首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 140 毫秒
1.
基于N维Arnold与DCT变换的信息隐藏算法   总被引:1,自引:1,他引:0  
文章提出了一种新颖的把隐藏信息嵌入预选图像,通过N维Arnold置乱预选图像实现信息加密,并对载体图像进行DCT变换嵌入置乱图像的信息隐藏算法.主要包括N维Arnold图像置乱、信息的嵌入与提取算法.利用matlab6.5平台进行了算法实验,实验的结果表明该算法具有较强的隐蔽性和鲁棒性,其隐藏信息量大,信息类型多,因此在internet通信领域中具有较高的使用价值.  相似文献   

2.
基于离散余弦变换的复值加密图像隐藏技术   总被引:6,自引:0,他引:6  
提出了一种基于宿主图像离散余弦变换(DCT)的复值加密图像隐藏技术,待隐藏图像经双随机相位编码后的复值加密图像按一定规律隐藏在放大的宿主图像的离散余弦变换系数中.在提取隐藏图像过程中,利用相邻像素相减(NPVS)算法对藏有信息的宿主图像离散余弦变换系数进行运算,提取出隐藏的复值加密图像.经过正确的双随机相位解码,可获得原隐藏图像.研究了不同嵌入权重因子ω下藏有信息的宿主图像和解码后隐藏图像的各自相关度,分析了在ω=0.2情况下藏有信息的宿主图像的剪切对提取的隐藏图像质量的影响和基于数字全息的三维物体信息隐藏,结果表明该图像隐藏技术隐藏信息量大,抗剪切能力强,保密性好.  相似文献   

3.
徐新星 《信息技术》2023,(2):134-139
针对当前算法对彩色图像进行可逆隐藏时无法获取最优嵌入数据,存在综合性能差以及加密性能差的问题,提出基于Tabu搜索的彩色图像可逆数据隐藏算法,首先对彩色图像进行加密,确定嵌入的位置,利用Tabu搜索算法提取出最优嵌入秘密数据,在加密图像时进行秘密数据的嵌入,对秘密信息以及图像进行预处理;其次接收者利用自带的密钥对已经嵌入数据的加密图像进行解密,同时对图像进行翻转恢复以及信息提取,实现彩色图像可逆数据隐藏。实验结果表明,所提算法的综合性能高以及加密性较好。  相似文献   

4.
以原始图像作为保护信息,利用迭代算法,求得作为加密结果函数和密钥函数的纯相位形式(相息 图),然后将加密结果函数隐藏在一个普通图像(或者其它形式)中,完成图像的加密隐藏过程.纯相位形式的隐藏 方法,不但将加密和隐藏两种技术结合起来,而且具有特别优良的特性:基于信息隐藏的特点,算法有效降低了外 来的恶意攻击可能性;基于加密结果的噪声特性,提高了视觉容许的可隐藏信息量,同时能有效地抗击裁剪、噪声 等的影响,具有很强的“鲁棒”性。计算机仿真结果验证了这一点。  相似文献   

5.
文章提出一种基于DCT系数值排序预测的加密域JPEG图像可逆信息隐藏方案,该方案能够抵抗针对JPEG图像加密的轮廓攻击方法。区别于现有加密域JPEG图像信息隐藏方法,文章利用混沌加密方法置乱JPEG图像标识符,掩盖了加密域JPEG图像中的分块信息,利用基于DCT系数值排序预测的方法将秘密信息可逆嵌入加密JPEG图像中。在进行信息嵌入和提取的过程中,基于DCT系数值排序预测的可逆信息隐藏方法无需利用JPEG图像的分块信息,且信息嵌入的效率高,提取准确。实验结果显示,文章方案的安全性和嵌入容量都得到很大程度的提升,含密图像的图像质量也有一定程度的提高。  相似文献   

6.
刘志军 《通信技术》2008,41(3):109-111
文中提出了一种新颖的基于多混沌序列加密Word文档,并对数字图像进行Arnold变换的信息隐藏算法.分析了混沌序列Arnold变换图像;设计了信息嵌入与提取算法;并采用动态补偿抵御SPA的检测.利用VB实现Word文档(可以包括字体格式、表格、图形等)的嵌入与提取;给出了信息隐藏的峰值信噪比(PSNR)和SPA分析方法的检测结果.实验表明该算法具有信息隐藏方便、安全可靠、信息隐藏量大等特点.  相似文献   

