电信科学 ›› 2016, Vol. 32 ›› Issue (6): 124-128.doi: 10.11959/j.issn.1000-0801.2016170

• 研究与开发 • 上一篇    下一篇

基于非下采样ContourIet变换和HiII编码的图像隐写

孙树亮1,2   

  1. 1 福建师范大学福清分校电子与信息工程学院,福建 福清 350300
    2 福建师范大学福清分校创新信息产业研究所,福建 福清 350300
  • 出版日期:2016-06-20 发布日期:2016-07-20
  • 基金资助:
    国家自然科学基金资助项目;福建省科技厅基金资助项目

Image steganography based on nonsubsampled Contourlet transform and Hill cipher

Shuliang SUN1,2   

  1. 1 School of Electronics and Information Engineering,Fuqing Branch of Fujian Normal University,Fuqing 350300,China
    2 Innovative Information Industry Research Center,Fuqing Branch of Fujian Normal University,Fuqing 350300,China
  • Online:2016-06-20 Published:2016-07-20
  • Supported by:
    The National Natural Science Foundation of China;Natural Science Foundation of Fujian Province

摘要:

在非下采样Contourlet变换(NSCT)和Hill编码的基础上,提出了一种新的隐写方法。首先把载体图像用NSCT进行分解,得到一幅低频和若干幅高频图像。NSCT提供了图像多方向和多尺度的表示。选择一幅高频图像作为载体来嵌入秘密数据。在嵌入之前,用Hill密码对秘密数据进行编码。Hill密码最重要的是如何找到合适的编码矩阵。编码矩阵应满足的条件是可逆,同时要与字母的个数互质。为了改善隐写图像的视觉效果,采用了2k修正法进一步减小隐写图像和载体图像之间的视觉误差。实验证明,提出的方法具有更好的图像质量,因此更具有优越性。

关键词: NSCT, Hill编码, 2k修正, 编码矩阵

Abstract:

A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2k correction was applied to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.

Key words: NSCT, Hill cipher, 2k correction, cipher matrix

No Suggested Reading articles found!