FAILED
首站-论文投稿智能助手
典型文献
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
文献摘要:
Privacy protection is the key to maintaining the Internet of Things(IoT)communication strategy.Steganography is an important way to achieve covert communication that protects user data privacy.Steganalysis technology is the key to checking steganography security,and its ultimate goal is to extract embedded messages.Existing methods cannot extract under known cover images.To this end,this paper proposes a method of extracting embedded messages under known cover images.First,the syndrome-trellis encoding process is analyzed.Second,a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix,while the embedding process is simulated using the cover sequence and parity-check matrix.Since the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion,comparing the path consistency can quickly filter the coding parameters to determine the correct matrices,and embedded messages can be extracted correctly.The proposed method does not need to embed all possible messages for the second time,improving coding parameter recognition significantly.The experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.
文献关键词:
作者姓名:
Jialin Li;Xiangyang Luo;Yi Zhang;Pei Zhang;Chunfang Yang;Fenlin Liu
作者机构:
State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou,450000,China
引用格式:
[1]Jialin Li;Xiangyang Luo;Yi Zhang;Pei Zhang;Chunfang Yang;Fenlin Liu-.Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths)[J].数字通信与网络(英文),2022(04):455-465
A类:
Steganography,stego
B类:
Extracting,embedded,messages,using,adaptive,steganography,optimal,syndrome,trellis,decoding,paths,Privacy,protection,key,maintaining,Internet,Things,IoT,communication,strategy,important,way,achieve,covert,that,protects,user,data,privacy,Steganalysis,technology,checking,security,its,ultimate,goal,Existing,methods,cannot,under,known,images,To,this,end,paper,proposes,extracting,First,encoding,process,analyzed,Second,obtained,by,sequence,certain,parity,matrix,while,embedding,simulated,Since,has,least,distortion,comparing,consistency,quickly,filter,parameters,determine,matrices,extracted,correctly,proposed,does,need,all,possible,second,improving,recognition,significantly,experimental,results,show,identify,realize,extraction
AB值:
0.459883
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。