利用Hadamard变换的无线网络图像隐写

S. Pal, P. Saxena, S. K. Muttoo
{"title":"利用Hadamard变换的无线网络图像隐写","authors":"S. Pal, P. Saxena, S. K. Muttoo","doi":"10.1109/SPCOM.2004.1458371","DOIUrl":null,"url":null,"abstract":"The discrete Hadamard transform (DHT) is a simple orthogonal transformation with a set of unique properties. Its 2D version has a separable kernel and can be implemented using fast algorithms. This paper exploits the power of DHT for carrying out steganography using images as containers of hidden information. Computational simplicity and scope for efficient and compact hardware realization makes the scheme suitable for mobile applications. By manipulating different sets of coefficients in the Hadamard transform-domain it is possible to practice steganography satisfying different criteria like transparency, capacity and survivability. It is also shown that this transform has an edge over many other popular transforms for data embedding in real-time over resource constrained wireless networks.","PeriodicalId":424981,"journal":{"name":"2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Image steganography for wireless networks using the Hadamard transform\",\"authors\":\"S. Pal, P. Saxena, S. K. Muttoo\",\"doi\":\"10.1109/SPCOM.2004.1458371\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The discrete Hadamard transform (DHT) is a simple orthogonal transformation with a set of unique properties. Its 2D version has a separable kernel and can be implemented using fast algorithms. This paper exploits the power of DHT for carrying out steganography using images as containers of hidden information. Computational simplicity and scope for efficient and compact hardware realization makes the scheme suitable for mobile applications. By manipulating different sets of coefficients in the Hadamard transform-domain it is possible to practice steganography satisfying different criteria like transparency, capacity and survivability. It is also shown that this transform has an edge over many other popular transforms for data embedding in real-time over resource constrained wireless networks.\",\"PeriodicalId\":424981,\"journal\":{\"name\":\"2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04.\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPCOM.2004.1458371\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPCOM.2004.1458371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

离散阿达玛变换(DHT)是一个具有一系列独特性质的简单正交变换。它的二维版本有一个可分离的内核,可以使用快速算法实现。本文利用DHT的力量,利用图像作为隐藏信息的容器进行隐写。计算的简单性和高效紧凑的硬件实现范围使该方案适合于移动应用。通过在哈达玛变换域中操纵不同的系数集,可以实现满足不同标准的隐写,如透明度,容量和生存性。研究还表明,在资源受限的无线网络中,这种转换比许多其他流行的实时数据嵌入转换具有优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Image steganography for wireless networks using the Hadamard transform
The discrete Hadamard transform (DHT) is a simple orthogonal transformation with a set of unique properties. Its 2D version has a separable kernel and can be implemented using fast algorithms. This paper exploits the power of DHT for carrying out steganography using images as containers of hidden information. Computational simplicity and scope for efficient and compact hardware realization makes the scheme suitable for mobile applications. By manipulating different sets of coefficients in the Hadamard transform-domain it is possible to practice steganography satisfying different criteria like transparency, capacity and survivability. It is also shown that this transform has an edge over many other popular transforms for data embedding in real-time over resource constrained wireless networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信