计算机科学 ›› 2014, Vol. 41 ›› Issue (3): 172-175.

• 软件与数据库技术 • 上一篇    下一篇

一种基于游程长度的高安全性图像信息隐藏算法

谢建全,谢勍,黄大足   

  1. 湖南财政经济学院信息安全研究所 长沙410205;湖南财政经济学院信息安全研究所 长沙410205;湖南财政经济学院信息安全研究所 长沙410205
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受湖南省科技计划项目(2012GK3064),湖南省教育科学“十二·五”课题(XJK011BXJ008),省重点学科建设项目资助

Image Information Hiding Algorithm with High Security Based on Run-length

XIE Jian-quan,XIE Qing and HUANG Da-zu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对目前多数信息隐藏算法的安全性不高使其无法应用于隐蔽通信等领域的问题,提出了一种基于游程长度的隐藏算法,算法的基本思想是将图像分解成多个二值图像,通过对分解后的二值图像游程长度的奇偶性来隐藏信息,最多改变二值图像黑白交界处的一个像素值便可隐藏1bit的信息,隐藏信息可实现盲提取。算法未造成图像低位平面的0和1分布特性的明显改变,也未造成长游程的减少,因此可抵御许多针对LSB及其改进方法的隐写分析技术的检测。仿真试验结果显示,算法的安全性高,不可感知性好,并且嵌入容量大,可应用于隐藏通信等对隐藏容量和安全性有较高要求的场合。

关键词: 信息隐藏,游程长度,嵌入容量,不可感知性,安全性 中图法分类号TP309.2文献标识码A

Abstract: Aiming at the problem that most information hiding algorithms are not secure enough to afford secret communication,a kind of hiding information algorithm based on Run Length was proposed.The main idea of this algorithm is separating the image into several binary images.Through utilizing the parities of the Run Length of the binary images,one bit of information can be successfully embedded while even one pixel that is located along black-white boundary of the binary image is modified.The blind extraction of the hiding information can be achieved.The algorithm neither obviously changes distribution property of 0and 1in image’s low plane,nor reduces the Length of Run.Hence it can defend various detections against LSB and its improved method.The simulation result shows that the algorithm has high security,good imperceptibility and large embedding capacity.Furthermore,it can be applied in secret communication and other situation that requires high security and large capacity.

Key words: Information hiding,Run-length,Embedding capacity,Imperceptibility,Security

[1] Nezhadarya E,Wang J,Ward R K.Image watermarking based on multiscale gradient direction quantization[J].IEEE Transactions on Information Forensics and Security,2011,6(4):1200-1213
[2] 姜传贤,陈孝威,李智.基于文本重要内容的鲁棒水印算法[J].自动化学报,2010,36(9):1250-1256
[3] Zhou X M,Wang S C,Xiong S C,et al.Attack model and performance evaluation of text digital watermarking[J].Journal of Computers,2010,5(12):1933-1941
[4] 陈够喜,陈俊杰.多载体信息隐藏安全性研究[J].小型微型计算机系统,2011,32(4):644-646
[5] Ker A D.Steganalysis of embedding in two least-significant bits [J].IEEE Transitions on Information Forensics and Security,2007,1(2):46-54
[6] 雷雨,杨晓元,潘晓中,等.基于局部随机性的YASS隐写分析方法[J].计算机学报,2010,3(10):1997-2002
[7] Fillatre L.Adaptive Steganalysis of Least Significant Bit Re-placement in Grayscale Natural Images[J].IEEE Transactions on Signal Processing,2012,60(2):556-569
[8] 张湛,刘光杰,戴跃伟,等.基于Markov链安全性的二阶统计保持隐写算法[J].中国图象图形学报,2010,5(8):1175-1181
[9] Samir K B,Avishek R,Tuhin U P.A palette based approach for invisible digital watermarking using the concept of run-length[A]∥2010International Conference on Computational Intelligence and Communication Networks,CICN 2010[C].2010:83-87
[10] 继军,杨义先.图像LSB隐藏游程检测算法[J].西安邮电学院学报,2005,0(1):1-5
[11] 李航,路羊,崔慧娟,等.基于频域的结构相似度的图像质量评价方法[J].清华大学学报:自然科学版,2009,49(4):559-562
[12] 罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(10):463-473
[13] 谢建全,谢勍,黄大足.图像信息隐藏不可感知性指标研究[J].小型微型计算机系统,2011,32(5):953-957
[14] 刘春庆,梁光岚,王朔中,等.应用二值图像信息隐藏技术实现彩色图像中的安全隐写[J].应用科学学报,2007,5(4):342-347
[15] 马秀莹,林家骏.信息隐藏性能评价方法[J].中国图象图形学报,2011,6(2):209-214

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!