首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.

The existed digital steganography models and theories are not effective enough to guide the steganography processing. Based on previous studies, this paper proposes a complete digital steganography model based on additive noise. And then, with security analysis from KL divergence, the embedding optimization strategy is given through theoretical derivation needless of any side information: optimizing the embedding modification position and optimizing the embedding modification direction (+1 or???1). Through theoretical derivation, we also obtain the quantitative relationship between the pixels modification probability and the adjacent pixels difference, and prove that modification by ±1 randomly cannot enhance steganographic security definitely. The research in this paper can provide theoretical guidance for the design of steganography algorithms. Compared with previous studies, the proposed embedding optimization strategy has outstanding advantages of being easy to implement and being effective to improve steganographic security. The experiments by optimizing LSBM and MG algorithms show that the proposed embedding optimization strategy can effectively improve each algorithm’s steganographic security at a relative small payload.

  相似文献   

2.
Song  Xiaofeng  Yang  Chunfang  Han  Kun  Ding  Shichang 《Multimedia Tools and Applications》2022,81(25):36453-36472

Social media platform such as WeChat provides rich cover images for covert communication by steganography. However, in order to save band-width, storage space and make images load faster, the images often will be compressed, which makes the image steganography algorithms designed for lossless network channels unusable. Based on DCT and SVD in nonsubsampled shearlet transform domain, a robust JPEG steganography algorithm is proposed, which can resist image compression and correctly extract the embedded secret message from the compressed stego image. First, by combining the advantages of nonsubsampled shearlet transform, DCT and SVD, the construction method for robust embedding domain is proposed. Then, based on minimal distortion principle, the framework of the proposed robust JPEG steganography algorithm is given and the key steps are described in details. The experimental results show that the proposed JPEG steganography algorithm can achieve competitive robustness and anti-detection capability in contrast to the state-of-the-art robust steganography algorithms. Moreover, it can extract the secret message correctly even if the stego image is compressed by WeChat.

  相似文献   

3.
为了使数字隐写模型研究与隐写技术研究同步发展,从通用到具体,依次提出3个数字隐写模型,并对各模型进行形式化描述,总结梳理隐写算法的本质原理,以指导隐写技术的进一步发展。首先,针对已有模型无法描述新兴隐写算法的问题,提出一个通用数字隐写模型,以描述当前所有隐写算法;其次,鉴于载体修改式的隐写算法在隐写术研究中的重要地位,提出基于载体修改的加性噪声隐写模型;然后,针对当前主流的图像自适应隐写算法,提出具体的最小化失真的数字图像自适应隐写模型。选取4个典型的隐写算法实例,采用所提隐写模型进行对应描述,以验证所提模型的有效性。  相似文献   

4.
Nowadays, the security of communication becomes very important with the rapid development of network technology. So, the transmission and distribution of the several digital information must be protected and secured against other users. Many steganography techniques have been proposed for embedding secret digital data in other digital data. In this article, we propose a new steganography algorithm based on a linear algebraic tool that is the polar decomposition (PD) for hiding secret data in an image. A host image is selected and divided into blocks of size 2 × 2, a PD is applied on each block, and the secret data are embedded in suitable blocks. Experimental results show that our proposed algorithm gives a higher hiding capacity, achieves good imperceptibility, and also provides a high degree of security against common types of attacks such as compression attack with quality 10%, gamma correction attack, and impulse noise attack.  相似文献   

5.

Steganography has been a great interest since long time ago. There are a lot of methods that have been widely used since long past. Recently, there has been a growing interest in the use of sparse representation in signal processing. Sparse representation can efficiently model signals in different applications to facilitate processing. Much of the previous work was focused on image and audio sparse representation for steganography. In this paper, a new steganography scheme based on video sparse representation (VSR) is proposed. To exploit proper dictionary, KSVD algorithm is applied to DCT coefficients of Y component related to video (cover) frames. Both I and Q components of video frames are used for secure message insertion. The aim is to hide secret messages into non-zero coefficients of sparse representation of DCT called, I and Q video frames. Several experiments are performed to evaluate the performance of the proposed algorithm, in case of some metrics such as pick signal to noise ratio (PSNR), the hiding ratio (HR), bit error rate (BER) and similarity (Sim) of secret message, and also runtime. The simulation results show that the proposed method exhibits appropriate invisibility and robustness.

