外文翻译--数字图像隐写技术的随机调制
《外文翻译--数字图像隐写技术的随机调制》由会员分享,可在线阅读,更多相关《外文翻译--数字图像隐写技术的随机调制(17页珍藏版)》请在毕设资料网上搜索。
1、 1 外文资料 Digital image steganography using stochastic modulation Jessica Fridrichand Miroslav Goljan Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000, USA ABSTRACT In this paper, we present a new steganographic paradigm for digital images in raster formats
2、. Message bits areembedded in the cover image by adding a weak noise signal with a specified but arbitrary probabilistic distribution.This embedding mechanism provides the user with the flexibility to mask the embedding distortion as noisegenerated by a particular image acquisition device. This type
3、 of embedding will lead to more secure schemesbecause now the attacker must distinguish statistical anomalies that might be created by the embedding process fromthose introduced during the image acquisition itself. Unlike previously proposed schemes, this new approach, thatwe call stochastic modulat
4、ion, achieves oblivious data transfer without using noise extraction algorithms or errorcorrection. This leads to higher capacity (up to 0.8 bits per pixel) and a convenient and simple implementation withlow embedding and extraction complexity. But most importantly, because the embedding noise can h
5、ave arbitraryproperties that approximate a given device noise, the new method offers better security than existing methods. At theend of this paper, we extend stochastic modulation to a content-dependent device noise and we also discuss possibleattacks on this scheme based on the most recent advance
6、s in steganalysis. Keywords: Steganography, steganalysis, stochastic modulation, device noise 1. INTRODUCTION The purpose of steganography is to hide the very presence of communication by embedding messages into innocuous-looking cover objects, such as digital images. To accommodate a secret message
7、, the original cover image is slightly modified by the embedding algorithm to obtain the stego image. The embedding process usually incorporates a secret stego-key that governs the embedding process and it is also needed for the extraction of the hidden message. In contrast to watermarking when the
8、embedded message has a close relationship 2 to the cover image supplying data,such as sender or receiver information, authentications codes, etc., in steganography, the cover image is a mere decoy and has no relationship to the hidden data. The most important requirement for a steganographic system
9、is undetectability: stego images should be statistically indistinguishable from cover images. In other words, there should be no artifacts in the stego image that could be detected by an attacker with probability better than random guessing, given the full knowledge of the embedding algorithm except
10、 for the stego-key (Kerckhoffs principle). The early steganographic schemes focused on introducing as little distortion in the cover image as possible utilizing the seemingly intuitive heuristics that the smaller the embedding distortion is, the more secure the steganographic scheme becomes. However
11、, recent advances in steganalysis clearly showed that this is not the case. The Least Significant Bit embedding (LSB) with sequential or random message spread has been successfully attacked even for very short messages2,3,11. In essence, the LSB embedding is so easily detectable because it introduce
12、s distortion that never naturally occurs to images and creates an imbalance between appropriately defined statistical quantities. A better approach is to replace the operation of flipping the LSBs by randomly adding 1 or 1 to pixels (+1 embedding) and extracting the message bits from LSBs as in the
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中设计图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外文 翻译 数字图像 技术 随机 调制
