»ùÓÚDCTµÄJStegÒþд¼°·ÖÎö ÁªÏµ¿Í·þ

·¢²¼Ê±¼ä : ÐÇÆÚËÄ ÎÄÕ»ùÓÚDCTµÄJStegÒþд¼°·ÖÎö¸üÐÂÍê±Ï¿ªÊ¼ÔĶÁ48298008cc22bcd127ff0c4f

ÆäÖУ¬N±íʾ±ê×¼¸ß˹·Ö²¼

B.¾ö²ßº¯Êý

´óÁ¿ÊµÑéÖ¤Ã÷£¬»ùÓÚС²¨ÌØÕ÷º¯Êýͳ¼Æ¾ØµÄÒþд·ÖÎö·½·¨ºÜÓÐЧ£¬¼ì²âÂʺܸߡ£

4.2»ùÓÚÖ§³ÖÏòÁ¿»úµÄ¶àÌØÕ÷ä¼ì²âËã·¨

ÎÒÃÇÖªµÀ£¬ÏÖÔÚÑо¿µÄÒþд·ÖÎö¶¼ÊÇΨÔØÃܹ¥»÷£¬¼´ÔØÌåͼÏñδ֪µÄ¼ì²â£¬ËùÒÔÎÒÃÇÒª¹¹ÔìÒ»½üËÆÓÚÔØÌåͼÏñµÄͼÏñ¡£ÓÉÓÚJPEGͼÏñÔÚ½øÐÐѹËõʱ£¬ÆäDCT±ä»»ºÍÁ¿»¯¶¼ÊÇÔÚsxsµÄ×Ó¿éÉϽøÐеģ¬ËùÒÔ¿éÓë¿éÖ®¼ä´æÔÚÒ»¶¨µÄ²»Á¬ÐøÐÔ£¬¼´ËùνµÄ·Ö¿éЧӦ£¬Ö¦×¼Í¼ÏñµÄ»ñµÃ£ºÊ×ÏȽ«ÔØÃÜͼÏñJ1½âѹµ½¿ÕÓò£¬È»ºóÔÚÿ¸ö·½ÏòÉϲüôµô4¸öÏñËص㣬×îºóÓÃÓëԭͼÏñÏàͬµÄµÄÁ¿»¯¾ØÕóÖØÐÂѹËõͼÏñµÃµ½Í¼ÏñÈçJ2£¬Èçͼ3.1Ëùʾ£¬J2½üËÆΪԭÔØÌåͼÏñ£¬³ÆΪУ׼ͼÏñ¡£

ͼ 3.1 ±ê׼ͼÏñµÄ²úÉú

¶¨ÒåͼÏñµÄÌØÕ÷º¯ÊýΪF(ÈçÖ±·½Í¼º¯Êý£¬¹²Éú¾ØÕóº¯ÊýµÈ)£¬ÔòÌØÕ÷ÖµfÓÉÏÂʽ²úÉú£º

ÆäÖÐLl·¶Êý¶¨ÒåΪһ¸öÏòÁ¿(»ò¾ØÕó)ËùÓÐÔªËصľø¶ÔÖµ×ܺ͡£

µ±È»£¬×î¼òµ¥µÄ»¹ÊÇ»ùÓÚJStegµÄ¿¨·½¼ì²â£¬ÒòΪJStegµÄÒþ²Ø±¾Éí¾ÍÊǺÍLSBÒþдµÄ¹¹Ôì²î²»¶à£¬Ö»²»¹ýÒþдµÄ·½·¨²»Ò»Ñù¶øÒÑ£¬¼ÈÈ»LSBÒþд¿ÉÒÔÓÿ¨·½¼ì²â£¬JStegµ±È»Ò²¿ÉÒÔ£¬ÒòΪÔÚÇ°ÃæÌáµ½¹ý£¬ËùÒÔÔڴ˾Ͳ»ÔÙ׸Êö¡£

