# [1]唐燕,闾国年,殷奎喜.基于规范类正交矩阵的信息隐藏算法[J].东南大学学报(自然科学版),2013,43(1):45-49.[doi:10.3969/j.issn.1001-0505.2013.01.009] 　Tang Yan,Lü Guonian,Yin Kuixi.Information hiding algorithm based on normal similar-orthogonal matrices[J].Journal of Southeast University (Natural Science Edition),2013,43(1):45-49.[doi:10.3969/j.issn.1001-0505.2013.01.009] 点击复制 基于规范类正交矩阵的信息隐藏算法() 分享到： var jiathis_config = { data_track_clickback: true };

43

2013年第1期

45-49

2013-01-20

## 文章信息/Info

Title:
Information hiding algorithm based on normal similar-orthogonal matrices

1南京师范大学虚拟地理环境教育部重点实验室, 南京 210046; 2南京师范大学泰州学院, 泰州 225300; 3南京师范大学物理科学与技术学院, 南京 210046
Author(s):
1Key Laboratory of Virtual Geographic Environment of Ministry of Education, Nanjing Normal University, Nanjing 210046, China
2Taizhou College, Nanjing Normal University, Taizhou 225300, China
3School of Physics and Technology, Nanjing Normal University, Nanjing 210046, China

Keywords:

TH918.3
DOI:
10.3969/j.issn.1001-0505.2013.01.009

Abstract:
A kind of normal similar-orthogonal(NS)matrices is defined. The cross-correlation coefficient of any two rows in the NS matrices is a constant and the number of columns has no bounds. First, the secret information is coded by a NS matrix and embedded into the same frequency components of 2×2 discrete cosine transform coefficients of the original image, which can improve the security of the information hiding algorithm. Then, by introducing a greedy algorithm based on parameters, the fast generator of NS matrices is realized. Finally, by using image neighboring relativity, the secret information can be totally extracted. The analysis results of empirical data show that there are trade-off relations among the embedded information number, the group number, the cross-correlation parameter and the detection error probability. The simulation results demonstrate that the proposed method has low image distortion, high embedding capacity and high robust.

## 参考文献/References:

[1] 王也隽. 信息隐藏技术及其军事应用 [M].北京:国防工业出版社,2011:2-10.
[2] Peng Deyun, Wang Jiazhen, Yang Sumin, et al. CDMA based multiple-user digital watermarking [C]//Proceedings of the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Pasadena, CA,USA, 2006: 75-78.
[3] Vassaux B,Bas P, Chassery J M. A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness [C]//Proceedings of the 2001 International Conference on Image Processing. Thessaloniki, Greece, 2001: 6572.
[4] 朱岩, 杨永田. 扩频CDMA水印性能分析及其应用研究 [J]. 哈尔滨工业大学学报, 2006, 38(12): 2116-2200.
Zhu Yan,Yang Yongtian. Performance analysis of spread spectrum CDMA watermarking and applied research [J]. Journal of Harbin Institute of Technology, 2006, 38(12): 2116-2200.(in Chinese)
[5] 高琪, 李人厚. 基于Gold码的扩频数字水印算法 [J]. 西安交通大学学报, 2004, 38(2): 119-123.
Gao Qi, Li Renhou. Spread spectrum digital watermarking algorithm using gold codes[J]. Journal of Xian Jiaotong University, 2004, 38(2): 119-123.(in Chinese)
[6] 唐燕, 闾国年, 殷奎喜,等. 基于多参量变化规范类正交矩阵的信息隐藏与提取方法: 中国, 201210001708.X[P]. 2012-01-05.
[7] 查艳芳,殷奎喜,吴游,等.多维类正交伪随机扩展矩阵的构成装置: 中国, 200910264377.7[P]. 2009-12-21.
[8] 殷奎喜,查艳芳,赵华等.多维类正交伪随机扩展矩阵的构成方法: 中国, 200910264376.2[P]. 2009-12-21.
[9] Roger A H, Charles R J. Matrix analysis [M]. Cambridge: Cambridge University Press, 1985: 102-130.
[10] 彭德云, 王嘉祯, 杨素敏,等. 信息隐藏的空间概念模型构建 [J]. 武汉大学学报:理学版, 2006, 52(5): 560-564.
Peng Deyun, Wang Jiazhen, Yang Sumin, et al. Space model of information hiding [J]. Journal of Wuhan University: Natural Science Edition, 2006, 52(5): 560-564.(in Chinese)
[11] Moulin P, Osullivan A J. Information-theoretic analysis of information hiding [J]. IEEE Trans on Information Theory, 2003, 49(3): 1-66.
[12] Hernandez J R, Fernando P G, Jose M R, et al. Performance analysis of a 2D-multipulse amplitude modulation scheme for data hiding and watermarking of still images [J]. IEEE J Select Areas Communication, 1998, 16(4): 510-524.