期刊文献+

对空域BPCS密写的统计分析 被引量:20

Statistical Analysis Against Spatial BPCS Steganography
下载PDF
导出
摘要 位面复杂度分割(BPCS)密写法将复杂度较高的位平面小块用秘密信息替换,可以嵌入较多的秘密信息并维持较好的隐蔽性,但含密图像的位平面小块复杂度直方图中存在两个明显的不连续点·据此,提出了针对BPCS密写的分析方法,由复杂度直方图的不连续性可以判断秘密信息的存在性,并确定秘密信息块的复杂度范围,准确测算秘密信息嵌入量·这种分析方法的原理同样适用于变换域位面复杂度分割密写· Bit-plane complexity segmentation (BPCS) steganography replaces bit-plane blocks of high complexity with secret data, providing large embedding capacity and good imperceptibility. By constructing a histogram of bit-plane block complexity, however, a security flaw in the BPCS method is revealed. Two striking discontinuities in the complexity histogram unambiguously announce the presence of BPCS-based hidden information. Furthermore, the complexity criterion used in data embedding can be estimated quite accurately, leading to a good estimation of the embedding capacity. The steganalytic technique proposed in this paper is equally effective against BPCS steganogrphy both in the spatial (temporal) domain and in the transform domain.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2005年第7期1625-1629,共5页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(60372090) 上海市科委基础研究重点项目(04JC14037)
关键词 统计分析 秘密信息 空域 复杂度 不连续点 不连续性 位平面 直方图 隐蔽性 存在性 信息块 变换域 分割 嵌入 图像 information hiding steganalysis BPCS (Bit-Plane Complexity Segmentation) histogram
  • 相关文献

参考文献14

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 2Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 3Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13
  • 4Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3,4): 313~336
  • 5FridrichJ, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia,Special Issue on Security, 2001, 8(4): 22~28
  • 6Westfeld A, Pfitzm A. Attacks on steganographic systems [A]. In: The 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science 1768 [C].Dresden: Springer-Verlag, 1999. 61~76
  • 7张新鹏,王朔中,张开文.基于统计特性的LSB密写分析[J].应用科学学报,2004,22(1):16-19. 被引量:16
  • 8张新鹏,王朔中,张开文.抗统计分析的LSB密写方案[J].中国图象图形学报(A辑),2003,8(9):1055-1060. 被引量:22
  • 9Zhang Xinpeng, Wang Shuozhong, Zhang Kaiwen.Steganography with least histogram abnormality [A]. In:Computer Network Security, Lecture Notes in Computer Science 2776 [C]. St, Petersburg: Springer-Verlag, 2003. 395~ 406
  • 10Kawaguchi E, Eason R O. Principle and application of BPCSsteganography [A]. In: Multimedia Systems and Applications,Proceedings of SPIE 3528, Boston, 1998. 464~472

二级参考文献9

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 3[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
  • 4[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
  • 5[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
  • 6[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
  • 7[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
  • 8[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html
  • 9张开文,张新鹏,王朔中.图像及音频信号中隐蔽嵌入信息存在性的统计检验[J].电子与信息学报,2003,25(7):871-877. 被引量:4

共引文献34

同被引文献163

引证文献20

二级引证文献115

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部