Îå¡¢×ܽá

JStegÒþдËã·¨ÊÇÒ»ÖÖ½ÏΪ¼òµ¥µÄËã·¨£¬ÆäÖ÷ÒªÊÇ»ùÓÚDCTϵÊýµÄ±ä»»½øÐÐÊý×ÖÒþд£¬¾ßÓмòµ¥£¬Ò×ÓÚʵÏÖ£¬ÇÒÆäÒþ²ØÈÝÁ¿Ï൱¿Í¹Û£¬ÆäÏà¶ÔÈÝÁ¿£¨Ç¶ÈëÈÝÁ¿ÓëÎļþ×ÔÉíµÄ´óС±ÈÖµ£©Óë¿ÕÓòLSB·½·¨Ï൱£¬ºÜÊʺϳõѧÕßʹÓᣲ»¹ý£¬¶ÔÓÚÆä¼ì²â¶øÑÔ£¬ÓÉÓÚÆäDCTϵÊýÔÚÒþдǰºóͳ¼ÆÖ±·½Í¼µÄÒì³££¬¿ÉÒÔºÜÈÝÒ׵ı»¿¨·½¹¥»÷·½·¨¼ì²â³öÃØÃÜÐÅÏ¢µÄ´æÔÚ£¬Òò´Ë£¬°²È«²»¾ßÓÐÒ»¶¨µÄ±£ÕÏÐÔ£¬¶ÔÓÚ³õѧÕ߶øÑÔ£¬ÒòΪ²»»áÓÃÆäÒþ²Ø½ÏΪÃØÃܵÄÐÅÏ¢£¬¹ÊÈÔÈ»¿ÉÒÔ²ÉÓÃJStegÀ´¶ÔDCTÒþдÀ´½øÐÐѧϰ£¬ÕÆÎÕÁËÕâÒ»ÖÖ·½·¨ºó£¬¾Í¿ÉÒÔÏò¸ü¸ß¼¶µÄÒþд·½·¨Ìøתѧϰ¡£

¡¾²Î¿¼ÎÄÏס¿

[1]ÍõÀöÄÈ£¬ÕÅ»À¹ú.ÐÅÏ¢Òþ²Ø¼¼ÊõÓëÓ¦ÓÃ.Î人£ºÎ人´óѧ³ö°æÉ磬2003£¬1-13

[2]Jan J K£¬Tseng Y M£®On the security of image encryption method£®Information Processing Letters£¬1996£¬60(2)£º261¡ª265 [3] ÀǬ. ͼÏñÒþ²ØÐÅÏ¢¼ì²â[D]. ÖÐɽ´óѧ,2005 [4] л½£·æ. ÐÅÏ¢Òþ²ØµÄËã·¨Ñо¿[D]. ¸´µ©´óѧ,2004

[5] Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3&4): 313-336 [6] ÍõË·ÖУ¬ÕÅÐÂÅô£¬ÕÅ¿ªÎÄ. Êý×ÖÃÜдºÍÃÜд·ÖÎö: »¥ÁªÍøʱ´úµÄÐÅÏ¢Õ½¼¼Êõ[M]. ±±¾©: Ç廪´óѧ³ö°æÉç, 2005

[7] ÎâÇïÐÂ,ÑîÒåÏÈ.ÐÅÏ¢Òþ²Ø¼¼Êõ¡ª¡ªÒþдÊõÓëÊý×Öˮӡ[M].ÈËÃñÓʵç³ö°æÉç,2001,9:3-8

[8]Íõ±þÎý,³Âçù,µË·åÉ­.Êý×Öˮӡ¼¼Êõ[M¡³.Î÷°²µç×ӿƼ¼´óѧ³ö°æÉç,2003.

[9]Stefan Katzenbeisser,Fabien A..P. Peticolas±à.ÎâÇïÐÂ,Å¥ÐÄÐÃ,ÑîÒåÏÈ,ÂÞÊØɽ,ÑîÏþ±ø,Òë.ÐÅÏ¢Òþ²Ø¼¼Êõ)ÒþдÊõÓëÊý×Öˮӡ=Ml.±±¾©:ÈËÃñÓʵç³ö°æÉç,2001.

[10]¶¡çâ,Æ붫Ðñ.Êý×ÖͼÏñ±ä»»¼°ÐÅÏ¢Òþ²ØÓëαװ¼¼ÊõIJ].¼ÆËã»úѧ±¨,1998,21(9):839~843

¸½Â¼

JStegÒþд´úÂ루matlab£©

clc

clear all;% clear all variables from previous sessions close all;

covername = input('Enter image file name with extension: ', 's');

messagename = input('Enter message image file name with extension: ', 's');

cover = imread(covername);

sz = size(cover);

rows = sz(1,1); cols = sz(1,2);

colors = max(max(cover)); %r=1;

%for i=1:rows % for j=1:3:cols