[1]欧阳春娟,李霞,李斌.基于递进多目标蛙跳优化的LSB±K隐写算法[J].深圳大学学报理工版,2012,29(No.3(189-282)):224-229.[doi:10.3724/SP.J.1249.2012.03224]
 OUYANG Chun-juan,LI Xia,and LI Bin.A secure LSB plus-minus K steganography based on escalating multi-objective SFLA[J].Journal of Shenzhen University Science and Engineering,2012,29(No.3(189-282)):224-229.[doi:10.3724/SP.J.1249.2012.03224]
点击复制

基于递进多目标蛙跳优化的LSB±K隐写算法()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第29卷
期数:
2012年No.3(189-282)
页码:
224-229
栏目:
电子与信息科学
出版日期:
2012-05-21

文章信息/Info

Title:
A secure LSB plus-minus K steganography based on escalating multi-objective SFLA
作者:
欧阳春娟12李霞12李斌12
1)深圳大学信息工程学院,深圳 518060
2)深圳市现代通信与信息处理重点实验室,深圳 518060
Author(s):
OUYANG Chun-juan12 LI Xia12 and LI Bin12
1) College of Information Engineering, Shenzhen University, Shenzhen 518060, P.R.China
2) Shenzhen Modern Communications and Information Processing Research Laboratory, Shenzhen 518060, P.R.China
关键词:
数据安全与计算机安全隐写混合蛙跳算法多目标优化
Keywords:
data security and computer security steganography shuffled frog leaping algorithm multi-objective optimization
分类号:
TP 309.2
DOI:
10.3724/SP.J.1249.2012.03224
文献标志码:
A
摘要:
设计一种采用非支配排序、拥挤机制和种群重构等策略的递进多目标混合蛙跳算法,可有效保证Pareto前沿的多样性和均匀性.将该多目标优化算法用于设计LSB±K隐写算法.在优化过程中对图像分块,对应所有图像子块组成的矩阵构成优化算法的可行解,矩阵元素代表对应图像块像素的嵌入位数.以载体图像与载密图像差分图的直方图特征函数质心差和隐写容量为两个优化目标,对不同图像块的嵌入位数进行优化.实验结果表明,采用递进多目标混合蛙跳优化的LSB±K隐写算法,与相近抗分析性能下的LSBM隐写及单目标优化LSBM隐写相比,嵌入容量提高了30%;与相同容量的LSB±2隐写及单目标优化LSB±2隐写相比,抗分析能力更强.
Abstract:
An escalating multi-objective shuffled frog leaping algorithm (EMO-SFLA) was proposed. In the EMO-SFLA strategies such as non-dominated sorting, crowding distance and population reconstruction were adopted to obtain a diversity and uniformity of the Pareto frontier. Then, an improved least-significant bit plus-minus K steganography (denoted as SFLA-LSBK) was put forward based on EMO-SFLA. In SFLA-LSBK, a matrix denoting all the image blocks was defined as a feasible solution, and the value was shown of each element of the matrix, denoting the embedding bits of the corresponding image block. The difference of the histogram characteristic function center of mass (HCF-COM) of the cover difference images and its stego version, together with the embedding capacity, were employed as the two objects for optimizing the embedded bits of each image block. Experimental results show that, under similar security levels, SFLA-LSBK has a 30% increase in embedding capacity over LSB Matching steganography, and the LSB Matching steganography was improved with single objective optimization. The proposed method also demonstrates better performance in resisting steganalysis than LSB±2 steganography, and the LSB±2 steganography is improved with single objective optimization under the same embedding capacity.

参考文献/References:

