首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
工业技术   4篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  1999年   1篇
排序方式: 共有4条查询结果,搜索用时 18 毫秒
1
1.
A novel approach to embedding any type of digital data into a cover image is proposed, which utilizes a human visual model to guarantee that the modification of the cover image is imperceptible. A quantized contrast function based on the model is constructed first. The gray values of each 3×3 sub-image of the cover image are used to compute, using the function, a range of gray levels with the same contrast as that of the central pixel of the sub-image. The embedding process proceeds by replacing the gray value of the central pixel by one of the values in the range. This guarantees that the changes be imperceptible. The data to be embedded is treated as a binary stream and is partitioned into a number of sub-streams. A multiple-base number conversion mechanism is used to convert each sub-stream of data into values which are then embedded in the central pixels of sub-images. The embedded data can be extracted out from the resulting stego-image without referencing the original image. Experimental results show that the proposed method is feasible.  相似文献   
2.
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.  相似文献   
3.
This paper presents a prediction-based image-hiding scheme that embeds secret data into compression codes during image compression. This scheme employs a two-stage structure: a prediction stage and an entropy coding stage. The secret data is embedded into the difference values of a given image after the prediction stage is performed.According to the experimental results, the image quality is better than Jpeg-Jsteg and its improved scheme (Inform. Sci. 141 (1-2) (2002) 123). The average image quality of the stego-images in the proposed scheme is greater than 50 dB when the hiding capacity is 1 bit per pixel, whereas those values in Jpeg-Jsteg and scheme in Chang et al. (Inform. Sci. 141 (1-2) (2002) 123) are 37.04 and 33.73 dB, respectively. The hiding capacity of the proposed scheme is 65,536 bits when the hiding capacity is 1 bit per pixel, whereas it is 53,248 bits in scheme (Inform. Sci. 141 (1-2) (2002) 123) and less than 3000 bits in Jpeg-Jsteg.  相似文献   
4.
In this paper, we present a steganographic method for embedding a color or a grayscale image in a true color image. Three types of secret images can be carried by the proposed method: hiding a color secret image, hiding a palette-based 256-color secret image, and hiding a grayscale image in a true color image. Secret data are protected by the conventional crypto system DES. We compare the image quality and hiding capacity of the proposed method with those of the scheme in Lin et al.’s scheme. According to the experimental results, the image quality of the proposed method is better than that of the Lin et al.’s scheme. In addition, annotation data can be hidden with the secret image in the host image. The hiding capacity of the proposed method is greater than that of other compared schemes. The experimental results show that the proposed method is a secure steganographic method that provides high hiding capacity and good image quality.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号