期刊文献+

基于Hilbert-Huang变换的JPEG2000隐写分析 被引量:3

Steganalysis of JPEG2000 Steganography Based on Hilbert-Huang Transform
下载PDF
导出
摘要 实现了针对由Su等人提出的JPEG2000 Lazy-mode隐写术的可靠检测.在理论和实验分析的基础上,文章揭示了由Lazy-mode隐写术生成的掩密图像,其子带代码块噪声方差序列的振荡特征异于非掩密含噪图像的子带代码块噪声方差序列.因此,此文隐写检测算法的关键在于针对这两种子带代码块噪声方差序列进行序列分析,提取它们内在的振荡特征差异.在序列分析中,通过引入Hilbert-Huang变换,对噪声方差序列进行经验模式分解,构建了基于Hilbert谱的特征向量.实验表明,基于该特征向量的支持向量机(SVM)分类器能以平均90.6%的准确率识别掩密图像.根据检索,目前尚未有对JPEG2000 Lazy-mode隐写术进行成功分析的报道,因此,该文具有重大意义. In this paper, the authors present a steganalytic method to attack JPEG2000 lazy-mode steganography proposed by Suet al. With theoretical analysis and experiments, the authors discover that the vibrations of the code-block noise variance sequences of stego images generated by lazy-mode steganography are different from those of images without hiding message. So the key issue of the proposed steganalytic method is the analysis of these two categories of code-block noise variance sequences, which can distill the differences of the vibrations of them. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences. The SVM classifier is applied to classification. The experimental results have demonstrated the correct rate to detect the hiding message achieves 90.6%. According to the best knowledge, there have not been any reports about successful attack against the JPEG2000 lazy-mode steganography before.
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1702-1710,共9页 Chinese Journal of Computers
基金 国家杰出青年科学基金(60325208) 国家自然科学基金(90604008) 国家"九七三"重点基础研究发展规划项目基金(2006CB303104) 广东省自然科学基金团队项目(04205407)资助.
关键词 JPEG2000隐写分析 Hilbert—Huang变换 经验模式分解(EMD) 序列分析 支持向量机(svM) JPEG2000 steganalysis Hilbert-Huang transform empirical mode decomposition (EMD) sequential analysis support vector machine(SVM)
  • 相关文献

参考文献10

  • 1Fridrich J.. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In:Proceedings of the 6th International Workshop on Information Hiding, Toronto, Canada, 2004, 67-81
  • 2Noda H. , Spaulding J. et al. Bit plane decomposition steganography combined with JPEG2000 compression. In: Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002, 295-309
  • 3Su P. , Kuo C.. Steganography in JPEG2000 compressed images. IEEE Transactions on Consumer Electronics, 2003, 49(4) : 824-832
  • 4Fridrich J. , Goljan M. , Hogea D.. Steganalysis of jpeg images: Breaking the F5 algorithm. In: Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhour, The Netherlands, 2002, 310-323
  • 5Trivedi S. , Chandramouli R.. Active steganalysis of sequential steganography. SHE Conference, California, USA, 2003,123-130
  • 6Trivedi S. , Chandramouli R.. Secret key estimation in sequential steganography. IEEE Transactions on Signal Processing,2005, 53(2): 746-757
  • 7Huang N. E. , Shen Z. , Long S. R. et al. The empirical mode decomposition and the Hilbert spectrum for nonlinear and nonstationary time series analysis. In: Proceedings of the Royal Society of London, 1998, A(454) : 903-995
  • 8Skodras A. , Christopoulos C. , Ebrabimi T.. The JPEG 2000 still image compression standard. IEEE Signal Processing Magazine, 2001, 18(1): 36-58
  • 9Rank K. , Lendl M. , Unbehauen R.. Estimation of image noise variance. IEE Proceedings: Vision, Image and Signal Processing, 1999, 146(2): 80-84
  • 10Taubman D.. High performance scalable image compression with EBCOT. IEEE Transactions on Image Processing, 2000,9(7), 1158-1170

同被引文献34

  • 1肖俊,王颖.基于块奇异值分解的水印算法研究[J].中国科学院研究生院学报,2006,23(3):370-376. 被引量:15
  • 2戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622. 被引量:6
  • 3Sui Xingguang, Luo Hui, Zhu Zhongliang. A Steganalysis Method Based on the Distribution of First Letters of Words[C]//Proc. of International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Pasadena, CA, USA: [s. n.], 2006.
  • 4Sui Xingguang, Luo Hui, Zhu Zhongliang. A Steganalysis Method Based on the Distribution of Characters[C]//Proc. of International Conference on Signal Processing. Guilin, China: [s. n.], 2006.
  • 5Xuan Guorong, Shi Yunqing, Gao Jianjiong, et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions[C]//Proc. of the 7th International Workshop on Information Hiding. Barcelona, Spain: [s. n.], 2005.
  • 6Lyu S, Farid H. Steganalysis Using Higher-order Image Statistics[J]. IEEE Trans. on Information Forensics and Security, 2006, 1(1): 111-119.
  • 7Lyu S, Farid H. Steganalysis Using Color Wavelet Statistics and One-class Support Vector Machines[C]//Proc. of Security, Steganography and Watermarking of Multimedia Contents. Bellingham, USA: [s. n.], 2004.
  • 8Chang Chih-Chung, Lin Chih-Jen. LIBSVM: A Library for Support Vector Machines[Z]. (2006-01-01). http://www.esie.ntu.edu.twl -ejlin/libsvm.
  • 9Sullivan K, Madhow U, Chandrasecharan S, et al. Steganalysis of spread spectrum data hiding exploiting cover rnemory[C]// Proceedings of the SPIE 2005. New York: Springer-Verlag, 2005 : 38-46.
  • 10Sullivan K,Bi Z,Madhow U,etal. Steanalysis of quantization index modulation data hiding[C]//IEEE International Conference on Image Processing 2004. Singapore: University of Central Florida Press, 2004,2 : 1165-1168.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部