期刊文献+

基于乘同余的LSB数字图像信息隐写

MCM-BASED LSB STEGANOGRAPHY FOR DIGITAL IMAGES
在线阅读 下载PDF
导出
摘要 为了提高针对LSB隐写的抗隐写分析能力,提出在数字图像上利用乘同余的离散特性实现LSB信息隐写,使嵌入信息在载体图像噪声空间内得到均布,提高隐写信息的抗分析能力的方案;研究乘同余和载体图像位面噪声特征;对比分析信息隐写前后的图像噪声特征,并通过实验验证基于乘同余的LSB数字图像信息隐写方法可加强隐藏信息的隐秘性。 For improving the ability of anti-steganalysis against LSB steganography, we propose that to implement the LSB information steganography on digital image using the discrete characteristics of the multiplicative congruential method (MCM) to make the embedding information to be distributed uniformly in noise space of carrier image so as to improve the anti-analysis ability of the steganography information; we studied the MCM and the noise features on bit-plane of the carrier image ; comparatively analysed the noise features of image before and after the steganography, and verified through the experiment that the MCM-based LSB information steganography for digital images can enhance the secrecy of information hiding.
作者 聂鹏
出处 《计算机应用与软件》 CSCD 北大核心 2013年第7期197-199,212,共4页 Computer Applications and Software
基金 江西省科技厅基金项目(2009BHA19200)
关键词 信息安全 信息隐写 图像噪声 乘同余 Information security Steganography Image noise Multiplicative congruential method
  • 相关文献

参考文献7

  • 1张新鹏,王朔中,张开文.基于统计特性的LSB密写分析[J].应用科学学报,2004,22(1):16-19. 被引量:16
  • 2孙露霞,陈丽亚,李建华.彩色BMP图像LSB隐藏的检测算法[J].计算机工程与应用,2005,41(30):43-45. 被引量:2
  • 3Yu X, Babaguchi N. Run length based steganalysis for LSB matching steganography [ M ]. Hannover, Germany : IEEE Press, 2008.
  • 4耿素云,屈婉玲,张立昂.离散数学[M].北京:清华大学出版社,2008.
  • 5徐旭,平西建,张涛,王国新.针对LSB匹配隐写的图像复原隐写分析[J].计算机辅助设计与图形学学报,2009,21(2):262-267. 被引量:7
  • 6Fridfich J, Goljan M. Practical Steganalysis of Digital Images - State of the Art [ C ]//San Jose, California: International Society for Optical Engineering, 2002.
  • 7Chandramouli R, Kharrazi M, Memon N. Image Steganography and Steganalysis: Concepts and Practice[ M]. Seoul, Korea: Springer, 2004.

二级参考文献20

  • 1Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C] //Proceedings of SPIE, Santa Clara, 2003, 5022:131-142.
  • 2陈丹,王育民.一种针对加性空域掩密算法的通用掩密分析技术研究[c]//第7届全国信息隐藏暨多媒体信息安全学术大会论文集,南京,2007:233-237.
  • 3Mehrabi M A, Faez K, Bayesteh A R. Image steganalysis based on statistical moments of wavelet subband histograms in different frequencies and support vector machine [C]// Proceedings of IEEE the 3rd International Conference on Natural Computation, Haikou, 2007:24-27.
  • 4Liu Q Z, Sung A H, Ribeiro B, etal. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1):21-36.
  • 5Liu Q Z, Sung A H, Chen Z X, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayseale images[J]. Pattern Recognition, 2008, 41(1): 56-66.
  • 6Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[M] // Lecture Notes in Computer Science. Heidelberg: Springer, 2003, 2578:310- 323.
  • 7Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6) :441-444.
  • 8Gonzalez R C,Woods RE.数字图像处理[M].第2版.阮秋琦,阮宇智,等译.北京:电子工业出版社,2003:175-183.
  • 9University of Washington. CBIR image database[OL]. (2005-12-10) [2008 03-14]. http://www, cs. washington. edu/research/imagedatabase/roundtruth/.
  • 10N F Johnson ,S Jajodia.Steganalysis of images created using current steganography software[C].In:Workshop on Information Hiding,LNCS 1525,1998.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部