浏览全部资源
扫码关注微信
1. 福建师范大学福清分校电子与信息工程学院,福建 福清 350300
2. 福建师范大学福清分校创新信息产业研究所,福建 福清 350300
[ "孙树亮(1982-),男,福建师范大学福清分校副教授,主要研究方向为信息安全与图像处理。" ]
网络出版日期:2016-06,
纸质出版日期:2016-06-20
移动端阅览
孙树亮. 基于非下采样ContourIet变换和HiII编码的图像隐写[J]. 电信科学, 2016,32(6):124-128.
Shuliang SUN. Image steganography based on nonsubsampled Contourlet transform and Hill cipher[J]. Telecommunications science, 2016, 32(6): 124-128.
孙树亮. 基于非下采样ContourIet变换和HiII编码的图像隐写[J]. 电信科学, 2016,32(6):124-128. DOI: 10.11959/j.issn.1000-0801.2016170.
Shuliang SUN. Image steganography based on nonsubsampled Contourlet transform and Hill cipher[J]. Telecommunications science, 2016, 32(6): 124-128. DOI: 10.11959/j.issn.1000-0801.2016170.
在非下采样Contourlet变换(NSCT)和Hill编码的基础上,提出了一种新的隐写方法。首先把载体图像用NSCT进行分解,得到一幅低频和若干幅高频图像。NSCT提供了图像多方向和多尺度的表示。选择一幅高频图像作为载体来嵌入秘密数据。在嵌入之前,用Hill密码对秘密数据进行编码。Hill密码最重要的是如何找到合适的编码矩阵。编码矩阵应满足的条件是可逆,同时要与字母的个数互质。为了改善隐写图像的视觉效果,采用了2
k
修正法进一步减小隐写图像和载体图像之间的视觉误差。实验证明,提出的方法具有更好的图像质量,因此更具有优越性。
A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2
k
correction was applied
to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.
钟黔川 , 朱清新 . Blowfish 密码系统分析 [J ] . 计算机应用 , 2007 , 27 ( (12) ): 2940 - 2944 .
ZHONG Q C , ZHU Q X . Analysis of Blowfish cryptography [J ] . Computer Applications , 2007 , 27 ( (12) ): 2940 - 2944 .
CHANNALLI S , JADHAY A . Steganography-an art of hiding data [J ] . International Journal on Computer Science and Engineering , 2009 , 1 ( (3) ): 137 - 141 .
JUNEJA M , SANDHU P S . An improved LSB based steganography technique for RGB color images [J ] . International Journal of Computer and Communication Engineering , 2013 , 2 ( (4) ): 513 - 517 .
吴霞 , 徐向阳 , 黄友荣 . 抗统计分析的BPCS隐写算法 [J ] . 计算机工程与应用 , 2007 , 43 ( (7) ): 52 - 54 .
WU X , XU X Y , HUANG Y R . BPCS steganography algorithm against statistical analysis [J ] . Computer Engineering and Applications , 2007 , 43 ( (7) ): 52 - 54 .
李艳玲 , 黄红艳 . 基于DFT域的图像信息隐藏技术 [J ] . 华北水利水电学院学报 , 2008 , 29 ( (4) ): 62 - 64 .
LI Y L , HUANG H Y . Information hiding technology based on DFT domain [J ] . Journal of North China Institute of Water Conservancy and Hydroelectric Power , 2008 , 29 ( (4) ): 62 - 64 .
JAMDAR A S , SHAH A V , GAVALI D D , et al . Edge adaptive steganography using DWT [J ] . International Journal of Engineering and Advanced Technology , 2013 , 2 ( (4) ): 648 - 652 .
DO M N , VETTERLI M . The contourlet transform:an efficient directional multiresolution image representation [J ] . IEEE Transactions on Image Processing , 2005 , 14 ( (12) ): 2091 - 2106 .
CUNHA A L D , ZHOU J P , DO M.N . The nonsubsampled contourlet transform:theory,design,and applications [J ] . IEEE Transactions on Image Processing , 2006 , 15 ( (10) ): 3089 - 3101 .
HILL L S , . Cryptography in an algebraic alphabet [J ] . The American Mathematical Monthly , 1929 , 36 ( (6) ): 306 - 312 .
PAVAN N , NAGARJUN G A , NIHAAR N , et al . Image steganography based on hill cipher with key hiding technique [J ] . IOSR Journal of Computer Engineering , 2013 , 11 ( (5) ): 47 - 50 .
KARTHIKEYANB , CHAKRAVARTHYJ , RAMASUBRAMANIAN S . Amalgamation of scanning paths and modified hill cipher for secure steganography [J ] . Australian Journal of Basic and Applied Sciences , 2012 , 6 ( (7) ): 55 - 61 .
KAUR A , KAUR S . Image steganography based on hybrid edge detection and 2 k correction method [J ] . International Journal of Engineering and Innovative Technology , 2012 , 1 ( (2) ): 167 - 170 .
SUN S L , GUO Y N . A novel image steganography based on contourlet transform and hill cipher [J ] . Journal of Information Hiding and Multimedia Signal Processing , 2015 , 6 ( (5) ): 889 - 897 .
RAMEZANI H , KEYNIA F , RAMEZANI F . A novel image steganography in contourlet domain using genetic algorithm [J ] . International Journal of Future Computer and Communication , 2013 , 2 ( (4) ): 359 - 363 .
闫芬 , 王康碧 , 李晨 , 等 . 一种基于NSCT 与抖动量化的盲水印算法 [J ] . 云南民族大学学报:自然科学版 , 2013 , 22 ( (3) ): 222 - 225 .
YAN F , WANG K B , LI C , et al . A blind algorithm based on NSCT and dither quantization [J ] . Journal of Yunnan Minzu University:Natural Sciences Edition , 2013 , 22 ( (3) ): 222 - 225 .
0
浏览量
576
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构