高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于非均匀DCT的量化索引调制隐写

邓艺 赵险峰 冯登国

邓艺, 赵险峰, 冯登国. 基于非均匀DCT的量化索引调制隐写[J]. 电子与信息学报, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399
引用本文: 邓艺, 赵险峰, 冯登国. 基于非均匀DCT的量化索引调制隐写[J]. 电子与信息学报, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399
Deng Yi, Zhao Xian-feng, Feng Deng-guo. Quantization Index Modulation Steganography Based on the Nonuniform DCT[J]. Journal of Electronics & Information Technology, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399
Citation: Deng Yi, Zhao Xian-feng, Feng Deng-guo. Quantization Index Modulation Steganography Based on the Nonuniform DCT[J]. Journal of Electronics & Information Technology, 2010, 32(2): 323-328. doi: 10.3724/SP.J.1146.2008.01399

基于非均匀DCT的量化索引调制隐写

doi: 10.3724/SP.J.1146.2008.01399

Quantization Index Modulation Steganography Based on the Nonuniform DCT

  • 摘要: 基于量化索引调制(QIM)的隐写技术正日益受到隐写分析的威胁。该文将通常在DCT域隐写的做法改为在非均匀DCT域进行,将参数作为密钥,提出了一种NDCT-QIM图像隐写方法。由于在攻击者猜测的域中,嵌入信号具有扩散性,NDCT-QIM方法不利于隐写分析对隐写特征的检测,分析和实验表明,它能够更好地抵御基于梯度能量、直方图及小波统计特征等常用统计量的隐写分析,增强了隐写的隐蔽性。
  • Johnson N and Jajodia S. Exploring steganography: seeing the unseen[J]. IEEE Computer, 1998, 31(2): 26-34.[2]Sutaone M S and Khandare M V. Image based steganography using LSB insertion technique[C]. IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India, 2008: 146-151.[3]Noda H, Niimi M, and Kawaguchi E. Steganographic Methods Focusing on BPCS Steganography[M]. Heidelberg: Springer Berlin Publisher, 2007: 189-229.[4]Huang C H, Chuang S C, and Wu J L. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques[J].IEEE Transactions on Multimedia.2008, 10(4):557-569[5]Chen B and Wornell G W. Quantization index modulation methods for digital watermarking and information embedding of multimedia[J].Journal of VLSI Signal Processing.2001, 27(1-2):7-33[6]Lie W N and Lin G S. A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia.2005, 7(6):1007-1020[7]Malik H.[J].Subbalakshmi K P, and Chandramouli R. Steganalysis of QIM-based data hiding using kernel density estimation[C]. Proc. MMSec07. Dallas, Texas, USA.2007,:-[8]Lyu S and Farid H. Detecting hidden messages using higher-order statistics and support vector machines[C]. Proc. IH02. Noordwijkerhout, Netherlands, 2002, LNCS, Vol. 2578: 340-354.[9]Xuan G, Shi Y Q, Gao J, Zou D, Yang C, Zhang Z, Chai P, Chen C, and Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function[C]. Proc. IH05, Barcelona, Spain, 2005.LNCS, Vol. 3727: 262-277.[10]Noda H, Niimi M, and Kawaguchi E. Application of QIM with dead zone for histogram preserving JPEG steganography[C]. Proc. ICIP05. Genova, Italy, 2005. Vol. 2: 1082-1085.[11]Solanki K, Sullivan K, Madhow U, Manjunath B S, and Chandrasekaran S. Statistical restoration for robust and secure steganography[C][J].Proc. ICIP05. Genova, Italy.2005, Vol. 2:1118-1121[12]Zhao X F, Xia B B, and Deng Y. Strengthening QIM-based watermarking by non-uniform discrete cosine transform[C][J].Proc. IH08. Santa Barbara, USA.2008, LNCS 5284:309-324[13]Fridrich J, Baldoza A C, and Simart R J. Robust digital watermarking based on key-dependent basis functions[C][J].Proc. IH98. Portland, Oregon, USA.1998, LNCS 1525:143-157[14]Xie L, Zhang J S, and He H J. A novel robust audio watermarking scheme based on nonuniform discrete fourier transform[J]. Chinese Journal of Computers, 2006, 29(9): 1711-1721.[15]Dietl W, Meerwald P, and Uhl A. Protection of wavelet-based watermarking systems using filter parametrization[J].Signal Processing.2003, 83(10):2095-2116
  • 加载中
计量
  • 文章访问数:  4060
  • HTML全文浏览量:  91
  • PDF下载量:  872
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-11-03
  • 修回日期:  2009-11-23
  • 刊出日期:  2010-02-19

目录

    /

    返回文章
    返回