Professional Documents
Culture Documents
Abstract....................................................................................................................
..........................................................................................................................
..........................................................................................
..........................................................................
..........................................................
..................................................................................
..........................................................................
..................................................................................
................................................................................12
................................................15
............................................................15
....................................................................17
........................................................................................18
............................................................22
............................................................22
................................................................................22
....................................................24
........................................................................................................26
................................................................................................................28
-1-
-2-
Abstract
Information-Hiding is a new discipline and receives very much attention from
the research community. It is to embed private messages in seemingly innocuous
cover messages making use of the redundancy information. Steganography is an
important part of information-hiding, and time domain techniques are simple and
easy to use.
This paper presents a steganographic technique making use of some last bits
of an images pixel bytes based on the visual redundancy of the image. Firstly, the
paper introduces some pretreatment methods to the hiding image including
confusion transformation and fault control encoding. Secondly, it gives out the
algorithm and experiment flow of the method. In the end of the paper we further
research the position of the data to be embedded and discuss a transform domain
technique to conquer compression attack. The results indicate that the method is
simple and effective. With the method we can not only withstand passive attacks but
can also get back the data without loss.
-3-
-4-
(Information Hiding)
-5-
-6-
20 50
4
(steganography)
256
8 bit
(DCT)KL
-7-
2.1
2
3
-8-
(1)
(2)
(3)
(4)
(5)
Arnold
x, y = 0, 1, 2,N-1,
-9-
x
x
y A
y (mod N ), x, y 0,1,...N 1
( 2-1 )
1 1
1 2
( x, y ) ( x, y)
( 2-2 )
Px0, y
Pxn, y x, y n
T
Arnold
256*256 256 lena
:
2.2 lena
2.3 Arnold
2.4 76 Arnold
- 10 -
A,
a11 a12
a
a22
A 21
M M
an1 an 2
a1n
a2 n
M
ann
L
L
L
L
a a a
j 1
3)
ij
i 1
ij
j 1
jj
a j ,n j C
( 2-
j 1
a , ( i, j 1, 2,L
ij
, n ) 1, 2,L , n 2
n*n B B A
A 1 2 A 2
2
3 n 1
4 9 2
3 5 7
8 1 6
A :
a21
a
13
a23
a31
a11
a12
a32
a33
a22
2
- 11 -
FASS(spacefilling,selfavoiding,simple and
selfsimilar)Gray IFS Tangram
[6]
1
(an 1 , an 2 ,L , a0 )
an 1 an 2 L a0 0 1
( 2-4 )
an 1 an 2 L a0 1 1
( 2-5 )
2 1
nk C (cn 1 , cn 2 ,L , c0 )
C ( D) cn 1 D
n 1
cn 2 D n 2 L c0 D 0 nk
n gD
n
nk gD D 1 n-k
D n 1 g ( D ) h( D )
( 2-6 )
- 12 -
n
gD n-k D 1 gD
nk
n gDnk
n gD
( 2-7 )
t mi ( D) LCM
BCH dmin2t1 t
m
m
m
BCH n 2 1 2 1 n 2 1 BCH
m
BCH 2 1 BCH BCH t
BCH g ( D) m1 ( D)m3 ( D)L m2t 1 ( D)
dmin=2t1 BCH
74
3
2
g ( D ) D D 1
7 gD
( m3 D 3 m2 D 2 m1 D m0 ) g ( D )
mi GF (2) 16
- 13 -
2.6
N k Nk
n 2 n
k n 2.6 n
k N-1k N
nkN
N N
[3]
i t nk i n
i
i
Arnold
- 14 -
256 ( 8 bit ) A N a M a
256 B N b M b
A B N a M a ? N b M b
B
256 4
8 bit lena
3.1 lena
3.3
3.2
3.4
- 15 -
lena
3.5
3.6
3.7
3.8
3.5
3.6
3.7
3.8
8 bit
- 16 -
3.9
- 17 -
Bit 1/4
A B
F ( N a M a ) /( N b M b )
nk n / k 9 / 8 b
if (F>8)
b=1;
else if (F>4)
b=2;
else if (F>(8/3))
b=3;
1 b
2
3
3
76 Arnold
116 Arnold
- 18 -
lena view
640*480 256 view 256*256 256
lena
3.10
3.12
view
3.11 lena
3.13
3.10 3.12
1/4 3.11 3.13
newpic goldhill
800*800 256 newpic 256*256 256
goldhill
- 19 -
3.14
3.16
newpic
3.15
3.17
goldhill
newpic view
newpic
800*800 256 newpic 640*480 256
view
- 20 -
3.18
3.19
3.18 3.14
1/2
- 21 -
4.1
4.2
- 22 -
4.2 3
4.2
A
1 Fi Ci
2 Ci Fi
3 Ci Fi
4 Ci
3.6
4.3
4.3
4.4
4.4
- 23 -
4.5
4.6
4.3 2
4.4256*256 256
4.5 4.3
4.6 4.5
4.4 4.6
(2 x 1)u
(2 y 1)v
cos
2N
2 N
( 4-1 )
(2 x 1)u
(2 y 1)v
cos
2N
2 N
( 4-2 )
N 1 N 1
C (u , v ) a (u )a (v ) f ( x, y ) cos
x 0 y 0
N 1 N 1
f ( x, y ) a (u )a (v )C (u , v ) cos
u 0 v 0
a (u )
( u 0)
( u 1,2,..., N 1)
DCT JPEG
- 24 -
DCT
DCT DCT
DCT
3.
DCT
DCT
4
DCT JPEG
DCT JPEG
- 25 -
- 26 -
- 27 -
. 2002
. 1999
. 2001
Visual C++.
2001.4
[5] . 1998
9 21 9
[6] .
1999 3 11 1
[7] Arnold . 1999 3 11
1
[8] .
2001 9 40 5
[9] . 2002
2 28 2
[10] Stefan Katzenbeisser, Fabien A.P.Petitcolas .Information hiding techniques for
steganography and digigtal watermarking. Artech House Books1999
[11] Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC98
Conference in Melbourne, Australia, 1998.11.
[12] Maxemchuk N F. Electronic document distribu disciplinestion. AT&T
Technical Journal, 1994.9, 73 (5): 73~80.
[13] Fisher Y .Fractal Image compression. Theory and Application. New York :
Springer-Verlag, 1995
[14] Naor M. Shamir A. Visual cryptography. In: Proc Eurocryp: 1994
[15] Glodschlag D.M,Reed M.G,Syverson P.F .Hiding routing information. In
Workshop on Information Hiding,Cambridge,UK,number 1174 in Lecture
Notes in Computer Science. Springer-Verlag. 1996
[16] Naor M,Pinkas B. Threshold Traitor Tracing. In 18th Annual International
Cryptology Conference. Santa Barbara,California. Springer-Verlag-1462. Aug
1998
[17] Pfitzmanb B,Waidner M. Anonymous Fingerprinting, in Eurocrypt97.
Konstanz,Germany. Number 1233 in Lecture Notes in Computer Science.
Springer-Verlag. May 1997
[1]
[2]
[3]
[4]
- 28 -
- 29 -
PB99006127
2003 6
- 30 -