[1]张湛,刘光杰,王俊文,等.图像预测误差域的动态补偿安全隐写算法[J].南京理工大学学报(自然科学版),2010,(02):187-192.
 ZHANG Zhan,LIU Guang-jie,WANG Jun-wen,et al.Dynamic Compensation Secure Steganographic Algorithm in Prediction-error Domain[J].Journal of Nanjing University of Science and Technology,2010,(02):187-192.
点击复制

图像预测误差域的动态补偿安全隐写算法
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
期数:
2010年02期
页码:
187-192
栏目:
出版日期:
2010-04-30

文章信息/Info

Title:
Dynamic Compensation Secure Steganographic Algorithm in Prediction-error Domain
作者:
张湛 刘光杰 王俊文 戴跃伟 王执铨
南京理工大学自动化学院, 江苏南京210094
Author(s):
ZHANG ZhanLIU Guang-jieWANG Jun-wenDAI Yue-weiWANG Zhi-quan
School of Automation,NUST,Nanjing 210094,China
关键词:
信息隐藏 隐写 动态补偿 马尔可夫链 统计二阶保持 预测误差域
Keywords:
information hiding steganography dynamic compensation Markov chain second-order distribution maintain prediction-error domain
分类号:
TP309.7
摘要:
为了保证载密图像嵌入大量信息后的高阶统计安全性,该文将图像马尔可夫链模型推广至图像预测误差域,根据动态补偿的原理提出运用于图像预测误差域的二阶统计保持隐写算法。该算法根据隐写对图像预测误差马尔可夫链模型统计分布的改变情况,指导嵌入函数,运用后嵌入的隐秘信息动态补偿前期嵌入对图像二阶统计特性的改变,从而在不损失嵌入容量的情况下提高隐写的统计安全性。实验表明,该隐写算法在较大容量的数据嵌入过程中,能很好保持图像统计特性,提高隐写安全性。
Abstract:
In order to ensure the high-order statistical security of stego-images into which large amount of information is embedded,the image Markov chain model is extended to the prediction-error domain of image.Based on the dynamic compensation theory,a novel steganographic algorithm preserving second-order statistical properties in prediction-error domain is proposed.According to the changes of cover-image prediction-error Markov chain statistical distribution,the algorithm guides embedded functions to make use of post-embedding secret information to compensate dynamically the second-order statistical changes of cover-image caused by pre-embedding.The statistical security of stego-image is improved without loss of the steganographic capacity.The experimental results show: when large-capacity information is embedded,the proposed algorithm has high ability to preserve the second-order statistical properties in prediction-error domains of cover images and to improve the steganographic security.

参考文献/References:

