[1]刘光杰,林嵘,戴跃伟,等.用于EZW编码图像中的安全隐写算法[J].东南大学学报(自然科学版),2008,38(6):975-980.[doi:10.3969/j.issn.1001-0505.2008.06.008]
 Liu Guangjie,Lin Rong,Dai Yuewei,et al.Secure steganographical algorithm for EZW-encoded images[J].Journal of Southeast University (Natural Science Edition),2008,38(6):975-980.[doi:10.3969/j.issn.1001-0505.2008.06.008]
点击复制

用于EZW编码图像中的安全隐写算法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
38
期数:
2008年第6期
页码:
975-980
栏目:
计算机科学与工程
出版日期:
2008-11-20

文章信息/Info

Title:
Secure steganographical algorithm for EZW-encoded images
作者:
刘光杰 林嵘 戴跃伟 王执铨
南京理工大学自动化学院, 南京 210094
Author(s):
Liu Guangjie Lin Rong Dai Yuewei Wang Zhiquan
School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China
关键词:
隐写 EZW 相对熵 量化嵌入
Keywords:
steganography embedded zerofree wavelet relative entropy quantization-based embedding
分类号:
TP391
DOI:
10.3969/j.issn.1001-0505.2008.06.008
摘要:
提出一种EZW编码图像中的安全隐写算法,该算法以嵌入前后EZW重构小波系数分布的相对熵作为安全指标,采用熵解码变换的方法,将数据比特映射为具有指定分布的0/1比特,并利用量化嵌入机制实现数据的嵌入.所提算法可实现载体和隐写信号一阶统计特性的保持,因此具有一阶的统计安全性.实现结果同时表明,该算法在容量、感知质量和安全性上具有较好的综合性能.
Abstract:
A secure steganographical algorithm is proposed. The algorithm takes the relative entropy of the EZW(embedded zerofree wavelet)-reconstructed wavelet coefficient distributions before and after data embedding as the security object, and uses the entropy decoding transformation method to map the data bits to the bit sequence with given distribution and perform data embedding based on quantization. The proposed method can hold the first-order statistics, so it has the first-order security. The experimental results also show that the proposed algorithm has better synthetic performance in capacity, perceptibility quality and security.

参考文献/References:

[1] Shapiro J M.Embedded image coding using zerotrees of wavelet coefficients[J].IEEE Transaction on Signal Processing,1993,41(12):3445-3462.
[2] Spaulding J,Noda H,Shirazi M N,et al.BPCS steganography using EZW lossy compressed images[J]. Pattern Recognition Letters,2002,23(13):1579-1587.
[3] Pla O G,Lin E T,Delp E J.A wavelet watermarking algorithm based on a tree structure[C] //Proceedings of SPIE,Security,Steganography and Watermarking of Multimedia Contents VI.San Jose,CA,2004:571-580.
[4] 郭越,程景云.基于视觉感知与EZW的自适应公开水印算法[J].复旦学报:自然科学版,2004.43(5):907-909.
  Guo Yue,Cheng Jingyun.Algorithm of adaptive watermarking based on HVS and EZW,[J]. Journal of Fudan University:Natural Science,2004,43(5):907-909.(in Chinese)
[5] 翁洁琼,张志浩,来可伟.一种复合型自适应数字水印算法[J].计算机应用,2005,25(3):557-562.
  Weng Jieqiong,Zhang Zhihao,Lai Kewei.An algorithm of compound adaptive digital watermarking[J]. Computer Applications,2005,25(3):557-562.(in Chinese)
[6] Kwak W G,Park R H.Data hiding using bit repetition in the wavelet significant tree structure[C] //Proceedings of IASTED International Conference Signal and Image Processing.Malaga,Spain,2002:520-524.
[7] Michiharu N,Richard O,Hideki N,et al.Intensity histogram steganalysis in BPCS-steganography[C] //Proceedings of SPIE,Security,Steganography and Watermarking of Multimedia Contents Ⅲ.San Jose,CA,2001:555-564.
[8] Yu X Y,Tan T N,Wang Y H.Reliable detection of BPCS-steganography in natural images[C] //Proceedings of the 3rd International Conference on Image and Graphics.Hong Kong,China,2004:333-336.
[9] Cachin C.An information-theoretic model for steganography[J]. Information and Computation,2004,192(1):41-56.
[10] Provos N.Defending against statistical steganalysis[C] //Proceedings of 10th USENIX Security Symposium.Washington DC,USA,2001:323-336.
[11] Solanki K,Sullivan K,Madhow U,et al.Statistical restoration for robust and secure steganography[C] //Proceedings of IEEE International Conference on Image Processing.Genoa,Italy,2005:1118-1121.
[12] Eggers J J,Bauml R,Girod B.A communications approach to image steganography[C] //Proceedings of SPIE:Security and Watermarking of Multimedia Contents IV.San Jose,CA,2002:26-37.
[13] Sallee P.Model-based steganography[C] //Proceedings of International Workshop on Digital Watermarking,LNCS2939.Soul,Korea,2004:154-167.
[14] Zhang X P,Wang S Z,Zhang K W.Steganography with least histogram abnormality[C] //Proceedings of International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security,LNCS2776.Shanghai,China,2003:395-406.
[15] Bohme R,Westfeld A.Breaking cauchy Model-based steganography with first order statistics[C] //Proceedings of 9th European Symposium on Research in Computer Security,LNCS3193.Riviera,France,2004:125-140.

备注/Memo

备注/Memo:
作者简介: 刘光杰(1980—),男,博士,讲师,guangj_liu@yahoo.com.cn.
基金项目: 国家自然科学基金资助项目(60374066).
引文格式: 刘光杰,林嵘,戴跃伟,等.用于EZW编码图像中的安全隐写算法[J].东南大学学报:自然科学版,2008,38(6):975-980.
更新日期/Last Update: 2008-11-20