网络与信息安全学报 ›› 2020, Vol. 6 ›› Issue (3): 59-65.doi: 10.11959/j.issn.2096-109x.2020036

• 学术论文 • 上一篇    下一篇

数字隐写模型及形式化描述

宋海涛(),汤光明,孙怡峰,王洋   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2019-08-08 出版日期:2020-06-01 发布日期:2020-07-01
  • 作者简介:宋海涛(1990- ),男,山东烟台人,信息工程大学博士生,主要研究方向为信息隐藏、信息安全|汤光明(1963- ),女,湖南常德人,信息工程大学教授、博士生导师,主要研究方向为信息隐藏、信息安全|孙怡峰(1976- ),男,河南淇县人,信息工程大学副教授,主要研究方向为信息隐藏、人工智能|王洋(1985- ),女,陕西西安人,信息工程大学博士生,主要研究方向为网络与信息安全
  • 基金资助:
    国家自然科学基金(61601517)

Digital steganography model and its formal description

Haitao SONG(),Guangming TANG,Yifeng SUN,Yang WANG   

  1. Information Engineering University,Zhengzhou 450001,China
  • Revised:2019-08-08 Online:2020-06-01 Published:2020-07-01
  • Supported by:
    The National Natural Science Foundation of China(61601517)

摘要:

为了使数字隐写模型研究与隐写技术研究同步发展,从通用到具体,依次提出3个数字隐写模型,并对各模型进行形式化描述,总结梳理隐写算法的本质原理,以指导隐写技术的进一步发展。首先,针对已有模型无法描述新兴隐写算法的问题,提出一个通用数字隐写模型,以描述当前所有隐写算法;其次,鉴于载体修改式的隐写算法在隐写术研究中的重要地位,提出基于载体修改的加性噪声隐写模型;然后,针对当前主流的图像自适应隐写算法,提出具体的最小化失真的数字图像自适应隐写模型。选取4个典型的隐写算法实例,采用所提隐写模型进行对应描述,以验证所提模型的有效性。

关键词: 隐写术, 隐写模型, 通用隐写模型, 载体修改式隐写模型, 自适应隐写模型

Abstract:

In order to make the research of digital steganography model develop synchronously with steganography research,three digital steganography models from general to specific are proposed,and each model was formalized.Through study on digital model,the essential principles of steganography algorithm were summarized to guide the further development of steganography.Firstly,aiming at the problem that the existing model cannot describe the emerging steganography algorithms,a general digital steganography model was proposed to describe nearly all steganography algorithms.Secondly,in view of the important position of the cover modification steganography algorithm in the research of steganography,a cover-modification digital steganography model was proposed.Then,for the current mainstream image adaptive steganography algorithm,a digital image adaptive steganography model with minimal distortion was proposed.Four typical steganography algorithm were selected as examples which were described by the proposed steganography model to validate the effectiveness of the proposed model.

Key words: steganography, steganography model, general steganography model, cover-modification steganography model, adaptive steganography model

中图分类号: 

No Suggested Reading articles found!