You are on page 1of 30

.........................................................................................................................

Abstract....................................................................................................................
..........................................................................................................................
..........................................................................................
..........................................................................
..........................................................
..................................................................................
..........................................................................
..................................................................................
................................................................................12
................................................15
............................................................15
....................................................................17
........................................................................................18
............................................................22
............................................................22
................................................................................22
....................................................24
........................................................................................................26
................................................................................................................28

-1-

-2-

Abstract
Information-Hiding is a new discipline and receives very much attention from
the research community. It is to embed private messages in seemingly innocuous
cover messages making use of the redundancy information. Steganography is an
important part of information-hiding, and time domain techniques are simple and
easy to use.
This paper presents a steganographic technique making use of some last bits
of an images pixel bytes based on the visual redundancy of the image. Firstly, the
paper introduces some pretreatment methods to the hiding image including
confusion transformation and fault control encoding. Secondly, it gives out the
algorithm and experiment flow of the method. In the end of the paper we further
research the position of the data to be embedded and discuss a transform domain
technique to conquer compression attack. The results indicate that the method is
simple and effective. With the method we can not only withstand passive attacks but
can also get back the data without loss.

Key Words Information-Hiding Steganography Time domain transformation

-3-

-4-

(Information Hiding)

-5-

-6-

20 50

4
(steganography)

256
8 bit

(DCT)KL

-7-

2.1

2
3

-8-

(1)
(2)
(3)
(4)

(5)

F ( x , y ) , ( x 0,1, 2,...N ; y 0,1, 2,...M )

Arnold
x, y = 0, 1, 2,N-1,

-9-

x
x
y A
y (mod N ), x, y 0,1,...N 1

( 2-1 )

1 1

1 2

( x, y ) ( x, y)

Pxn,y1 APxn, y (mod N ), n 0,1, 2,...

( 2-2 )

Px0, y
Pxn, y x, y n
T

Arnold
256*256 256 lena
:

2.2 lena

2.3 Arnold

2.4 76 Arnold

2.5 185 Arnold

192 Arnold lena


256*256 Arnold 192

- 10 -

Arnold 76 19276=116 Arnold


[7] Arnold N=100, 128, 256,
512

A,
a11 a12
a
a22
A 21
M M

an1 an 2

a1n
a2 n
M

ann

L
L
L
L

a a a
j 1

3)

ij

i 1

ij

j 1

jj

a j ,n j C

( 2-

j 1

a , ( i, j 1, 2,L
ij

, n ) 1, 2,L , n 2

n*n B B A
A 1 2 A 2
2

3 n 1

4 9 2
3 5 7

8 1 6

A :
a21
a
13
a23

a31
a11
a12

a32
a33
a22
2

- 11 -

FASS(spacefilling,selfavoiding,simple and
selfsimilar)Gray IFS Tangram
[6]

1
(an 1 , an 2 ,L , a0 )
an 1 an 2 L a0 0 1

( 2-4 )

an 1 an 2 L a0 1 1

( 2-5 )

2 1


nk C (cn 1 , cn 2 ,L , c0 )
C ( D) cn 1 D

n 1

cn 2 D n 2 L c0 D 0 nk

n gD
n
nk gD D 1 n-k
D n 1 g ( D ) h( D )

( 2-6 )

- 12 -

n
gD n-k D 1 gD

nk
n gDnk
n gD

g ( D ) LCM m1 ( D ), m3 ( D ),L , m2t 1 ( D )

