crandall. Some notes on steganography. Posted on steganography mailing list. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf (1998).
    [32] C. Munuera. Steganography and error-correcting codes[J]. Signal Processing, 2007,87:1528–1533,.
    [33] J. Fridrich and D. Soukal. Matrix embedding for large payloads [J]. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390-394.
    [34] Y. Y. Chen, H. K. Pan, Y. C. Tseng. A Secure Data Hiding Scheme for Two Color Images [J]. In IEEE Symposium on Computer and Communications, 2002:750-755.
    [35] Y. C. Tseng, H. K. Pan. Data Hiding in 2-Color Images. IEEE Transaction on Computers, 2002, 51( 7):873-890.
    [36] J. Fridrich. Minimizing the Embedding Impact in Steganography[A]. Proc. ACM the 8th workshop on Multimedia and Security [C],2006: 2-10.
    [37] M. van Dijk and F.Willems. Embedding information in grayscale images [A]. in Proc. 22nd Symposium on Information Theory [C], 2001:147–154.
    [38] F. Willems and M. Dijk. Capacity and codes for embedding information in gray-scale signals [J]. IEEE Transactions on Information Theory, 2005,51(3): 1209-1214.
    [39] W. Zhang, S. Wang, X. Zhang. Improving embedding efficiency of covering codes for applications in steganography [J]. IEEE Communications Letters, 2007,11( 8):680-682.
    [40] W. Zhang, S. Li, A coding problem in steganography [M]. Designs, Codes andCryptography, 2008, 46:67-81.
    [41]张卫明,李信然,李世取.线性隐写码的性质与构造[J].工程数学学报,2007,.24(3):547-550.
    [42] W. Zhang, X. Zhang and S. Wang. A double layered“plus-minus one”data embedding scheme [J],IEEE Signal Processing Letters, 2007,14(11):848-851.
    [43] W. Zhang, X. Zhang, and S. Wang. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes [A]. Proc of 10th Information Hiding (IH’08), LNCS 5284 [C], Springer-Verlag, 2008: 60-71.
    [44]刘九芬,李玉辉,陈嘉勇等.三元Golay隐写码及其快速隐写算法[J].计算机工程, 2008, 34(24): 149-151.
    [45] J. Fridrich. Minimizing the Embedding Impact in Steganography [A]. Proc. ACM the 8th workshop on Multimedia and Security [C], New York, USA, 2006: 2-10.
    [46] X. Zhang, S. Wang. Steganography using multiple-base notational system and human vision sensitivity [J]. IEEE Signal Processing Letters, 2005, 12(1): 67-70.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700