7.
一种有效的加密隐藏算法   总被引:1,自引:0,他引:1  
以原始图像作为保护信息,利用迭代算法,求得作为加密结果函数和密钥函数的纯相位形式(相息图),然后将加密结果函数隐藏在一个普通图像(或者其它形式)中,完成图像的加密隐藏过程。纯相位形式的隐藏方法,不但将加密和隐藏两种技术结合起来,而且具有特别优良的特性:基于信息隐藏的特点,算法有效降低了外来的恶意攻击可能性;基于加密结果的噪声特性,提高了视觉容许的可隐藏信息量,同时能有效地抗击裁剪、噪声等的影响,具有很强的“鲁棒”性。计算机仿真结果验证了这一点。  相似文献   

8.
提出了一种隐藏二值图像的方法。利用游程编码技术对二值图像的无损压缩来减少对掩护载体的像素修改,并通过混沌序列对隐藏的信息序列进行加密。实验结果表明,相对于传统的LSB隐藏方法,该算法在一定程度上能抵抗RS检测攻击,其载密图像在视觉上更不容易被察觉,秘密信息的安全性得到了增强。  相似文献   

9.
为提高XU算法的隐藏容量和加密图像的安全性, 提出了一种基于预测误差分类置乱的加密域可逆 信息隐藏算法。首先根据XU的预测方法得到非采到样像素的预测误差,根据预测误差的取值范 围将所有非 采样像素分为可变像素和不变像素两类。对采样像素、可变像素和不变像素分类置乱后再异 或加密生成加 密图像,以提高加密图像的安全性。可变像素的低2位用于保存图像信息,剩余的6个高有效 位均可用于 隐藏信息,实现了一个可变像素嵌入多比特附加信息,提高了嵌入容量。实验结果表明,本 算法的加密方 法能有效抵抗COA唯密文攻击,且平滑图像的隐藏容量可以超过2比特每像素。  相似文献   

10.
DCT域可逆图像隐藏技术研究   总被引:1,自引:0,他引:1  
提出了一种基于DCT变换的数字图像隐藏算法.先对载体图像进行分块DCT变换,每个变换后的块矩阵中的细节元素位置用来存储被隐图像经加密后DCT变换的矩阵元素,然后分块反DCT变换后组合成加隐图像.加隐图像和原始的载体图像从肉眼上看几乎无异.用这样的方法来安全地隐藏一幅图像.从数值参数指标分析、秘钥空间大小、秘钥敏感性和抗破损攻击能力等角度对隐藏算法的有效性、隐藏性能、被隐藏图像提取时的恢复效果进行深入分析.  相似文献   

11.

Protection of multimedia information from different types of attackers has become important for people and governments. A high definition image has a large amount of data, and thus, keeping it secret is difficult. Another challenge that security algorithms must face with respect to high definition images in medical and remote sensing applications is pattern appearances, which results from existing regions with high density in the same color, such as background regions. An encryption and hiding based new hybrid image security systems are proposed in this paper for the purpose of keeping high definition images secret. First, one hiding method and two encryption methods are used in two hybrid algorithms. The new hiding algorithm proposed here starts by applying reordering and scrambling operations to the six Most Significant Bit planes of the secret image, and then, it hides them in an unknown scene cover image using adding or subtracting operations. Second, two different ciphering algorithms are used to encrypt the stego-image to obtain two different hybrid image security systems. The first encryption algorithm is based on binary code decomposition, while the second algorithm is a modification of an advanced encryption standard. After evaluating each hybrid algorithm alone, a comparison between the two hybrid systems is introduced to determine the best system. Several parameters were used for the performance, including the visual scene, histogram analysis, entropy, security analysis, and execution time.

