·¢²¼Ê±¼ä : ÐÇÆÚËÄ ÎÄÕ»ùÓÚDCTµÄJStegÒþд¼°·ÖÎö¸üÐÂÍê±Ï¿ªÊ¼ÔĶÁ48298008cc22bcd127ff0c4f
ÆäÖУ¬N±íʾ±ê×¼¸ß˹·Ö²¼
B.¾ö²ßº¯Êý
´óÁ¿ÊµÑéÖ¤Ã÷£¬»ùÓÚС²¨ÌØÕ÷º¯Êýͳ¼Æ¾ØµÄÒþд·ÖÎö·½·¨ºÜÓÐЧ£¬¼ì²âÂʺܸߡ£
4.2»ùÓÚÖ§³ÖÏòÁ¿»úµÄ¶àÌØÕ÷ä¼ì²âËã·¨
ÎÒÃÇÖªµÀ£¬ÏÖÔÚÑо¿µÄÒþд·ÖÎö¶¼ÊÇΨÔØÃܹ¥»÷£¬¼´ÔØÌåͼÏñδ֪µÄ¼ì²â£¬ËùÒÔÎÒÃÇÒª¹¹ÔìÒ»½üËÆÓÚÔØÌåͼÏñµÄͼÏñ¡£ÓÉÓÚJPEGͼÏñÔÚ½øÐÐѹËõʱ£¬ÆäDCT±ä»»ºÍÁ¿»¯¶¼ÊÇÔÚsxsµÄ×Ó¿éÉϽøÐеģ¬ËùÒÔ¿éÓë¿éÖ®¼ä´æÔÚÒ»¶¨µÄ²»Á¬ÐøÐÔ£¬¼´ËùνµÄ·Ö¿éЧӦ£¬Ö¦×¼Í¼ÏñµÄ»ñµÃ£ºÊ×ÏȽ«ÔØÃÜͼÏñJ1½âѹµ½¿ÕÓò£¬È»ºóÔÚÿ¸ö·½ÏòÉϲüôµô4¸öÏñËص㣬×îºóÓÃÓëÔͼÏñÏàͬµÄµÄÁ¿»¯¾ØÕóÖØÐÂѹËõͼÏñµÃµ½Í¼ÏñÈçJ2£¬Èçͼ3.1Ëùʾ£¬J2½üËÆΪÔÔØÌåͼÏñ£¬³ÆΪУ׼ͼÏñ¡£
ͼ 3.1 ±ê׼ͼÏñµÄ²úÉú
¶¨ÒåͼÏñµÄÌØÕ÷º¯ÊýΪF(ÈçÖ±·½Í¼º¯Êý£¬¹²Éú¾ØÕóº¯ÊýµÈ)£¬ÔòÌØÕ÷ÖµfÓÉÏÂʽ²úÉú£º
ÆäÖÐLl·¶Êý¶¨ÒåΪһ¸öÏòÁ¿(»ò¾ØÕó)ËùÓÐÔªËصľø¶ÔÖµ×ܺ͡£
µ±È»£¬×î¼òµ¥µÄ»¹ÊÇ»ùÓÚJStegµÄ¿¨·½¼ì²â£¬ÒòΪJStegµÄÒþ²Ø±¾Éí¾ÍÊǺÍLSBÒþдµÄ¹¹Ôì²î²»¶à£¬Ö»²»¹ýÒþдµÄ·½·¨²»Ò»Ñù¶øÒÑ£¬¼ÈÈ»LSBÒþд¿ÉÒÔÓÿ¨·½¼ì²â£¬JStegµ±È»Ò²¿ÉÒÔ£¬ÒòΪÔÚÇ°ÃæÌáµ½¹ý£¬ËùÒÔÔڴ˾Ͳ»ÔÙ׸Êö¡£
Îå¡¢×ܽá
JStegÒþдËã·¨ÊÇÒ»ÖÖ½ÏΪ¼òµ¥µÄËã·¨£¬ÆäÖ÷ÒªÊÇ»ùÓÚDCTϵÊýµÄ±ä»»½øÐÐÊý×ÖÒþд£¬¾ßÓмòµ¥£¬Ò×ÓÚʵÏÖ£¬ÇÒÆäÒþ²ØÈÝÁ¿Ï൱¿Í¹Û£¬ÆäÏà¶ÔÈÝÁ¿£¨Ç¶ÈëÈÝÁ¿ÓëÎļþ×ÔÉíµÄ´óС±ÈÖµ£©Óë¿ÕÓòLSB·½·¨Ï൱£¬ºÜÊʺϳõѧÕßʹÓᣲ»¹ý£¬¶ÔÓÚÆä¼ì²â¶øÑÔ£¬ÓÉÓÚÆäDCTϵÊýÔÚÒþдǰºóͳ¼ÆÖ±·½Í¼µÄÒì³££¬¿ÉÒÔºÜÈÝÒ׵ı»¿¨·½¹¥»÷·½·¨¼ì²â³öÃØÃÜÐÅÏ¢µÄ´æÔÚ£¬Òò´Ë£¬°²È«²»¾ßÓÐÒ»¶¨µÄ±£ÕÏÐÔ£¬¶ÔÓÚ³õѧÕ߶øÑÔ£¬ÒòΪ²»»áÓÃÆäÒþ²Ø½ÏΪÃØÃܵÄÐÅÏ¢£¬¹ÊÈÔÈ»¿ÉÒÔ²ÉÓÃJStegÀ´¶ÔDCTÒþдÀ´½øÐÐѧϰ£¬ÕÆÎÕÁËÕâÒ»ÖÖ·½·¨ºó£¬¾Í¿ÉÒÔÏò¸ü¸ß¼¶µÄÒþд·½·¨Ìøתѧϰ¡£
