Research on the coding strategies for synonym substitution-based steganography

来源 :2014全国理论计算机科学学术年会 | 被引量 : 0次 | 上传用户:hanfenng
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  It is crucial for synonym substitution-based steganographic algorithms to choose a suitable coding strategy for high embedding capacity.In this paper,three existing coding strategies are discussed in detail.After that,a new coding strategy based on the concept of block coding is designed,and the binary tree based coding strategy is improved by constructing a complete binary tree to obtain the maximum expected coding length.The theoretical comparison of embedding capacity provided by different coding strategies has been given.The experimental results show that the block-based coding strategy provides a more balanced performance compared with other strategies.
其他文献
This paper designed a kind of optimization algorithm for image registration.By combining with cultural particle swarm optimization (CPSO),a novel image registration algorithm is outlined in this paper
Profinite topology plays a key role in formal languages.Depending on the fact that Boolean algebra of regular languages is in one-to-one correspondence to clopen of profinite topological space,we prov
To further explore the up-to techniques for bisimulation in the coalgebra setting,we investigate a special kind of functor,i.e.,product functor in this paper.Specifically,when F is the product of n su
Motivated by a previous work showing a new NP-complete decision problem,the Multistage graph Simple Path problem (MSP) possesses a novel polynomial-time heuristic algorithm,which has undergone extensi
Spatio-Temporal properties are the intrinsic properties of Cyber-Physical System(CPS),the correlation in space and time between computing and physical entities should be fully considered in CPS modeli
With the rapid development of cloud computing,how to effectively improve the utilization of computing resources in a cloud becomes a difficult problem.Therefore,a large number of distributed and paral
Considering poor quality and high noise in medical data,we propose an ensemble classifier based on support vector machine (SVM) and apply this classifier to health identification.Health identification
An L(2,1)-labeling of a graph G is an assignment of nonnegative integers to the vertices of G such that adjacent vertices get numbers at least two apart,and vertices at distance two get distinct numbe
We investigate the unbalanced cut problems.A cut (A;B) is called unbalanced if the size of its smaller side is at most k (called k-size) or exactly k (called Ek-size),where k is an input parameter.An
会议
To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different