期刊文献+

GIF图像掩密算法的统计安全性比较 被引量:1

Statistical Security Comparison of Steganographic Algorithm on GIF Images
下载PDF
导出
摘要 利用一维统计特征的检测方法,高阶统计特征的检测方法对几种常用的信息隐藏方法的安全性进行了比较研究。实验结果表明,只改动图像索引值的信息隐藏方法的安全性优于同时改动调色板及索引值的信息隐藏方法。Fridrich信息隐藏算法由于采用了最优奇偶值分配的方法,其安全性优于EZStego。 The principle of steganography on GIF images is introduced in this paper. Some familiar steganographic methods based on GIF images are compared by the detecting methods on one dimension statistical character and multiple dimension statistical character. The results of experiments indicate that data hiding methods on modifying indices of images have better security than methods on modifying indices and palette of images together. The steganographic method presented by Fridrich is more secure than EZ Stego because it uses the optimal parity assignment.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第A02期152-155,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家"863"高技术研究发展计划资助项目(2002AA054010) 国家自然科学基金资助项目(60372083)
关键词 信息隐藏 GIF图像 调色板 索引值 安全性 steganography GIF images palette index security
  • 相关文献

参考文献9

  • 1FRIDRICHJ.Anewsteganographicmethodforpalette_basedimages[].IS&TPICS.1999
  • 2KWANM.Invariantwatermarkingusingfeaturepoints[].IEEETrans.2003
  • 3www.jjct.com steganography toolmatrix.htm .
  • 4www.jjct.com steganography toolmatrix.htm .
  • 5MACHADOR.EZStego,StegoOnline,Stego. http: www.stego.com . 1997
  • 6FRIDRICHJ.Applicationsofdatahidingindigitalimages[].TutorialforTheISSPA_.1999
  • 7FRIDRICHJ,DUJ.Securesteganographicmethodsforpaletteimages[].ProctheThirdInformHidingWorkshop.2000
  • 8JESSICAF,,MIROSLAVG,DAVIDS.Higher_orderstatisticalsteganalysisofpaletteimages[].ProcEISPIE.2003
  • 9WESTFELD A,PFITZMANN A.Attacks on Steganographic Systems[].Lecture Notes in Computer Science.2000

同被引文献11

  • 1中国互联网络信息中心(CNNIC)[R].第31次中国互联网络发展状况统计报告.北京:中国互联网络信息中心(CNNIC),2013.
  • 2DIFFIE W, IIELLMAN M. New Directions in Cryp- tography [ J ]. IEEE Trans on Information Theory, 1976, 22(6) : 644-654.
  • 3PARNAS D L. On the Criteria to Be Used In Decom- posing Systems Into Modules [J].Communications of the ACM, 1972, 15(12): 1053-1058.
  • 4TSENG Y C, PAN H K. Data Hiding in 2-color Ima- ges[J]. IEEE Trans on Computers, 2002, 51 (7): 873 -878.
  • 5WU MIN, LIU BEDE. Data Hiding in Binary Image for Authentication and Annotation [ J ]. IEEE Trans onMultimedia, 2004, 6(4): 528-538.
  • 6YANG HUIJUAN, KOT A C. Pattern-Based Data Hiding for Binary Image Authentieation by Connectivity -Preserving[J]. IEEE Trans on Multimedia, 2007, 9 ( 3 ) : 475-486.
  • 7DINESH P MEHTA, SARTAJ SAHNI. Handbook of Data Structures and Applieations [ M ]. Boca Raton, FL: CRC Press, 2004.
  • 8SIMMONS G J. Symmetric and Asymmetric Encryption [J]. ACM Computing Surveys (CSUR), 1979, 11 (4) : 305-330.
  • 9HARTUNG F, KU3TER M. Multimedia Watermark- ing Techniques[ J]. Proceedings of the IEEE, 1999,87 (7) : 1079-1107.
  • 10胡月,周庆,黎立,王昱文.GIF图像选择加密算法及其性能研究[J].计算机工程,2010,36(24):122-124. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部