¡¾²Î¿¼ÎÄÏס¿
[1]ÍõÀöÄÈ£¬ÕÅ»À¹ú.ÐÅÏ¢Òþ²Ø¼¼ÊõÓëÓ¦ÓÃ.Î人£ºÎ人´óѧ³ö°æÉ磬2003£¬1-13
[2]Jan J K£¬Tseng Y M£®On the security of image encryption method£®Information Processing Letters£¬1996£¬60(2)£º261¡ª265 [3] ÀǬ. ͼÏñÒþ²ØÐÅÏ¢¼ì²â[D]. ÖÐɽ´óѧ,2005 [4] л½£·æ. ÐÅÏ¢Òþ²ØµÄËã·¨Ñо¿[D]. ¸´µ©´óѧ,2004
[5] Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3&4): 313-336 [6] ÍõË·ÖУ¬ÕÅÐÂÅô£¬ÕÅ¿ªÎÄ. Êý×ÖÃÜдºÍÃÜд·ÖÎö: »¥ÁªÍøʱ´úµÄÐÅÏ¢Õ½¼¼Êõ[M]. ±±¾©: Ç廪´óѧ³ö°æÉç, 2005
[7] ÎâÇïÐÂ,ÑîÒåÏÈ.ÐÅÏ¢Òþ²Ø¼¼Êõ¡ª¡ªÒþдÊõÓëÊý×Öˮӡ[M].ÈËÃñÓʵç³ö°æÉç,2001,9:3-8
[8]Íõ±þÎý,³Âçù,µË·åÉ.Êý×Öˮӡ¼¼Êõ[M¡³.Î÷°²µç×ӿƼ¼´óѧ³ö°æÉç,2003.
[9]Stefan Katzenbeisser,Fabien A..P. Peticolas±à.ÎâÇïÐÂ,Å¥ÐÄÐÃ,ÑîÒåÏÈ,ÂÞÊØɽ,ÑîÏþ±ø,Òë.ÐÅÏ¢Òþ²Ø¼¼Êõ)ÒþдÊõÓëÊý×Öˮӡ=Ml.±±¾©:ÈËÃñÓʵç³ö°æÉç,2001.
[10]¶¡çâ,Æ붫Ðñ.Êý×ÖͼÏñ±ä»»¼°ÐÅÏ¢Òþ²ØÓëαװ¼¼ÊõIJ].¼ÆËã»úѧ±¨,1998,21(9):839~843
¸½Â¼
JStegÒþд´úÂ루matlab£©
clc
clear all;% clear all variables from previous sessions close all;
covername = input('Enter image file name with extension: ', 's');
messagename = input('Enter message image file name with extension: ', 's');
cover = imread(covername);
sz = size(cover);
rows = sz(1,1); cols = sz(1,2);
colors = max(max(cover)); %r=1;
%for i=1:rows % for j=1:3:cols