[1]张卫明,张新鹏,王朔中,等.适用于灰度级信号的数据嵌入方法[J].南京理工大学学报(自然科学版),2008,(02):209-213.
 ZHANG Wei-ming,ZHANG Xin-peng,WANG Shuo-zhong.Methods for Embedding Data in Gray-scale Signals[J].Journal of Nanjing University of Science and Technology,2008,(02):209-213.
点击复制

适用于灰度级信号的数据嵌入方法
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
期数:
2008年02期
页码:
209-213
栏目:
出版日期:
2008-04-30

文章信息/Info

Title:
Methods for Embedding Data in Gray-scale Signals
作者:
张卫明;张新鹏;王朔中;
1. 上海大学通信与信息工程学院, 上海200072; 2. 信息工程大学信息工程学院, 河南郑州450002
Author(s):
ZHANG Wei-ming12ZHANG Xin-peng1WANG Shuo-zhong1
1.School of Communication and Information Engineering,Shanghai University,Shanghai 200072,China;2.Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China
关键词:
隐写码 矩阵编码 湿纸码 嵌入率 最大平均失真
Keywords:
steganographic codes matrix coding wet paper codes embedding rate maximum average distortion
分类号:
TN911
摘要:
针对灰阶信号载体,研究了高效数据嵌入方法。利用二元隐写编码和湿纸编码,对±1隐写提出了双层嵌入方法,证明了只要二元隐写码达到二元隐写的嵌入率上界,则对应的双层嵌入可达到±1隐写的嵌入率上界。进一步对±2隐写提出了三层嵌入方法,分析了三层嵌入与嵌入率理论上界的距离,分析结果表明,将双层嵌入和三层嵌入组合即可得到近似最优的±2隐写方法。
Abstract:
Efficient methods for embedding data in gray-scale signals are presented.By using binary steganographic codes and wet paper codes,a "double-layered" embedding scheme for ±1 steganography is proposed.It is proved out that the corresponding "double-layered" embedding can achieve the upper bound of ±1 steganography if the bianry stego-code reaches the upper bound on embedding rate of binary steganography.A "triple-layered" embedding scheme for ±2 steganography is presented.The distance between the "triple-layered" embedding and the upper bound is analysed.The results show that the near optimal embedding schemes for ±2 steganography can be obtained by combining "double-layered" and "triple-layered" embedding methods.

参考文献/References:

[1] Cranda llR. Some no tes on steganography [ EB /OL]. http: / / os. in.f tu??dresden. de /~ westfeld/ cranda l.l pd,f 2007- 01- 15.
[2] W estfeld A. F5??A steganog raph ic a lgor ithm: h igh ca?? pac ity despite better stegana ly sis [ A ]. Proc o f In fo r?? m ation H id ing, the 4th Internationa lW orkshop [ C ]. Ber lin: Springer??Verlag, 2001. 289- 302.
[3] Ga land F, Kaba tiansky G. Inform ation h id ing by cov?? e rings [ A ]. Proc o f the IEEE Inform a tion Theory W orkshop [ C] . Ame rica: IEEE, 2004. 151- 154.
[4] B ierbrauer J, Fr idrich J. Constructing good cover ing codes for app lications in steganog raphy [ EB /OL]. ht?? tp: / /www. w s. b ingham ton. edu / fr idr ich/Research / stegocovsurveyOct07. pd,f 2007- 04- 03.
[5] Sch??fe ld D, W inkler A. Embedd ing w ith syndrom e coding based on BCH codes [ A ]. Proc o f ACM the 8thW o rkshop onM ultim edia and Secur ity [ C]. New York: A ssoc iation fo r Computing M ach inery, 2006. 214- 223.
[6] Fridr ich J, Souka lD. M atr ix em bedding fo r large pay?? loads [ J] . IEEE Transactions on In fo rm ation Secur ity and Forens ics, 2006, 1 ( 3): 390- 394.
[7] Fridr ich J, Filler T. Practica l me thods for m in im izing embedd ing im pact in steganog raphy [ EB /OL] . ht?? tp: / /www. w s. bingham ton. edu / fr idr ich/Research / m a in03. pd,f 2007- 04- 03.
[8] W illems F, D ijkM. Capac ity and codes for embedd ing info rma tion in gray??scale signals [ J]. IEEE T ransac?? tions on Inform ation Theory, 2005, 51 ( 3): 1 209 - 1 214.
[9] Zhang X, W ang S. E ffic ient steganographic embedd ing by exp lo iting m odifica tion d irection [ J] . IEEE Com?? m un ications Lette rs, 2006, 10 ( 11): 781- 783.
[10] Fridr ich J, Lison??k P. Gr id co lor ing in steganography [ J]. IEEE Transactions on Inform ation Theory, 2007, 53 ( 4): 1 547- 1 549.
[11] Fr idrich J, Go ljan M, Lisonek P, e t a.l W riting on we t pape r [ J]. IEEE Transac tions on Signa l Process?? ing, 2005, 53 ( 10): 3 923- 3 935.

相似文献/References:

[1]彭忆炎,孔建寿,陈 轩,等.面向智能制造的作业车间调度算法研究[J].南京理工大学学报(自然科学版),2017,41(03):322.[doi:10.14177/j.cnki.32-1397n.2017.41.03.008]
 Peng Yiyan,Kong Jianshou,Chen Xuan,et al.Job shop scheduling algorithm for intelligent manufacturing[J].Journal of Nanjing University of Science and Technology,2017,41(02):322.[doi:10.14177/j.cnki.32-1397n.2017.41.03.008]

备注/Memo

备注/Memo:
基金项目: 国家自然科学基金( 60502039, 60773039); 国家?? 863 计划( 2007AA01Z477) ; 中国博士后科学基金 ( 20070420096) ?? 作者简介: 张卫明( 1976- ), 男, 河北定州人, 讲师, 博士, 主要研究方向: 密码学和信息隐藏, E-mail: zwm shu@ gmail. com。
更新日期/Last Update: 2008-04-30