期刊文献+

基于块边界特性的MB隐秘分析方法

MB steganalysis based on characteristics of blockiness at block boundaries
下载PDF
导出
摘要 隐秘术的恶意滥用给信息安全带来了巨大的威胁,隐秘术中的MB算法是一种安全性较高、应用广泛的隐秘算法,对基于MB算法的恶意隐秘有效检测已成必然。在研究了MB隐秘算法特点基础上,对隐秘图像块边界特性进行了分析,验证了图像块边界特性对MB隐秘的敏感性,提出了基于块边界特性的MB隐秘分析算法,并通过实验验证了该算法的有效性。实验表明:该算法有较高的检测率,并实现了对秘密信息嵌入率的近似估计。 The malicious use of MB steganography used widely has seriously threatened the network security.It is necessary to deal with the abuse of MB steganography.Based on analyzing the characters of MB steganography and measuring the blockiness at the block boundaries,a novel MB steganalysis method was presented and verified in the experiment.The result shows that the proposed scheme is effective.
出处 《海军工程大学学报》 CAS 北大核心 2010年第4期55-59,81,共6页 Journal of Naval University of Engineering
基金 中国博士后基金资助项目(20080431379) 国家863计划资助项目(2009AAJ116)
关键词 信息隐藏 隐秘分析 MB隐秘算法 information hiding steganalysis model-based steganography
  • 引文网络
  • 相关文献

参考文献9

  • 1WESTFELD A, PFITZMANN A. Attacks on steganographie systems breaking the steganographic utilities ezstego,jsteg,steganos and s-tools and lessons learned[C]// Proceedings of 3rd IHWC. Heidellberg.. Springer- Verlag, 1999.
  • 2FRIDRICH J, GOLJAN M, HOGEA D. Attacking the outguess [C]// Proceedings of 11^th ACM Workshop on Multimedia and Security. Juan-Les-Pias, France: ACM, 2002.
  • 3FRIDRICH J, GOLJAN M, HOGEA D. Steganalysis of JPEG images.. Breaking the F5 algorithm[C]// Proceedings of 5^th IHWC. Heidellberg:Springer-Verlag, 2002.
  • 4SALLEE P, KALKER T. Model-based steganography[C]//Proceedings of 5^th IWDW. Seoul, Korea, 2004.
  • 5BOHME R, WESTFELD A. Breaking cauehy model-based JPEG steganography with firstorder statistics [C]// Proceedings of ESORICS 2004. Heidellberg: Springer-Verlag, 2004.
  • 6伊兵哲,平西建,许漫坤.一种针对MB数字隐写的改进隐写分析方法[J].信息工程大学学报,2007,8(3):339-343. 被引量:4
  • 7CACHIN C. An information-theoretic model for steganography [-CJ// In Proceedings of 2^nd IWIH 1998. Heidellberg: Springer-Verlag, 1998.
  • 8FRIDRICH J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [C]//Proceedings of 6^th IHWC. Heidellberg: Springer-Verlag, 2004.
  • 9SALLEE P. Steganography software model-based method [EB/OL] http://redwood, ucdavis, edu/phil/papers/ iwdw03, htm, 2008-01-01/2009-09-23.

二级参考文献7

  • 1Westfeld A,Pfitzmann A.Attacks on steganographic systems[C]// Proceedings of 3rd International Workshop on Information Hiding.Berlin:Springer-Verlag,1999:61-76.
  • 2Zhang Tao,Ping Xijian.A Fast and Effective Steganalytic Technique Against Jsteg-Like Algorithms[C]// Proceedings of the 18th ACM Symposium on Applied Computing,Track on Computer Security.Florida,2003:307-311.
  • 3Fridrich J,Golian M,Hogea D.Steganalysis of JPEG Images:Breaking the F5 Algorithm[C]// Proceedings of the 5th Information Hiding Workshop.Berlin:SpringerVerlag,2002:310-323.
  • 4Fridrich J,Golian M,Hogea D.Attacking the OutGuess[C]// Proceedings of the ACM Workshop on Multimedia and Security.France,2002:256-262.
  • 5Bohme R,Westfeld A.Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics[C]//Proceedings of ESORICS 2004.Berlin:Springer-Verlag,2004:125-140.
  • 6Cachin C.An Information-Theoretic Model for Steganography[C]// Proceedings of 2nd International Workshop on Information Hiding.Berlin:Springer-Verlag,1998:306-318.
  • 7Sallee P.Model-Based Steganography[C]// Proceedings of International Workshop on Digital Watermarking.Berlin:Springer-Verlag,2004:154-167.

共引文献3

;
使用帮助 返回顶部