期刊文献+

SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION 被引量:2

SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION
在线阅读 下载PDF
导出
摘要 The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography. The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography.
出处 《Journal of Electronics(China)》 2009年第2期285-288,共4页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No.60572111)
关键词 Secure steganography Integer Programming(IP) Binary Particle Swarm Optimization(BPSO) 粒子群优化算法 设计安全 二进制 信息隐藏 信息安全 知识产权 JPEG 共生特性
  • 相关文献

参考文献8

  • 1P.Sallee.Model-based steganography[].International Workshop on Digital Watermarking.2003
  • 2A.Sarkar,K.Solanki,U.Madhow,et al.Secure steganography: statistical restoration of the second order dependencies for improved security[].IEEE In- ternational Conference on AcousticsSpeechand Signal Processing.2007
  • 3M.A.Khanesar,M.Teshnehlab,M.A.Shoorehdeli, et al.A novel binary particle swarm optimization[].th Mediterranean Conference on Control & Automation.2007
  • 4Petitcolas,F.A.P.,Anderson,R.J.,Kuhn,M.G.Information Hiding – A Survey[].IEEE Special Issue on Protection of Multimedia Content.1999
  • 5Cachin C.An information-theoretic model for steganography[].Proceedings of nd International Workshop on Information Hiding.1998
  • 6N. Provos.Defending Against Statistical Steganalysis[].Proc th Usenix Security Symposium.2001
  • 7Eggers J J,,Bauml R,Girod B.A communications approach to image steganography[].SPIE Electronic Imaging Security and Watermarking of Multimedia Contents Ⅳ.2002
  • 8Solanki K,Sullivan K,Madhow U,Manjunath B.S,Chandrasekaran S.Provably secure steganography: Achieving zero K-L divergence using statistical restoration[].Proc Int Conf on Image Processing.2006

同被引文献13

  • 1Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
  • 2Fridrich J, Kodivsky J, Holub V. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information and Security, 2012, 7(3):868-882.
  • 3Sharp T. An implementation of key-based digital signal steganography[C]//the 4th International Workshop on Information Hiding. Pittsburgh, 2001, 2137:13-26.
  • 4Li X X, Wang J J. A steganographic method based upon JPEG and particle swarm optimization algorithm[J]. Information Sciences, 2007, 177(15):3099-3109.
  • 5Liu G J, Zhang Z. Improved LSB-matching steganography for preserving second-order statistics[J]. Journal of Multimedia, 2010, 5(5):458-463.
  • 6Ghasemi E, Shanbehzadeh J, Jamshid F. High capacity image steganography based on genetic algorithm and wavelet transform[J]. Intelligent Control and Innovative Computing, 2012, 110:395-404.
  • 7Eusuff M M, Lansey K E. Optimization of water distribution network design using the shuffled frog leaping algorithm[J]. Journal of Water Sources Planning and Management, 2003, 129(3):210-225.
  • 8United States Department of Agriculture. Natural resources conservation service photo gallery, http://photogallery.nrcs.usda.gov, 2002.
  • 9Ker A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6):441-444.
  • 10Xuan G R, Shi Y Q. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[J]. Comuter Science, 2005, 3727:262-265.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部