期刊文献+

信息隐藏的检测技术研究 被引量:2

Study of data hiding detection
下载PDF
导出
摘要 信息隐藏检测是信息隐藏技术的一个重要方面,文章首先引入了信息隐藏的检测技术的概念,从不同角度出发,将信息隐藏的检测技术划分为对比检测方法、盲检测方法、时空域检测方法、频域检测方法、基于签名的检测方法和基于统计的检测方法。在众多检测技术中,文章着重研究了RQP检测法、Farid检测法和基于计算免疫系统的盲检测方法,并结合水印技术介绍了一种基于小波变换的水印检测算法。最后指出信息隐藏的检测技术有待解决的问题,如检测结果的优化与融合技术。 Data hiding detection is an important part of data hiding technique. This paper introduces firstly the definition of data hiding detection technique. Different points taken into account, the technique is classified as detection by contrasting, blind detection, detecting method in spatial field, detecting method in transformation field, detecting methods based on signature and on statistics. Among different detection techniques, the paper focuses on RQP method, Farid method and blind detection based on computing-immune system. Combining with watermarking, this paper introduces a detecting algorithm based on wavelet transformation. Finally, it points out several problems for further study , such as optimizing and syncretizing technique of the detecting result.
出处 《河北工业科技》 CAS 2006年第5期264-266,共3页 Hebei Journal of Industrial Science and Technology
关键词 信息隐藏 信息隐藏检测 盲检测 小波变换 data hiding tdata hiding detection blind retrieval lwavelet transform
  • 相关文献

参考文献6

二级参考文献55

  • 1[7]F Hartung,M Kutter.Multimedia watermarking techniques [J].Proceedings of the IEEE,July,1999,87(7):1079-1107.
  • 2[8]S M Kay.Fundamentals of Statistical Signal Processing:Estimation Theory [M].New Jersey:PTR Prentice Hall,1993.
  • 3[9]Xinxin Niu,P C Ching,Y T Chan.Wavelet based approach for joint time delay and Doppler stretch measurements [J].IEEE Trans.on Aerospace and Electronic Systems,1999,35(3):1111-1119.
  • 4[1]I J Cox,J Kilian,F T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia [J].IEEE Trans.on Image Processing,1997,IP-6(12):1673-1687.
  • 5[2]N F Johnson,S Jajodia.Exploring steganography:seeing the unseen [J].Computer,1998,31(2):26-34.
  • 6[3]W Bender,D Gruhl,N Morimoto,A Lu.Techniques for data hiding [J].IBM System Journal,1996,35(3-4):313-336.
  • 7[4]M D Swanson,B Zhu,A H Tewfik,L Boney.Robust audio watermarking using perceptual masking [J].Signal Processing,1998,66:337-355.
  • 8[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 9[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 10[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23

共引文献165

同被引文献6

  • 1陈艳春,王书海.基于Web的科技成果网络管理系统设计与实现[J].河北工业科技,2007,24(1):15-18. 被引量:6
  • 2Wen-Nung Lie and Guo-shiang Lin.A Feature_Based Classification Technique for Blind Imnge Steganalysis[J].IEEE TRANSACTIONS ON MULTIMEDIA,2005,7(6):1007-1020.
  • 3J.Fridrich,R.Du and M.Long.Steganalysis of LSB encoding in color images[A].Proceedings of ICME[C].New York,ACM Press,2000,(2):56-60.
  • 4Provos N,Honeyman P.Hide and seek:an introduction to Steganography.[J].IEEE security & privacy,2003,(7):32-44.
  • 5Hary Farid.Detecting hidden messages using higher-order statistical models[A].Proceedings of the IEEE Int'l.Conference on Image Processing 02[C],New York:IEEE,2002.
  • 6夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:20

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部