网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (6): 1-10.doi: 10.11959/j.issn.2096-109x.2021102

• 综述 •    下一篇

图像非加性隐写综述

王垚飞1,2, 张卫明1,2, 陈可江1,2, 周文柏1,2, 俞能海1,2   

  1. 1 中国科学技术大学网络空间安全学院,安徽 合肥 230027
    2 中科院电磁空间信息重点实验室,安徽 合肥 230027
  • 修回日期:2021-10-28 出版日期:2021-12-15 发布日期:2021-12-01
  • 作者简介:王垚飞(1996− ),男,河北邯郸人,中国科学技术大学博士生,主要研究方向为信息隐藏
    张卫明(1976− ),男,河北定州人,中国科学技术大学教授、博士生导师,主要研究方向为信息隐藏、多媒体内容安全、人工智能安全
    陈可江(1994− ),男,浙江温州人,博士,主要研究方向为信息隐藏与人工智能安全
    周文柏(1992− ),男,安徽合肥人,中国科学技术大学特任副研究员,主要研究方向为信息隐藏与人工智能安全
    俞能海(1964− ),男,安徽无为人,中国科学技术大学教授、博士生导师,主要研究方向为多媒体信息检索、图像处理与视频通信、数字媒体内容安全
  • 基金资助:
    国家自然科学基金(62102386);国家自然科学基金(62002334);国家自然科学基金(62072421);国家自然科学基金(62121002);安徽省自然科学基金(2008085QF296)

Survey on image non-additive steganography

Yaofei WANG1,2, Weiming ZHANG1,2, Kejiang CHEN1,2, Wenbo ZHOU1,2, Nenghai YU1,2   

  1. 1 School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230027, China
    2 Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, Hefei 230027, China
  • Revised:2021-10-28 Online:2021-12-15 Published:2021-12-01
  • Supported by:
    The National Natural Science Foundation of China(62102386);The National Natural Science Foundation of China(62002334);The National Natural Science Foundation of China(62072421);The National Natural Science Foundation of China(62121002);The Nature Science Foundation of Anhui Province(2008085QF296)

摘要:

图像非加性隐写不仅能更好地维持图像元素的分布,而且具有较高的抗检测性能。首先对图像非加性隐写方法进行了梳理,将其分为两大类:非加性失真设计和非加性隐写编码设计。进一步将非加性失真设计总结为3类:基于理论模型、基于修改原则和基于对抗检测的方法,对这些方法进行了对比。最后分析了非加性隐写面临的困难问题和未来的发展思路。

关键词: 信息隐藏, 图像隐写, 非加性失真, 非加性隐写编码

Abstract:

Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories: non-additive distortion design and non-additive steganography coding design.The non-additive distortion was designed into three categories: theoretical models based, modification principles based and adversarial detection based, and compared these methods.Finally, the difficult problems faced by non-additive steganography and the future development ideas were analyzed.

Key words: information hiding, image steganography, non-additive distortion, non-additive steganography code

中图分类号: 

No Suggested Reading articles found!