  相似文献   

6.
当前隐写分析算法多利用载体高阶统计特性进行分析,因此如何准确反映隐写对载体高阶统计特性的影响,即对隐写算法统计安全性进行合理评估是隐写研究的重点之一。文章提出数字图像隐写高阶Markov链统计分布模型,在对常用图像扫描方法所构成的高阶Markov链包含相邻像素相关性信息的程度进行比较后,采用Hilbert扫描方式构建数字图像n阶Markov链模型,进而研究隐写对该模型经验矩阵的影响,提出数字图像隐写统计安全性的n阶Markov链测度,并证明其有界且在特定情况下与ε-secure安全性指标等价。实验说明了文章所提模型经验矩阵在隐写前后的改变情况,统计分布测度比较实验证实了该模型统计分布测度较ε-secure安全性指标和图像Markov链模型统计分布测度对隐写引起载体高阶统计分布改变的反映更为充分。  相似文献   

7.
Embedding of confidential data in the least significant bit of an image is still an attractive method of steganography. Utilizing the full capacity of cover images by embedding one bit of data per pixel, using methods such as LSB flipping or LSB matching, usually decreases the security, making the algorithm vulnerable to steganalytic attacks. In this paper, we propose a novel efficient high payload ±1 steganographic method based on a special two variable binary function. This function uses the information of the least two significant bit planes of the cover image for the embedding and extraction purposes. Embedding efficiency, defined as the number of embeddable bits per one change in the cover medium, is a good criterion for concurrent evaluation of the capacity and security. Rather than randomly selecting +1 or −1, we achieve higher embedding efficiencies by choosing the correct modification component. In the generalized form of the proposed method, n bits of data are embedded in n pixels of the cover medium, by causing one unit change in only one third of these pixels. Analytical and experimental results demonstrated that the proposed method provides higher embedding efficiency than the other LSB embedding schemes. The proposed method is also applicable to other digital cover media.  相似文献   

8.
针对数字工程图的版权保护问题和现有密写技术鲁棒性和实用性不强的特 点,提出了一种基于点阵式字符编码与实体颜色的工程图密写技术算法。该算法先对要隐藏 的信息进行点阵式编码处理,使字符具有图像的特性,然后根据Logistic 混沌系统对该点阵 式编码信息进行二值化处理加密,结合HVS 将加密后信息和加密信息的校验码嵌入到工程 图的实体颜色中,从而实现信息的隐藏和自校验。实验结果显示该算法对平移、旋转和编辑 等攻击具有较好的鲁棒性和较高的嵌入量, 较好地解决了数字工程图的版权保护问题。  相似文献   

9.
Abstract

As vast channels for communication, such as the Internet, become more popular, the security of digital media becomes a greater concern. Steganography is one of the techniques used to make detecting the transmitted data over channels more difficult, as hiding a message will reduce the probability of detecting this message. In this paper we suggest a new algorithm of steganography for hiding a gray image in one another. The cover is divided into blocks of equal sizes. Each block size equals the size of the embedding image.

The results drawn in this paper with the similarity equals 0.9717 are more improved and give the clear picture of the object.  相似文献   

10.
在多媒体传感网中进行视频信息隐藏有很多局限性。为了增强在多媒体传感网中进行隐秘通信的安全性,本文从提高隐写效率和降低节点能耗入手,在分析研究以往相近研究的基础上,提出了一种新的视频信息隐藏算法。算法结合了H.264/AVC (Advanced video codec)标准视频流的数据特性,提出了调整覆盖码矩阵简化计算复杂度的新思想和避免误差漂移的隐写策略。算法运用了新的分类编码方法;对于不同类型的数据特征,引进并设计了针对多媒体传感网应用限制条件的覆盖编码方法。实验证明:该算法能够降低嵌入误差,有效抵抗统计分析;减少了数据通信冗余,同时计算复杂度由传统的幂次复杂度降低到线性复杂度。  相似文献   

