[1]李晓龙,杨斌.LSB Matching的嵌入效率分析[J].南京理工大学学报(自然科学版),2008,(04):429-433.
 LI Xiao-long,YANG Bin.Analysis on Embedding-efficiency of LSB Matching[J].Journal of Nanjing University of Science and Technology,2008,(04):429-433.
点击复制

LSB Matching的嵌入效率分析
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
期数:
2008年04期
页码:
429-433
栏目:
出版日期:
2008-08-30

文章信息/Info

Title:
Analysis on Embedding-efficiency of LSB Matching
作者:
李晓龙;杨斌;
北京大学计算机科学技术研究所, 北京100871
Author(s):
LI Xiao-longYANG Bin
Institute of Computer Science and Technology,Peking University,Beijing 100871,China
关键词:
隐写 LSB matching 嵌入效率 完全覆盖集
Keywords:
steganography LSB matching embedding-efficiency completely covering set
分类号:
TP309.7
摘要:
为了提高LSB matching算法的嵌入效率,提出了使用完全覆盖集的隐写方法。建立了基于完全覆盖集的隐写方法的理论框架,使用将像素点分组的方式对每组像素点来嵌入信息,同时保证了在嵌入过程中每点像素值最多改变1。给出了基于不同参数的完全覆盖集的具体例子以及与之相应的隐写方法的嵌入效率。计算结果表明:由完全覆盖集所给出的隐写方法能够显著提高LSB matching的嵌入效率。
Abstract:
To improve the embedding-efficiency of LSB matching,a novel steganographic scheme based on completely covering set(CCS) is proposed.The theoretical framework of the CCS-based steganographic scheme is given,in which pixels are divided into groups and secret data are embedded into each group.The proposed scheme guaranties that the pixel value changes at most one in the embedding process.Examples of CCS with different parameters are given,and the embedding-efficiencies of the corresponding schemes are calculated.It shows that the CCS based steganographic scheme can significantly improve the embedding-efficiency of LSB matching.

参考文献/References:

[1] 王朔中, 张新鹏, 张开文. 数字密写和密写分 析) ) ) 互联网时代的信息战技术[M ] . 北京: 清华 大学出版社, 2005.
[2] C randa ll R. Som e no tes on steganography [ EB /OL]. http: / /os. in.f tu-dresden. de /~ westfeld/ cranda l.l pd,f 1998.
[3] W estfe ld A. F5-A steganog raph ic a lgo rithm [ A ]. Proceedings o f the 4 th Internationa lWo rkshop on Inform ation H id ing [ C ]. Berlin: Springer-Ver lag, 2001. 289- 302.
[4] B ierbrauer J, Fridr ich J. Constructing good cover ing codes fo r applica tions in steg anography [ EB /OL]. h-t tp: / /www. m ath. m tu. edu / ~ jb ierbra /HOMEZEUGS / stegocov surveyOct06. ps, 2006.
[5] Fridr ich J, L isonek P, Soukal D. On steganographic embedding effic iency [ A]. Proceed ings of the 8th InternationalWorkshop on Inform ation H iding [ C]. Berlin: Spr inger-Verlag, 2006. 282- 296.
[6] M unuera C. Steganography and error-correcting codes [ J] . S igna lProcessing, 2007, 87( 4): 1528- 1533.
[7] Cohen G D, Honkala I, Litsyn S, et a.l Cover ing codes [M ]. Amsterdam: North-H olland/E lsev ier, 1997.
[8] Sharp T. An im plem entation o f key-based dig ital signal steg anog raphy [ A] . Proceed ing s o f the 4th Inte rnationalW orkshop on Inform ation H id ing [ C ]. Be rlin: Spr inge r-Ver lag, 2001. 13- 26.
[9] Fr idr ich J, L isonek P. G rid co lor ings in steganog raphy [ J]. IEEE Trans on Inform ation Theory, 2007, 53( 2): 1547- 1549

相似文献/References:

[1]刘光杰,戴跃伟,赵玉鑫,等.隐写对抗的博弈论建模[J].南京理工大学学报(自然科学版),2008,(02):199.
 LIU Guang-jie,DAI Yue-wei,ZHAO Yu-xin,et al.Modeling Steganographic Counterwork by Game Theory[J].Journal of Nanjing University of Science and Technology,2008,(04):199.

备注/Memo

备注/Memo:
作者简介: 李晓龙( 1976- ) , 男, 辽宁沈阳人, 博士后, 主要研究方向: 数字图像处理和信息安全, E-mail: lix iao long @ icst. pku. edu. cn; 通讯作者: 杨斌( 1969- ) , 男, 四川资阳人, 硕士, 副研究员, 主要研究方向: 数字图 像处理和信息安全, E-mail: yangbin@ icst. pku. edu. cn。
更新日期/Last Update: 2012-12-19