使用分形维数分类的密写方法
详细信息 本馆镜像全文    |  推荐本文 | | 获取馆网全文
摘要
为了提供较大的隐藏容量和保持较好的载密图像质量,提出了一种基于分形维数的密写算法。该算法先根据位平面特性,把最不重要的几位补图像代替原图像,然后将该图像分割成固定的图像块,利用分形维数与图像间的关系,确定每个图像块的特点。结合HVS特性,根据纹理特征的强弱,提取与之对应的图像块的位平面高低,把这些提取出的位平面组成一个二进制序列,并对其置乱,根据矩阵编码把信息嵌入。针对大多容量与安全性相矛盾的情况,对统计攻击原理进行分析,提出的以分形维数作分类,结合置乱与矩阵编码技术密写方案很好地解决了这个问题。实验表明,该算法不仅具有较大的隐藏容量,而且对统计攻击具有一定的免疫性。
In order to provide larger capacity of the hidden secret data and to maintain a good visual quality of stego-image,a novel steganographic method based on fractal dimension is presented.The algorithm first bits plane according to characteristics of several of the most important complement the image instead of the original image,and then the image is divided into a fixed image block,using the fractal dimension and the relationship between images to determine the characteristics of each image block.With HVS characteristics,according to the strength of texture feature extraction with the corresponding image block of the bit plane high or low,these extracted bit-plane to form a binary sequence,and its scrambling,according to the information embedded in matrix encoding.Most of the capacity and security for the phase-contradictory situation,the principles of statistical attack on the analysis are put forward in order to classify the fractal dimension,combined with scrambling and matrix coding technology steganography program solves this problem well.The experimental results show that the algorithm is embedded in a larger capacity and a certain anti-steganographic analysis.
引文
[1]Kawaguchi E,Eason R O.Principle and application of BPCSsteganography[C]//Proc.SPIE:Multimedia Systems andApplications.Boston,Massachusetts:[s.n.],1998:464-472.
    [2]Machado R,Noda H,Spaulding J,et al.Application of Bit-plane Decompotion Steganography to JPEG2000 Encoded Im-ages[J].IEEE Signal Processing Letters,2002(9):410-413.
    [3]Spaulding J,Noda H,Shrazi M N,et al.BPCS Stegano-graphy Using EZM Lossy Compressing Images[J].PatternRecognition Letters,2002,23:1579-1587.
    [4]卜毅,曹汉强.一种空域的BPCS信息隐藏的改进算法[J].中国图形图象学报,2008,13(3):406-410.
    [5]Wu D C,Tsai W H.A steganographic method for images bypixel value differencing[J].Pattern Recognition Letters,2003,24(10):1613-1626.
    [6]Zhang X,Wang S.Vulnerability of Pixel-Value DifferencingSteganography to Histogram Analysis and Modification forEnhanced Security[J].Pattern Recognition Letters,2004,25:331-339.
    [7]Chang Chin-chen,Tseng Hsien-wen.A steganographicmethod for digital images using side match[J].PatternRecogntiton Letters,2004,25(12):1431-1437.
    [8]康志伟,刘劲,何怡刚.基于FCM和HVS的密写方法[J].计算机工程,2008,34(15):148-161.
    [9]Pentland A P.Fractal-based description of nature scenes[J].IEEE Tran.on Pattern Analysis and Machine Intelligence,1984,6(6):661-674.
    [10]Pentland A P.Shading into texture[J].Artif.Intell.,1986,29:147-170.
    [11]陈禺页,陈凌.分形几何学[M].第2版.北京:地震出版社,2005:54-71.
    [12]刘卓夫,桑恩方.基于纹理的声纳图像识别[J].计算机工程,2004,30(14):113-115.
    [13]樊国良,周利华.基于Hausdorff测度的图像分类器设计[J].电子学报,1997,25(11):120-123.

版权所有:© 2023 中国地质图书馆 中国地质调查局地学文献中心