|Table of Contents|

Image Steganogrphic Algorithm Based on Zerotrees of DCT Coefficients


Research Field:
Publishing date:


Image Steganogrphic Algorithm Based on Zerotrees of DCT Coefficients
SUN Zi-wenJI Zhi-cheng
School of Communication and Control Engineering,Jiangnan University,Wuxi 214122,China
zerotrees discrete cosine transform coefficients histograms blocking effect steganographic algorithm robustness
Based on zerotrees of the discrete cosine transform(DCT) coefficients,a novel image steganographic algorithm is presented.By interchanging tow coefficients of middle to low frequency in a DCT domain block,the number of DCT zerotrees is changed.According to the parity of number of zerotrees the secrete message is embeded and extracted.The simulation results show that the steganographic algorithm is robust against JPEG compression,the DCT coefficients histogram can be protected,and the blocking effect can be avoided efficiently,so the algorithm can deffend against χ2-test.The secrete message can be extracted exactly and blindly.


[1] Shap iro JM. Embedded im age coding using zerotrees of w avelet coeffic ients [ J] . IEEE Transactions on S ig na l Pro cessing, 1993, 41 ( 12): 3 445- 3 463.
[2] Sa id A, Pearlm anW A. A new fast and effic ient im age codec based on set pa rtition ing in hierarchica l trees [ J]. IEEE Transac tions on C ircu its and System s fo r V ideo Techno logy, 1996, 6 ( 6): 243- 250.
[3] 董卫军, 周明权, 耿国华. 基于零树编码的数字水 印算法[ J]. 计算机科学, 2006, 33 ( 7 ): 153 - 154, 163.
[4] 卢春, 程晓平. 结合零树的小波域分形水印算法 [ J]. 西南农业大学学报(自然科学版) , 2006, 28 ( 6): 1 053- 1 056.
[5] X iong Z, Guleryuz O G, OrchardM T. A DCTbased em bedded im ag e coder [ J]. IEEE Signa l Process ing Letters, 1996, 3 ( 11): 289- 290.
[6] W u C F, H s iehW S. D ig ita lw aterm arking us ing zero tree o f DCT [ J]. IEEE Transactions on Consum er E lectron ics, 2000, 46 ( 1): 87- 94.
[7] N iu X M, Lu Z M, Sun S H. D ig ita l waterm ark ing based on zerotrees o f DCT co efficien ts [ A] . 4 th AST ED Inte rnational Confe rence on Signa l Processing and Comm un ica tions ( SPC ( 2000 ) [ C ] . M arbe lla, Spa in: IEEE Explo re, 2000. 111- 115.
[8] N iu X M, Lu ZM, Sun S H. D ig italwaterm arking based on error correction cod ing techn ique [ J]. Im age Process ing& Communications, 2000, 6 ( 1/2): 23- 28.
[9] Petitco las F A P, Anderson R J. Eva luation o f copy r ightm arking system s [ A ]. Proceed ing s of IEEEM u l tim edia System s( 99) [ C]. Florence, Ita ly: Springer, 1999. 574- 579.
[10] Provo sN, H oneym an P. Detec ting steg anog raph ic con tent on the internet. Techn ica l Report CITI 0111 [ R] . M ich igan, USA: Un ive rs ity o fM ich igan, 2001.
[11] 王朔中, 张新鹏, 张开文. 数字密写和密写分析 [M ]. 北京: 清华大学出版社.
[12] 刘光杰, 戴跃伟, 王金伟, 等. 模拟退火的安全数据 隐藏算法[ J]. 光学精密工程, 2007, 15 ( 5) : 791 - 797


Last Update: 2012-12-05