一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

一種動態(tài)更新失真代價的自適應k隱寫算法

湯光明 邊媛 韋大偉 高瞻瞻 朱垚臻

湯光明, 邊媛, 韋大偉, 高瞻瞻, 朱垚臻. 一種動態(tài)更新失真代價的自適應k隱寫算法[J]. 電子與信息學報, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
引用本文: 湯光明, 邊媛, 韋大偉, 高瞻瞻, 朱垚臻. 一種動態(tài)更新失真代價的自適應k隱寫算法[J]. 電子與信息學報, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254
Citation: TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen. Adaptive k Steganography Based on Dynamic Updating Distortion Cost[J]. Journal of Electronics & Information Technology, 2017, 39(1): 58-65. doi: 10.11999/JEIT160254

一種動態(tài)更新失真代價的自適應k隱寫算法

doi: 10.11999/JEIT160254 cstr: 32379.14.JEIT160254
基金項目: 

國家自然科學基金(61303074),信息保障技術(shù)重點實驗室開放基金(KJ-14106)

Adaptive k Steganography Based on Dynamic Updating Distortion Cost

Funds: 

The National Natural Science Foundation of China (61303074), The Foundation of Science and Technology on Information Assurance Laboratory (KJ-14106)

  • 摘要: 基于失真函數(shù)的自適應隱寫技術(shù)在嵌入過程中,忽略了嵌入操作相互間的影響,隱寫策略無法隨載體統(tǒng)計特性的改變自適應地調(diào)節(jié)??紤]嵌入操作的交互影響,該文提出一種基于動態(tài)更新失真代價的k隱寫算法。首先分析了中心像素與其鄰域的相關(guān)性,理論證明了在4-鄰域修改情況下中心像素的最優(yōu)修改方式,進而提出了失真代價更新策略MDS(Modification Degree Strategy);并結(jié)合該策略設計實現(xiàn)了一種自適應k隱寫算法。實驗表明,五元修改方式下算法UNIWARD-MDS(Pentary Version)在高嵌入率下(0.5~1.0 bpp)的抗SRM檢測性優(yōu)于S-UNIWARD(Pentary Version),同時在抵抗maxSRMd2檢測時不同嵌入率下均優(yōu)于S-UNIWARD(Pentary Version);三元修改方式下算法HILL-MDS和UNIWARD-MDS(Ternary Version)抗檢測性能優(yōu)于對應的自適應隱寫算法HILL和S-UNIWARD(Ternary Version)。
  • 韓濤, 祝躍飛. 基于 Canny 邊緣檢測的自適應空域隱寫術(shù)[J]. 電子與信息學報, 2015, 37(5): 1266-1270. doi: 10.11999/ JEIT141121.
    HAN Tao and ZHU Yuefei. Adaptive spatial steganography based on Cannys edge detection[J]. Journal of Electronics Information Technology, 2015, 37(5): 1266-1270. doi: 10. 11999/JEIT141121.
    FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. doi: 10.1109/TIFS.2011. 2134094.
    GUL G and KURUGOLLU F. A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)[J]. LNCS, 2011, 6958: 71-84.
    PENVY T, BAS P, and FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[C]. Proceedings of the 11th ACM Multimedia and Security Workshop, Princeton, NJ, USA, September 2009: 75-84.
    HOLUB V and FRIDRICH J. Designing steganographic distortion using directional filters[C]. Proceedings of the IEEE Workshop on Information Forensic and Security, Tenerife, Spain, 2012: 234-239.
    HOLUB V and FRIDRICH J. Digital image steganography using universal distortion[C]. Proceedings of 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 2013: 59-68.
    LI Bin, WANG Ming, HUANG Jiwu, et al. A new cost function for spatial image steganography[C]. Proceedings of the IEEE International Conference on Image Processing, Pairs, France, 2014: 4206-4210.
    LI Bin, TAN Shunquan, WANG Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. doi: 10.1109/TIFS.2014.2326954.
    FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. doi: 10.1109/ TIFS.2010.2077629.
    TOMAS Denmark and FRIDRICH J. Improving steganographic security by synchronizing the selection channel[C]. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, Oregon, USA, 2015: 5-14. doi: 10.1145/2756601.2756620.
    LI Bin, WANG Ming, TAN Shunquan, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905-1917. doi: 10.1109/ TIFS.2434600.
    BAS P and PENVY T. Break our steganographic system-the ins and outs of organizing BOSS[J]. LNCS, 2011, 6598: 59-70.
    KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. doi: 10.1109/TIFS.2011.2175919.
    FRIDRICH J and KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. doi: 10.1109/TIFS.2012.2190402.
    FRIDRICH J. Content-adaptive pentary steganography using the multivariate generalized gaussian cover model[C]. Proceeding of SPIE-The International Society for Optical Engineering, San Francisco, CA, USA, 2015, 9409: 94090H- 94090H-13.
    TOMAS Denmark, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, CA, USA, 2014: 48-53.
  • 加載中
計量
  • 文章訪問數(shù):  1543
  • HTML全文瀏覽量:  127
  • PDF下載量:  370
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-03-17
  • 修回日期:  2016-08-17
  • 刊出日期:  2017-01-19

目錄

    /

    返回文章
    返回