[1] Sharp T. An implementation of key-based digital signal steganography[C]// Proceedings of the 4th International Workshop on Information Hiding. Pittsburgh(USA): IEEE Press, 2001, 2137: 13-26.
[2] Eusuff M M, Lansey K E. Optimization of water distribution network design using the shuffled frog leaping algorithm[J]. Journal of Water Sources Planning and Management, 2003, 129(3): 210-225.
[3] Hateme, Emad E, Tarek H, et al. Comparison of two evolutionary algorithms for optimization of bridge deck repairs[J]. Computer-Aided Civil and Infrastructure Engineering, 2006, 21: 561-572.
[4] Deb K, Pratab A, Agrawal S, et al. A fast and elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II[J]. IEEE Transcations on Evolutionary Computation, 2002, 6(2): 182-197.
[5] SHI Rui-feng, ZHOU Hong, TAN Xiao-wei. A multi-objective genetic algorithm based on escalating strategy[J]. Systems Engineering Theory and Practice, 2005, 25(12): 48-56.(in Chinese)
师瑞峰,周泓,谭小卫. 递进多目标遗传算法[J]. 系统工程理论与实践, 2005, 25(12): 48-56.
[6] ZHAO Liang,JU Gang,LU Jian-hong. An improved genetic algorithm in multi-objective optimization and its application[J]. Proceedings of the CSEE, 2008, 28(2): 96-102.(in Chinese)
赵亮, 雎刚, 吕剑虹. 一种改进的遗传多目标优化算法及其应用[J]. 中国电机工程学报, 2008, 28(2): 96-102.
[7] Ker A D. Steganalysis of lsb matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
[8] Li X, Zeng T. Detecting lsb matching by applying calibration technique for difference image[C]// Proceedings of 10th ACM Workshop on Multimedia and Security. Oxford(UK): ACM Press, 2008: 133-138.
[9] Mitrinovic D S, Pecaric J E, Fink A M. Classical and New Inequalities in Analysis[M]. Dordrecht(Netherlands): Kluwer Academic Publishers, 1993.
[10] United States Department of Agriculture. Natural resources conservation service photo gallery[DB/OL]http://photogallery.nrcs.usda.gov, 2002.
[11] LIU Guang-jie, ZHANG Zhan. Improved LSB-matching steganography for preserving second-order statistics[J]. Journal of Multimedia, 2010, 5(5):458-463.
[12] Xuan G, Shi Y, Gao J, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[J].Computer Science, 2005, 3727: 262-265.

相似文献/References:

[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
 ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(No.3(189-282)):340.
[2]张席,陈泯融,杨玲.基于身份多接收者签密方案的安全性分析[J].深圳大学学报理工版,2010,27(4):408.
 ZHANG Xi,CHEN Min-rong,and YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(No.3(189-282)):408.
[3]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417.
 ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(No.3(189-282)):417.
[4]张鹏,喻建平,刘宏伟.同态签密方案及其在电子投票中的应用[J].深圳大学学报理工版,2011,28(No.6(471-564)):489.
 ZHANG Peng,YU Jian-ping,and LIU Hong-wei.A homomorphic signcryption scheme and its application in electronic voting[J].Journal of Shenzhen University Science and Engineering,2011,28(No.3(189-282)):489.
[5]颜海龙,闫巧,冯纪强,等.基于PKI/CA互信互认体系的电子政务[J].深圳大学学报理工版,2012,29(No.2(095-188)):113.[doi:10.3724/SP.J.1249.2012.02113]
 YAN Hai-long,YAN Qiao,FENG Ji-qiang,et al.Research on standard system for mutual trust and mutual recognition based on PKI/CA in E-government[J].Journal of Shenzhen University Science and Engineering,2012,29(No.3(189-282)):113.[doi:10.3724/SP.J.1249.2012.02113]
[6]李雄伟,张鹏,陈开颜,等.微控制器密码芯片秩相关电磁分析[J].深圳大学学报理工版,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
 LI Xiong-wei,ZHANG Peng,CHEN Kai-yan,et al.Rank correlation electromagnetic analysis on microcontroller[J].Journal of Shenzhen University Science and Engineering,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]

备注/Memo

备注/Memo:
Received:2011-10-28;Revised:2012-01-15;Accepted:2012-04-10
Foundation:National Natural Science Foundation of China (61171124, 61103174)
Corresponding author:Professor LI Xia. E-mail: lixia@szu.edu.cn
Citation:OUYANG Chun-juan, LI Xia, LI Bin. A secure LSB plus-minus K steganography based on escalating multi-objective SFLA [J]. Journal of Shenzhen University Science and Engineering, 2012, 29(3): 224-229.(in Chinese)
基金项目:国家自然科学基金资助项目(61171124, 61103174)
作者简介:欧阳春娟(1974-),女(汉族),江西省吉安市人,井冈山大学副教授、深圳大学博士研究生. E-mail: oycj001@163.com
引文:欧阳春娟, 李霞, 李斌. 基于递进多目标蛙跳优化的LSB±K隐写算法 [J]. 深圳大学学报理工版,2012,29(3):224-229.
更新日期/Last Update: 2012-05-28