期刊文献+

基于主成分分析的泛盲掩密分析方案 被引量:1

A Universal Blind Steganalysis Based on Principle Component Analysis
下载PDF
导出
摘要 为了能够对掩密后图像进行有效的检测,首先从分类特征维数、单个特征的有效性和特征相关性等3个方面对Farid泛盲掩密分析算法的缺陷进行了分析,然后提出了采用主成分分析技术对分类特征进行降维处理的方法,并基于RBF(rad ial basis function)网络构造了新的泛盲掩密分析方案。该方案不但大大降低了用于分类的图像特征的维数,而且提高了掩密分析的检测性能。利用该方案和Farid的方案分别对用JSteg等软件掩密后的图像进行的检测比较实验表明,经主成分分析预处理后,该方案的样本集特征矢量维数比Farid方案分别减少了174(Jsteg)维、163(EzStego)维和180(S-Tools)维,而特征数目的减少又大大简化了分类器的设计,而且,该方案能够有效检测嵌入消息占可嵌容量的比例达60%(Jsteg)、80%(EzStego)、50%(S-Tools)以上的掩密图像,并获得了比Farid算法更高的检测率。 A new universal blind steganalysis scheme is presented based on analysing the limitation of Farid' s universal blind steganalysis on the dimension of the feature vector, the validity of the single feature, and the correlation of the features. Preprocessing is proposed using principle component analysis on the image statistics features and steganalysi's classifier is constructed using RBF network. The scheme not only reduces the dimension of the feature vector enormously, but also improves the performance of the detection. Apply our scheme and Farid' s scheme to detecting the stego images produced by JSteg, EZStego, and S-Tools respectively, and the comparison of these simulation results shows that after the preprocessing using principle component analysis the dimension of the feature vector in our scheme decreases 174(Jsteg), 163 (EzStego), 180( S-Tools), and therefore simplifies the design of the steganalysis classifier. Furthermore, our scheme is quite more efficient because the stego image that the proportion of the embedding message to the maximal embedding capability is more than 60% (Jsteg), 80% (EzStego), 50% (S-Tools) can be detected efficiently by our scheme.
出处 《中国图象图形学报》 CSCD 北大核心 2006年第3期394-400,共7页 Journal of Image and Graphics
基金 "十五"通信预研项目(41001040303)
关键词 掩密分析 泛盲掩密分析 主成分分析 steganalysis, universal blind steganalysis, principle component analysis
  • 相关文献

参考文献11

  • 1Provos N,Honeyman P.Hide and seek:An introduction to steganography[J].IEEE Security & Privacy,2003,1 (3):32 ~ 44.
  • 2Fridrich J,Goljan M.Practical steganalysis-state of the art[A].In:Proceedings of SPIE Photonics West,Electronic Imaging 2002 on Security and Watermarking of Multimedia Contents[C],San Jose,California,USA.2002:1 ~13.
  • 3Westfeld A,Pfitzmann A.Attacks on steganographic systems[A].In:Pfitzmann A.(Eds.).Proceedings of 3rd Int'l Workshop Information Hiding[C].Dresden,Germany,Springer-Verlag,1999:61 ~ 76.
  • 4Fridrich J,Goljan M,Du Rui.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,Special Issue on Security,2001,8(4):22 ~28.
  • 5ZHANG Tao,PING Xi-jian.Reliable detection of LSB steganography based on the difference image histogram[A].In:Proceedings of International Conference Asian Symposium Signal Processing[C],Hong Kong,China,2003:545 ~ 548.
  • 6Farid H.Detecting hidden messages using higher-order statistical models[A].In:Billene Mercer(Ed.).Proceedings of International Conference Image Processing[C],Rochester,NY,USA:IEEE Press,2002:905 ~ 908.
  • 7Lyu S,Farid H.Detecting hidden messages using higher-order statistics and support vector machines[A].In:Petitcolas et al.(Eds.).Proceedings of 5th International Workshop on Information Hiding[C],Noordwijkerhout,the Netherlands:Springer-Verlag,2002:340 ~ 354.
  • 8边肇棋 等.模式识别(第二版)[M].北京:清华大学出版社,2000..
  • 9Derek Upham.JPEG-JSteg-V4[EB/OL].http://www.funet.fi/ pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.
  • 10Romana Machado.EZStego[EB/OL].Http://www.stego.com.

共引文献11

同被引文献6

  • 1谢永华,李振宏,傅德胜.基于分割采样的小波域图像信息隐藏算法及性能分析[J].计算机应用与软件,2007,24(2):40-42. 被引量:2
  • 2Farid H. Detecting Hidden Messages Using Higher-order Statistical Models[C].International Conference on Image Processing, New York, 2002
  • 3Lyu Siwei, Farid H. Steganalysis Using Higher- Order Image Statistics[J].IEEE Transactions on Information Forensics and Security, 2006, 1 (1) : 111- 117
  • 4University of Washington. Groundtruth image databaser [EB/OL]. http://www. cs. washington. edu/ research/imagedatabase/groundtruth/ , 2005
  • 5Cox I J. A Secure Robust Watermark for Multimedia[J]. Workshop on Information Hiding, Cambridge, 1996:185-206
  • 6Duda R O, Hart P E, Stork D G. Pattern Classifi- cation[M]. John Wiley & Sons, 2001

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部