期刊文献+

一类可抵御SPA分析的动态补偿LSB信息隐藏方法 被引量:22

A Dynamic Compensation LSB Steganography Method Defeating SPA
下载PDF
导出
摘要 针对常用的LSB信息隐藏,SPA(Sample Pair Analysis)分析方法能以很高的精度估计出图像中隐藏信息的比率.文章通过对隐藏信息后的图像进行动态补偿,给出了一类可抵御SPA分析的LSB信息隐藏方法.该方法使得即使嵌入比率接近于100%,使用SPA方法分析仍将得到一个接近于0的低于判决门限的估计值,从而做出错误的判决.同时,将动态补偿的相关参数作为密钥的一部分,进一步提高了隐藏系统的安全性.实验表明:该方法同时还能有效抵抗RS分析及SPA和RS的多种改进方法的攻击. As for the common LSB steganography, SPA (Sample Pair Analysis) method can estimate the embedding rate in image with high precision. This paper presents a novel kind of LSB steganalytical method against SPA, which major in compensating image after embedding. Using the proposed algorithm, SPA steganalysis will get a very small estimate value close to 0 even when the embedding rate is near 100%, which is an incorrect judgement. Moreover, some compensation parameters can be used as part of secret key to improve the system security. Experimental results show that this method also can defeat the RS analysis and many kinds of improved version of SPA and RS steganalysis.
出处 《计算机学报》 EI CSCD 北大核心 2007年第3期463-473,共11页 Chinese Journal of Computers
基金 国家自然科学基金(10171017 60374004 60673082和90304014) 国家自然科学基金重大研究计划(90204013) 上海市科技发展基金(035115019) 教育部全国优秀博士学位论文作者专项基金(200084) 河南省杰出青年基金(0412000200) 河南省高校杰出科研人才创新工程(2001KYCX008)等资助
关键词 信息隐藏 LSB嵌入 SPA分析 动态补偿 steganography LSB embedding SPA steganalysis dynamic compensation
  • 相关文献

参考文献18

  • 1Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images.IEEE Multimedia,2001,8(4);22-28
  • 2Westfeld A.Detecting low embedding rates//Proceedings of the 5th Information Hiding Workshop.Lecture Notes in Computer Science 2578,Berlin:Germany Springer-Verlag,2002:324-339
  • 3Westfeld A,Pfitzmann A.Attacks on steganographic systems//Proceedings of the 5th Information Hiding Workshop.Lecture Notes in Computer Science 1768,Berlin:Germany Springer-Verlag,1999:61-76
  • 4Chandramouli R,Memon N D.Analysis of LSB based image steganography techniques//Proceedings of IEEE International Conference on Image Processing.Thessaloniki,Greece,2001:1019-1022
  • 5Chandramouli R,Memon N D.On sequential watermark detection.IEEE Transactions on Signal Processing,2003,51(4):1034-1044
  • 6Chandramouli R,Memon N D.A distributed detection framework for steganalysis//Proceedings of the 2000 ACM workshops on Muhimedia.California,USA,2000:123-126
  • 7Fridrich J,Goljan M.Practical steganalysis of digital imagesstate of the art//Proceedings of SPIE:Security and Watermarking of Multimedia Contents IV,2002:4675:1-13
  • 8Fridrich J,Goljan M,Du R.Reliable detection of LSB steganography in color and grayscale images//Proeeedings of the ACM Workshop Multimedia Security.Ottawa,Canada,2001:27-30
  • 9Dumitrescu Sorina,Wu Xiaolin,Wang Zhe.Detection of LSB steganography via sample pair analysis.IEEE Transactions on Signal Processing,2003,51(7):1995-2007
  • 10Dumitrescu Sorina,Wu Xiaolin,Wang Zhe.Detection of LSB steganography via sample pair analysis//Proceedings of the 5th Information Hiding Workshop.Lecture Notes in Computer Science 2578,Berlin:Germany Springer-Verlag,2002:355-372

二级参考文献9

  • 1翟卫东,刘振华,吕述望.应用于隐写检测中的几个统计学结论[J].通信技术,2003,36(4):75-77. 被引量:3
  • 2王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 3[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 4[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
  • 5[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
  • 6[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
  • 7[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
  • 8[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
  • 9[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html

共引文献24

同被引文献175

引证文献22

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部