{"title":"批量隐写技术的研究","authors":"Chen Gou-xi, C. Junjie","doi":"10.1109/IFITA.2010.221","DOIUrl":null,"url":null,"abstract":"In this paper, we analyzed Logistic mapping chaotic sequences and technical shortcomings for single cover steganography. Improved single cover steganography schemes based on main characteristics of steganography, and brings forward with batch theoretical model of steganography, working principle, correlation of its model maximizes payload and capacity of covers. Analyses the security, and gives formal proof by the model of information theory.","PeriodicalId":393802,"journal":{"name":"2010 International Forum on Information Technology and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research for Batch Steganography\",\"authors\":\"Chen Gou-xi, C. Junjie\",\"doi\":\"10.1109/IFITA.2010.221\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we analyzed Logistic mapping chaotic sequences and technical shortcomings for single cover steganography. Improved single cover steganography schemes based on main characteristics of steganography, and brings forward with batch theoretical model of steganography, working principle, correlation of its model maximizes payload and capacity of covers. Analyses the security, and gives formal proof by the model of information theory.\",\"PeriodicalId\":393802,\"journal\":{\"name\":\"2010 International Forum on Information Technology and Applications\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Forum on Information Technology and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IFITA.2010.221\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Forum on Information Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IFITA.2010.221","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we analyzed Logistic mapping chaotic sequences and technical shortcomings for single cover steganography. Improved single cover steganography schemes based on main characteristics of steganography, and brings forward with batch theoretical model of steganography, working principle, correlation of its model maximizes payload and capacity of covers. Analyses the security, and gives formal proof by the model of information theory.