期刊文献+

基于小波变换的LSB替换的检测算法 被引量:2

Steganalysis of LSB replacement based on wavelet transform
原文传递
导出
摘要 最低有效位(least significant bit,LSB)替换,有顺序和随机嵌入2种方式,现有的检测方法大多只针对其中一种方式。为了实现对顺序和随机嵌入的同时检测,采用数理统计的方法对灰度图像嵌入信息前后小波高频系数的变化进行分析,建立了相应的线性回归模型,并采用基于内容的图像检索技术和机器学习的方法对模型进行了优化,以此来估计嵌入信息的长度。与RS(regular singular)和Pairs典型检测算法相比,该方法不仅能检测明文和密文嵌入,而且对嵌入信息长度估计的准确性有所提高,实验结果表明绝对误差的均值不大于2.033%。 Secret messages can be embedded sequentially or randomly in images using least significant bit (LSB) replacement. Based on the difference of the high-frequency wavelet coefficients between cover-images and stego-images, this paper use linear regression model to detect messages hidden in gray scale images by LSB replacement. Combining context-based image retrieval technology and machine learning, the accuracy of the length estimate can be improved. Experiment results demonstrate the mean of absolute error is not greater than 2.03%. Compared to RS and Pairs steganalysis methods, our algorithm can reliably detect both encrypted and unencrypted messages, while the two typical methods can only detect the encrypted ones.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第4期595-598,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(90304014)
关键词 LSB替换 隐秘分析 线性回归模型 小波变换 LSB(least significant bit) replacement steganalysis linear regression model wavelet transform
  • 引文网络
  • 相关文献

参考文献7

  • 1Westfeld A,Pfitzmann A.Attacks on steganographic systems[C]// The 3rd International Workshop on Information Hiding,Lecture Notes in Computer Science.Dresden:Springer-Verlag,1999:61-76.
  • 2Goljan M.Lossless data embedding methods for digital images and detection of steganography[D].New York:Department of Electrical and Computer Engineering,Binghamton University,USA,2001.
  • 3Avcibas I,Memon N,Sankur B.Image steganalysis with binary similarity measures[C]// Proceedings of ICIP 2002 International Conference on Image Processing.Rochester:Hindawi Publishing Corporation,2002:645-648.
  • 4Lee K,Jung C,Lee S,et al.Color cube analysis for detection of LSB steganography in RGB color images[C]// International Conference on Computational Science and Its Applications,Lecture Notes in Computer Science.Berlin:Springer-Verlag,2005:537-546.
  • 5Dabeer O,Sullivan K,Madhow U,et al.Detection of hiding in the least significant bit[J].IEEE Transactions on Signal Processing,2004,52(10):3046-3058.
  • 6Draper S.An analysis of empirical PMF-based tests for least significant bit image Steganography[C]// Information Hiding:7th International Workshop,IH 2005,Lecture Notes in Computer Science.New York:Springer-Verlag,2005:327-341.
  • 7University of Washington.CBIR Image Database[EB/OL].1997.http://www.cs.washington.edu/research/imagedata base/groundtruth.

同被引文献21

  • 1孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564. 被引量:83
  • 2陈铭,平西建.基于Arnold变换的图像信息伪装算法[J].计算机应用研究,2006,23(1):235-238. 被引量:19
  • 3刘为超,王保保,马立蒲.基于图像内容可恢复的脆弱水印技术[J].电子科技大学学报,2006,35(6):924-927. 被引量:3
  • 4谭月辉,梁欣,张俊萍,刘凯.基于Arnold变换和采样理论的置乱技术研究[J].微计算机信息,2006(12X):74-76. 被引量:13
  • 5Katzenbeisser S, Petitcolas F. Information Hinding Techniques for Steganography and Digital Watermarking [M]. Beijing: Posts & Telecom Press, 2001.
  • 6Westfeld A, Pfitzmann A. Attacks on steganographic systems [C]// The 3rd Inter Workshop on Information Hiding, Lecture Notes in Computer Science. Dresden: Springer-Verlag, 1999, 1768:61-76.
  • 7Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale image[J]. Magazine of IEEE Multimedia, Special Issue on Security, 2001 : 22 - 28.
  • 8Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]// Proceedings of SPIE, 4675. USA San Jose, 2002:1 - 13.
  • 9Farid H. Detecting hidden message using higher-order statistics models [C]//Proc of the IEEE Inter Conference on Image Processing. New York: IEEE Press, 2002: 905-908.
  • 10Siwei L, Fraid H. Detecting hidden message using higher-order statistics and support vector machines [C]// The 5th Inter Workshop on Information Hiding, Lecture Notes in Computer Science. Heidelberg: Springer Berlin, 2003, 2578: 340-354.

引证文献2

二级引证文献6

;
使用帮助 返回顶部