Font Size: a A A

Image Data Hiding Based On Voronoi Diagram

Posted on:2012-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:S Y CuiFull Text:PDF
GTID:2218330368488745Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network communication technology, computer technology and intelligent mobile technology, a large number of digital image information can be transmitted through the internet conveniently. In the open environment of network platform, as the important direction of information security, data hiding technology mainly solve two problems:one is to transmit data without perception of secret information with digital media as the data hiding carrier without destruction of the image quality; the other is to protect the digital media copyright such as images and videos as the copyright protection technology.We propose a novel image steganographic technique based on space domain through the analysis of image data hiding theory.The basic idea of the data hiding algorithm based on Voronoi diagram is to generate a Voronoi diagram through mapping the pixel pairs of carrier gray image to the pixels i n regional coordinate system. To set values to the pixel pairs with the optimization algori thm, every connected pixel pair will either be each other or keep its original value. Acco rding to the above description, the secret bits can be embedded without perception.In the proposed data hiding algorithm, the basic features of Voronoi diagram and De launay triangulation are used to construct the neighboring relationship of pixel pairs to en sure the maximum similarity of neighboring pixel pairs. With the optimization algorithm, the changes of terminal conditions can achieve flexible assignment of the pixel pairs so as to promote the security of the data hiding algorithm. Furthermore, in order to improve the quality of hiding image, optimization algorithm is used to guarantee that the pixel p air is replaced in an almost smallest range in the embedded operation.In the data hiding process, to ensure the Voronoi diagrams generated in the embedd ed process and extracted process are exactly same, we keep the only form pixel pairs to avoid the information redundancy effectively.Through the analysis of parameters and simulation, the experimental results reveal th at the proposed image data hiding scheme can achieve greater data hiding capacity with 1 ess distortion compared to related schemes.
Keywords/Search Tags:Steganography, Data Hiding, Voronoi Diagram, Delaunay triangulation, CSO
PDF Full Text Request
Related items