期刊文献+

VQ域信息隐藏检测算法 被引量:1

Detection of VQ Based Information Hiding
下载PDF
导出
摘要 随着信息隐藏技术的发展,基于矢量量化(VQ)的信息隐藏的方法逐渐增多.本文提出了一种VQ域隐藏信息检测方法,首先通过全局搜索在已经解码的无压缩图像中恢复量化码书,然后应用聚类分析的思想将矢量空间中相近的码字归类以判断是否存在隐藏信息,最后根据各个码字的出现概率估计嵌入信息的长度.实验表明,本文提出的算法对隐藏信息的存在性有很高的识别率,对信息量的估计也比较准确. With the development of information hiding technique, some algorithms based on vector quantization have been proposed. In this paper,we present a detection method for the VQ based information hiding algorithm. This method uses the exhaustive search to retrieve the codebook, and then use clustering of codewords to decide if the image contains stegano information and estimate the length of it. The experiment proves the validity of the method.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第B12期2549-2551,共3页 Acta Electronica Sinica
基金 国家自然科学基金(No.60372052) 全国博士学位论文作者专项资金(No.FANEDD-200238) 黑龙江省杰出青年科学基金 哈尔滨工业大学跨学科研究基金(No.HITI MD-2002.11) 教育部“新世纪优秀人才支持计划” 广东省自然科学基金(No.05109511)
关键词 矢量量化 信息隐藏 隐写检测 vector quantization information hiding steganalysis
  • 相关文献

参考文献11

  • 1Lu Z M, Pan J S, Sun S H. VQ-based digital image watermarking method [J]. Electronics Letters, 2000,36 ( 14 ) :1201 - 1202.
  • 2Huang H C, Wang F H, Pan J S. Efficient and robust watermarking algorithm with vector quantization [ J ]. Electronics Letters ,2001,37 ( 13 ) :826 - 828.
  • 3Lu Z M, Liu C H, Xu D G, Sun S H. Semi-fragile image watermarking method based on index constrained vector quantization [ J ]. Electronics Letters,2003,39 ( 1 ) :35 - 36.
  • 4Frank Y S, YI -TA WU. A novel fragile watermarking technique [ A ]. Proc of ICME2004 [ C ]. Taipei, 2004. 875- 878.
  • 5Andrew D Ker. Improved Detection of LSB Steganography in Grayscale Images [ J ]. Lecture Notes in Computer Science,2004,3200:97.
  • 6Jessica Fridrich. Feature-Based Steganalysis for/PEG Images and Its Implications for Future Design of Steganographic Schemes[J]. Lecture Notes in Computer Science,2004,3200 : 67 - 81.
  • 7郭云彪,胡岚,尤新刚,张春田.针对二值图像信息隐藏的攻击方法[J].中山大学学报(自然科学版),2004,43(A02):176-179. 被引量:5
  • 8Jessica Fridrich, M Goljan, R Du. Steganalysis based on IPEG compatibility[ A ]. SPIE Multimedia Systems and Applications IV [ C ]. Denver,2001. 275 - 280.
  • 9Linde Y, Buzo A, Gray R M. An algorithm for vector quantizer design [ J ]. IEEE Trans on Communication, 1980,28(1) :84 -95.
  • 10Richard O Duda, Peter E Hart, David G. Stork. Pattern Classification, Second Edition [ M ]. John Wiley & Sons Inc ,2000. 557 - 562.

共引文献4

同被引文献9

  • 1白剑,景晓军,杨榆,徐迎晖,钮心忻,杨义先.语音信息隐藏中的AERA算法[J].电子学报,2005,33(9):1541-1544. 被引量:3
  • 2Y Huang, S Tang, J Yuan. Steganography in inactive frames of VolP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011,6(2):296- 306.
  • 3Chen B, Womell G W. Quantization index modulation: a class of provably good methods for digital watermarking and infor- marion embedding[J]. IEEE Transactions on Information The- ory,2001,47(4) : 1423 - 1443.
  • 4Xiao Bo, Huang Yongfeng, Shanyu Tang. An approach to infor- mation hiding in low bit-rate speech stream[ A ]. IEEE Globe- Com2008 [ C] .New Orleans, USA,2008. 1940 - 1944.
  • 5Malik Hafiz. Statistical modeling of footprints of QIMsteganography [ A ]. 2010 1F, EE International Conference on Multimedia and Expo[ C]. IEEE,2010. 1487 - 1492.
  • 6Malik Hafiz, K P Subbalakshmi, R Chandramouli. Nonparamet- ric steganalysis of QIM data hiding using approximate entropy EA]. Proc SPIE, Vol 6819 [ C]. CA, USA, 2008. 681914 - 681921.
  • 7Malik Hafiz. Steganalysis of QIM steganography using irregu- larity measure [ A]. Proceedings of the 10th ACM Workshop on Multimedia and Security[ C]. ACM,2008.149 - 158.
  • 8Qinxia Wu, Weiping Li, Xiao Yi Yu. Revisit steganalysis on QIM-based data hiding [ A]. The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Pro- cessing [C]. IEEE, 2009.929 - 932.
  • 9谭良,吴波,刘震,周明天.一种基于混沌和小波变换的大容量音频信息隐藏算法[J].电子学报,2010,38(8):1812-1818. 被引量:22

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部