  相似文献   

12.
一种基于置乱和融合的DCT域图像信息隐藏技术   总被引:1,自引:1,他引:0  
徐献灵  赵建保  崔楠 《通信技术》2008,41(6):179-181
该文提出了一种基于置乱和融合的OCT域图像信息隐藏技术.首先阐述了图像的二维OCT变换、arnold置乱变换、融合技术,在此基础上,提出了一种将三者结合的图象信息隐藏算法.通过运用MATLAB工具进行实验测试和分析,表明该算法具有较大的信息嵌入量和良好的隐藏效果,对常见的图像处理操作,具有一定程度的鲁棒性.  相似文献   

13.
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed method has a good performance in both hiding capacity and decrypted image quality.  相似文献   

14.
Image encryption and hiding effect evaluation standard is used in image encryption and hiding algorithm widely. In order to evaluate the effect of image encryption and hiding fleetly and effectually, new image encryption and hiding effect evaluation indexes are presented based on probability of pixel's neighborhood. Simulation results show that the new method is simple and approach to man's subjective results. At the same time, a new image edge detection algorithm is presented using the evaluation indexes. Simulation results show that our method is simple and better effect can be got.  相似文献   

15.
基于小波变换域的图像加密技术研究   总被引:8,自引:1,他引:7  
如何确保基于网络的图像/视频信息的安全,是当前信息处理技术领域的亟待解决的难点和研究热点之一。本文利用混沌映射的随机性以及不可预测性,产生混沌序列矩阵对变换矩阵系数进行调整,再对系数进行置乱处理,然后利用信息隐藏技术对密钥进行隐藏,实现图像信息的高强度加密。仿真实验结果表明:该方法在不增加图像数据量的情况下,能够快速实现图像信息混沌复合加密,加密强度高、破解困难,恢复图像与原图像一致性良好,加密图像的抗干扰和抗压缩性能优良。  相似文献   

16.
This paper proposes a novel reversible data hiding method in encrypted images based on specific encryption process. In the proposed specific encryption algorithm, the stream cipher and prediction error are combined to vacate room for data embedding. After that, a permutation operation is performed on the encrypted image to improve the security. In the embedding process, we can embed a large amount of secret data in the encrypted image by pixel value expansion because most of the pixel values are less than 128 by the specific encryption process. At the receiver end, the encrypted image can be recovered from the marked encrypted image without knowing the secret data. Therefore, even if the recipient only has the encryption key, the original image will be perfectly recovered. If the recipient only has the data-hiding key, the secret data will be extracted. And if the recipient has both keys, the original image and the secret data are both available. The proposed method achieves a higher embedding capacity than that of methods based on vacating room after encryption. It does not require the image owner to perform reversible data hiding techniques on the original image, which is more convenient than methods based on reserving room before encryption. Experimental results demonstrate that the proposed method outperforms other state-of-the-art methods.  相似文献   

17.
In this paper, reversible image data hiding in the Paillier cryptosystem is investigated. To transmit additional data in homomorphic encryption domain, two algorithms are proposed for different application scenarios. By exploiting the additive homomorphism, high-capacity data hiding can be accomplished with the first algorithm by conducting value expansion on the encrypted pixel values. But the hidden data can only be extracted after image decryption (i.e., in plain-text domain). With the second algorithm, both of data embedding and extraction can be performed in the encryption domain by exploiting the self-blinding property, while the corresponding plain-text values are unchanged. Compared with the reversible data hiding algorithms designed for encryption with a cipher stream, the proposed ones are more applicable in cloud computing without degrading the security level. Thus the additional data can be losslessly transmitted in the different applications of Paillier cryptosystem.  相似文献   

18.
基于信息分存的整数小波大容量数据隐藏方法   总被引:1,自引:0,他引:1  
针对基于变换域的数据隐藏算法容量较小、提取时需要原始图像的问题,提出一种小波域的大容量隐藏盲提取算法。利用混沌序列和分组异或对隐秘信息加密,进而将隐秘信息分解为不完全商和余数,然后将不完全商和余数分存于载体图像的低频和高频系数中,并对溢出进行处理。实验表明:在灰度图像中数据隐藏量(SHR)达到37.5%,峰值信噪比(PSNR)可保持在39 dB以上,直方图无异常;通过混沌加密,使得隐秘信息具有较好的伪随机特征,安全性好。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号