( 2-7 )

t mi ( D) LCM
BCH dmin2t1 t
m
m
m
BCH n 2 1 2 1 n 2 1 BCH
m
BCH 2 1 BCH BCH t
BCH g ( D) m1 ( D)m3 ( D)L m2t 1 ( D)

dmin=2t1 BCH
74
3
2
g ( D ) D D 1

7 gD

( m3 D 3 m2 D 2 m1 D m0 ) g ( D )
mi GF (2) 16

- 13 -

2.6

N k Nk
n 2 n
k n 2.6 n
k N-1k N
nkN
N N

[3]

i t nk i n
i
i

Arnold

- 14 -


256 ( 8 bit ) A N a M a
256 B N b M b
A B N a M a ? N b M b
B

256 4

8 bit lena

3.1 lena

3.3

3.2

3.4

- 15 -

lena

3.5

3.6

3.7

3.8

3.5
3.6
3.7
3.8
8 bit

- 16 -

3.9

- 17 -

Bit 1/4

A B

F ( N a M a ) /( N b M b )
nk n / k 9 / 8 b

if (F>8)

b=1;

else if (F>4)

b=2;

else if (F>(8/3))

b=3;

else printf ("");

1 b

2
3

3
76 Arnold

116 Arnold

- 18 -

lena view
640*480 256 view 256*256 256
lena

3.10

3.12

view

3.11 lena

3.13

3.10 3.12
1/4 3.11 3.13

newpic goldhill
800*800 256 newpic 256*256 256
goldhill

- 19 -

3.14

3.16

newpic

3.15

3.17

goldhill

3.14 3.16 1/8

newpic view
newpic
800*800 256 newpic 640*480 256
view

- 20 -

3.18

3.19

3.18 3.14
1/2

- 21 -

4.1

4.2

4.1 360*477 256

- 22 -

4.2 3
4.2

A
1 Fi Ci
2 Ci Fi

3 Ci Fi

4 Ci

3.6

4.3
4.3

4.4

4.4

- 23 -

4.5

4.6

4.3 2
4.4256*256 256
4.5 4.3
4.6 4.5
4.4 4.6

DCT JPEG DCT

(2 x 1)u
(2 y 1)v
cos

2N
2 N

( 4-1 )

(2 x 1)u
(2 y 1)v
cos

2N
2 N

( 4-2 )

N 1 N 1

C (u , v ) a (u )a (v ) f ( x, y ) cos
x 0 y 0

N 1 N 1

f ( x, y ) a (u )a (v )C (u , v ) cos
u 0 v 0

a (u )

( u 0)

( u 1,2,..., N 1)

DCT JPEG

4.7 DCT JPEG

- 24 -

DCT

DCT DCT

DCT

3.

DCT

DCT
4

DCT JPEG

DCT JPEG

- 25 -

- 26 -

- 27 -

. 2002
. 1999
. 2001
Visual C++.
2001.4
[5] . 1998
9 21 9
[6] .
1999 3 11 1
[7] Arnold . 1999 3 11
1
[8] .
2001 9 40 5
[9] . 2002
2 28 2
[10] Stefan Katzenbeisser, Fabien A.P.Petitcolas .Information hiding techniques for
steganography and digigtal watermarking. Artech House Books1999
[11] Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC98
Conference in Melbourne, Australia, 1998.11.
[12] Maxemchuk N F. Electronic document distribu disciplinestion. AT&T
Technical Journal, 1994.9, 73 (5): 73~80.
[13] Fisher Y .Fractal Image compression. Theory and Application. New York :
Springer-Verlag, 1995
[14] Naor M. Shamir A. Visual cryptography. In: Proc Eurocryp: 1994
[15] Glodschlag D.M,Reed M.G,Syverson P.F .Hiding routing information. In
Workshop on Information Hiding,Cambridge,UK,number 1174 in Lecture
Notes in Computer Science. Springer-Verlag. 1996
[16] Naor M,Pinkas B. Threshold Traitor Tracing. In 18th Annual International
Cryptology Conference. Santa Barbara,California. Springer-Verlag-1462. Aug
1998
[17] Pfitzmanb B,Waidner M. Anonymous Fingerprinting, in Eurocrypt97.
Konstanz,Germany. Number 1233 in Lecture Notes in Computer Science.
Springer-Verlag. May 1997
[1]
[2]
[3]
[4]

- 28 -

- 29 -



PB99006127

2003 6

- 30 -

You might also like