[1]Luo X Y, W ang D S, W ang P, e t a.l A rev iew on b lind detec tion fo r im ag e steganography [ J]. S ignal Processing, 2008, 88( 9) : 2138- 2157.
[2] Zhang X P, W ang S Z, Zhang K W. S teganog raphy w ith least h istog ram abnorm a lity [ A ]. Lecture No tes in Compu ter Sc ience: Interna tiona l W o rkshop on M athem aticalM ethods, M ode ls, and Arch itectures for Computer Netwo rk Security [ C ]. Pete rsburg: Spr inger, 2003: 395- 406.
[3] Provos N. OutGuess[ EB /OL] . www. outguess. org, 2004 /2008.
[4] Eggers J, Joachmi J, Baum lR, et a.l A communications approach to mi age steganog raphy [ A ]. Proceed ings of SPIE-The International Soc iety for Optica l Eng ineer ing [ C]. San Jose: SPIE, 2002. V( 4675): 26- 37.
[5] Liu G J, L ian S G, Ren Z, et a.l Im age steganography based on quantization-embedders com bination [ A ]. Proceed ing s of the 2007 IEEE Interna tiona l Conference onMu ltimedia and Expo, ICME 2007 [ C]. Beijing: IEEE, 2007: 1115- 1118.
[6] Su llivan K, So lanki K, Manjunath B S, e t a.l Determ-i n ing achievable rates fo r secure, zero divergence, steganography[ A ]. 2006 Internationa l Conference on Im age Processing[ C]. A tlanta: IEEE, 2006: 121- 124.
[7] Sarkar A, So lank iK, M adhow U, et a .l Secure steganog raphy: statistica l restoration o f the second order dependenc ies fo r im proved secur ity [ A ]. 2007 IEEE Interna tiona l Conference on Acoustics, Speech, and S ignal Processing [ C ]. Piscataw ay: IEEE, 2007. 2( II): 277- 280. [ 8 ] C ach in C. An inform ation-theo re tic m ode l fo r steganography[ J]. Inform ation and Com putation, 2004, 192( 1): 41- 56.
[9] Amba lavanan A, Chandram ou li R. A Bayesian im age stegana lysis appro ach to estim ate the embedded secret m essage leng th[ A] . Proceed ing s of the 7 thW orkshop onM ultim edia and Secur ity [ C ]. New Yo rk: ACM, 2005: 33- 38. [ 10 ] Su llivan K, M adhow U, Chandrasekaran S, et a.l Steg ana lysis fo rM arkov cover data w ith app lications to im ag es[ J]. IEEE Transactions on In fo rm ation Fo rensics and Security, 2006, 1( 2): 275- 287.
[11] Schae fe rG, StichM. UC ID?? An Uncompressed Co-l our Im age Database [ EB /OL ]. http: / / vision. cs. aston. ac. uk /datasets /UC ID /uc id. htm ,l 2004 /2008.

相似文献/References:

[1]谢建全,谢勍,黄大足,等.一种抗JPEG压缩的大容量信息隐藏算法[J].南京理工大学学报(自然科学版),2011,(02):257.
 XIE Jian-quan,XIE Qing,HUANG Da-zu,et al.High Capacity Information Hiding Algorithm Resisting to JPEG[J].Journal of Nanjing University of Science and Technology,2011,(02):257.
[2]朱保平,钱坤,刘凤玉,等.基于YCbCr模型和传统ARQP算法的信息隐藏算法[J].南京理工大学学报(自然科学版),2009,(04):427.
 ZHU Bao-ping,QIAN Kun,LIU Feng-yu.Algorithm of Steganography Based on YCbCr Model and Traditional ARQP Algorithm[J].Journal of Nanjing University of Science and Technology,2009,(02):427.
[3]刘春庆,王执铨.一种安全的隐秘通信系统方案[J].南京理工大学学报(自然科学版),2004,(02):113.
 LIU Chun-qing,WANG Zhi-quan.Secure Scheme of Steganographic System[J].Journal of Nanjing University of Science and Technology,2004,(02):113.
[4]茅耀斌,戴跃伟,王执铨.一种基于Baker映射的图像信息隐藏方法[J].南京理工大学学报(自然科学版),2002,(02):152.
 MaoYaobin DaiYuewei WangZhiquan.An Image Information Hiding Scheme Based on Baker Map[J].Journal of Nanjing University of Science and Technology,2002,(02):152.
[5]钱玉文,宋华菊,张彤芳,等.一种网络协同隐蔽时间信道模型[J].南京理工大学学报(自然科学版),2013,37(05):741.
 Qian Yuwen,Song Huaju,Zhang Tongfang,et al.Model of synergetic network covert timing channel[J].Journal of Nanjing University of Science and Technology,2013,37(02):741.

备注/Memo

备注/Memo:
基金项目: 江苏省自然科学基金( BK2008403) ?? 作者简介: 张湛( 1974- ), 男, 博士生, 主要研究方向: 多媒体信息隐藏, E-mail: b lacksnown@ 126. com; 通讯作 者: 王执铨( 1939- ), 男, 教授, 博士生导师, 主要研究方向: 多媒体信息安全、容错控制等, E-mail: w ang zqwhz@ yahoo. com. cn。
更新日期/Last Update: 2010-04-30