11.
You  Weike  Zhao  Xianfeng  Ma  Sai  Liu  Yaqi 《Multimedia Tools and Applications》2019,78(16):22711-22725

Deep convolutional networks bring new energy to image steganography. It is an opportunity for steganalysis research. However, the operations to widen the gap between covers and stegos are only in the preprocessing layers for most existing networks. In this paper, a residual steganalytic network (RestegNet) is proposed to overcome this limitation. We design a novel building block group, which consists of two alternating building blocks: 1) A sharpening block based on residual connections (ShRC), which makes the noise of steganography overwhelm the image content, and aims to enhance steganographic signal detectability. 2) A smoothing block based on residual connections (SmRC), which seeks to downsample the feature maps to boil them down to useful data. First, we use the same preprocessing layers as previous methods to ensure minimum performance. Then, we use these building block groups to exaggerate the traces of steganography further and make the difference between covers and stegos in the feature extraction layers. Contrastive experiments with previous methods conducted on the BOSSbase 1.01 demonstrate the effectiveness and the superior performance of the proposed network.

  相似文献   

12.
Multimedia Tools and Applications - In this paper, a novel steganography of digital watermark scheme which contains digital watermark embedding and extraction processes is proposed. The proposed...  相似文献   

13.
目的 传统隐写技术在实际社交网络信道上难以保护秘密信息的完整性。在社交网络中,图像往往经过有损压缩信道进行传输,从而导致隐蔽通信失效。为了保证经过压缩信道传输的载密图像鲁棒性,设计安全鲁棒的隐蔽通信技术具有实际应用价值。基于最小化图像信息损失,本文提出无损载体和鲁棒代价结合的JPEG图像鲁棒隐写。方法 首先,指出构造无损载体能有效维持隐写安全性和鲁棒性的平衡,对经过压缩信道前后的JPEG图像空域像素块进行差分,构造无损载体以确定鲁棒嵌入域;其次,通过对离散余弦变换(discrete cosine transform,DCT)系数进行“±1”操作,并计算空域信息在压缩传输前后的损失,设计衡量DCT系数抗压缩性能的鲁棒代价;同时,验证在低质量因子压缩信道下鲁棒代价更能区分DCT系数的鲁棒能力,最后,利用校验子格编码(syndrome-trellis code,STC),结合无损载体和鲁棒代价对秘密信息进行嵌入。结果 实验在BossBase1.01图像库上进行对比实验,相比于传统JPEG隐写技术,构造无损载体作为嵌入域能有效地将信息平均提取错误率降低24.97%,图像的正确提取成功率提高了21.35%;在此基础上,鲁棒代价进一步将信息平均提取错误率降低1.05%,将图像的正确提取成功率提高16.12%,验证了本文方法显著提高了隐写抗压缩性能。与J-UNIWARD (JPEG universal wavelet relative distortion)、JCRISBE (JPEG compression resistant solution with BCH code)和AutoEncoder (autoencoder and adaptive BCH encoding)3种现有典型隐写方法相比,提出的方法信息平均提取错误率分别降低了95.78%、93.17%和87.38%,图像的正确提取成功率为另外3种隐写方法的86.69倍、30.74倍和4.13倍。图像视觉质量逼近传统隐写方法,并保持较好的抗检测性。结论 本文提出的抗低质量因子JPEG压缩鲁棒隐写方法,获得的中间图像在经过压缩信道后,具有较强的抗压缩性和抗检测性,并保持较高的图像质量。  相似文献   

14.
基于PCA和希伯特包络分析的盲隐写分析算法   总被引:1,自引:1,他引:0       下载免费PDF全文
为克服传统算法采用离散小波变换(Discrete Wavelet Transform,DWT)最终引起的加性噪声隐写图像检测正确率较低而虚惊率较高的问题,提出了一种新的盲隐写分析算法。综合应用主成分分析(Principal Component Analysis,PCA)和希伯特包络分析的优点,提取隐写图像高频子带希伯特包络解析信息号的主成分特征统计量,计算主成分信息熵,构建信息熵敏感特征向量。采用非线性支持向量机(Support Vector Machine,SVM)分类器,基于Matlab7.1平台进行仿真研究,结果表明:该算法对于空域和DWT域隐写检测具有较高的检测正确率和较低的虚惊率。  相似文献   

