期刊文献+

JPEG文件隐形信息检测算法 被引量:2

A JPEG steganalysis algorithm
下载PDF
导出
摘要 隐秘信息分析的目的是正确分辨出文件中是否带有隐藏的信息.自然图像和含密图像的DCT系数经过差分之后,它们的直方图会呈现不同的规律,作者以此为特征向量,来检测JPEG图像是否带有隐藏信息.通过对原特征向量进行分析,提取了二次特征,用来估算在JPEC文件中大致所埋的信息量.实验结果表明,这一算法有效. The purpose of image steganalysis is to find out whether the hidden messages exist in images. After differencing DCT coefficients of natural - images and stego - images, their histograms present different laws. This paper regards this as the feature vector to determine whether a hiding message is in the image. Though the analysis of former feature vector, the author extracts a new feature to estimate the amount of hidden information in JPEG. The results of the experiments show our approach is extremely effective.
出处 《上海师范大学学报(自然科学版)》 2005年第3期26-32,共7页 Journal of Shanghai Normal University(Natural Sciences)
关键词 数字信息隐写术 隐秘分析术 自然图像 含密图像 支持向量机 steganography steganalysis natural - image stego - image SVM
  • 引文网络
  • 相关文献

参考文献9

  • 1PROVOS N.Defending against statistical steganalysis[M].Proc 10th USENIX Security Symposium.Washington,DC,2001.
  • 2Steganography software for Windows [OL].http:∥members.tripod.com/steganography/stego/software.html.
  • 3WESTFELD A.High capacity despite better steganalysis(F5-A steganographic algorithm) [J].In:Moskowitz,I S(eds):Information Hiding.4th International Workshop.Lecture Notes in Computer Science,2001(2137):289-302.
  • 4FRIDRICH J.GOLJAN M,HOGEA D.Steganalysis of JPEG images:breaking the F5 algorithm[J].5th Information Hiding Workshop,Noordwijkerhout,Netherlands,2002(10).
  • 5FARID H,SIWEI LYU.Detecting hidden messages using higher-order statistics and support vector machines[J].5th Information Hiding Workshop,Noordwijkerhout,Netherlands,2002(10).
  • 6AVCIBAS I,MEMON N,SANKUR B.Steganalysis using image quality metrics [J].Security and Watermarking of Multimedia Contents,San Jose,Ca,2001(2).
  • 7HUANG J.Statistics of natural images and model[M].Ph D Thesis,Division of Appled Mathematics,Brown University,RI,2000.
  • 8WESTFIELD A,PFITZMANN A.Attacks on steganographic systems[J].Information Hiding,LNCS 1768,1999:61-76.
  • 9HSU C W,LIN C J.A comparison of methods for multiclass support vector machines [J].IEEE Transaction on Neural Networks,2002(13):415-425.

同被引文献12

  • 1宋华,尤新刚,戴一奇.基于SVM的JPEG图像隐密分析研究[J].计算机工程,2006,32(10):6-8. 被引量:7
  • 2黄聪,宣国荣,高建炯,施云庆.基于DCT域共生矩阵的JPEG图像隐写分析[J].计算机应用,2006,26(12):2863-2865. 被引量:6
  • 3赵永宽 蔡晓霞 陈红.针对图像盲检测算法的模糊综合评估.通信学报,2010,31(9):259-263.
  • 4伊兵哲,平西建.基于LSSVM的JPEG图像隐写分析算法[C]//第七届全国信息隐藏暨多媒体信息安全学术大会论文集.南京:中国电子学会,2007:254-259.
  • 5Hsc C T, Wu J L. Hidden Digital Watermarks in Images [ C]//IEEE Trans. On Image Processing. 1999:58-68.
  • 6P. Sallee. Model-Based Steganography [ C ]//Proceedings of International Workshop on Digital Watermarking. Berlin: Springer-Verlag, 2004: 154-167.
  • 7A. Wesffeld. F5-A Steganography Algorithm: High Ca- pacity Despite Better Steganalysis[ J]. Lecture Notes in Com- puter Science, 2001:289-302.
  • 8Smith J, Comiskey B. Modulation and information hiding in images [ EB/OL]. http://citeseer, nj. nec. com/ smith97 modulation, html.
  • 9王朔中,张新鹏,张开文.数字密写和密写分析一互联网时代的信息战技术[M].北京:清华大学出版社,2005.
  • 10伊兵哲,平西建.基于LSSYM的JPEG图像隐写分析算法[C]//第七届全国信息隐藏暨多媒体信息安全学术大会,2007:254-259.

引证文献2

二级引证文献2

相关主题

;
使用帮助 返回顶部