15.
ABSTRACT

The control algorithm for nonlinear time-invariant systems with compensation of unknown disturbances under measurement noises is proposed. The dimension of noises is equal to the state vector dimension of the plant. Disturbances can be presented in any equation of the plant model. The novel control law is based on the noise estimator and the disturbance compensator. The accuracy in the steady state depends on the first derivative of disturbance and the smallest component of noise vector. A sufficient condition in terms of linear matrix inequality provides feasibility of the proposed algorithm. The simulations show the efficiency of the proposed method compared with some existing ones.  相似文献   

16.
In this study, a novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images is proposed. In this study, both the text and the binary image messages are embedded into the cover image. The results of simulations and analysis show that our algorithm satisfies the requirements of steganography algorithms. Also, we used modulo method and Hilbert scrambling method for the security of the hidden message. It is seen that an unauthorized person obtains meaningless information when attempting to extract a embedded information through known methods. The results show that the algorithm is robust against attack when several attacks are applied on the stego-image. Finally, we compare our proposed algorithm with the related works. The results of simulation show that the our proposed algorithm has many advantages according to the related algorithms.  相似文献   

17.
基于视觉感知机理的大容量彩色图像盲隐写算法   总被引:1,自引:0,他引:1  
康年锦  陈昭炯 《计算机应用》2012,32(9):2568-2572
针对现有彩色图像隐写算法大多将灰度图像的算法直接用于彩色通道,未能运用彩色视觉感知机理的问题,提出一种YUV空间上的、基于视觉感知机理的大容量彩色图像盲隐写算法。主要方法是在Y分量上通过标准差来分析载体图像的局部复杂性,利用视觉感知机理将信息分成两部分隐写于Y和V分量中,灵活性较差的U分量则作为隐写信息的通道指示器,无需大的改变。大量实验结果表明,所提算法与其他方法相比在嵌入大容量信息后依然能够保持很好的不可感知性,而且可以抵抗直方图对比和RS隐写分析方法,因而所提算法是合理、简洁、有效的。  相似文献   

18.

In the last few decades, information security has gained huge importance owing to the massive growth in digital communication; hence, driving steganography to the forefront for secure communication. Steganography is a practice of concealing information or message in covert communication which involves hiding the information in any multimedia file such as text, image, or video. Many contributions have been made in the domain of image steganography; however, due to the low embedding capacity and robustness of images; videos are gaining more attention of academic researchers. This paper aims to provide a qualitative as well as quantitative analysis of various video steganography techniques by highlighting their properties, challenges, pros, and cons. Moreover, different quality metrics for the evaluation of distinct steganography techniques have also been discussed. The paper also provides an overview of steganalysis attacks which are commonly employed to test the security of the steganography techniques. The experimental analysis of some of the prominent techniques using different quality metrics has also been done. This paper also presented a critical analysis driven from the literature and the experimental results. The primary objective of this paper is to help the beginners to understand the basic concepts of this research domain to initiate their research in this field. Further, the paper highlighted the real-life applications of video steganography and also suggested some future directions which require the attention of the research community.

  相似文献   

19.
为解决各类数字图像的隐写容量无法统一衡量的问题,提出了数字图像的最大隐写容量归一化的算法.在阐述最低有效位(LSB)隐写技术的基础上,表明了至多改变一位后的图像的最大嵌入容量小于等于像素数的2倍,实现数字图像的最大隐写容量的归一化,将批量隐写最大容量增加了1倍.在阐述和归纳图像隐写规则后,提出了相应的隐秘信息嵌入和提取算法,并通过实例验证了所提算法的有效性,为数字图像的隐写容量归一化提供了可行的解决途径.  相似文献   

20.
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media using steganography. Both steganography and steganalysis have received a great deal of attention from law enforcement and the media. In the past years many powerful and robust methods of steganography and steganalysis have been reported in the literature. In this paper, we classify and give an account of the various approaches that have been proposed for steganalysis. Some promising methods for statistical steganalysis have also been identified.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号