期刊文献+

基于小波分解和方差分析的图像信息隐藏盲检测 被引量:4

Image-Based Blind Steganalysis Using Wavelet Statistics and Analysis of Variance
下载PDF
导出
摘要 为了实现图像中隐藏信息的盲检测,建立高阶统计模型,提取高阶小波统计量捕获原始图像和隐藏图像之间的统计差异;方差分析用于检验所提取的小波统计量对隐藏信息的敏感程度。应用方差分析选取出对隐藏信息较敏感的小波统计量作为图像的特征向量元素,基于核技巧的支撑向量机(SVM)用作原始图像与隐藏图像之间的分类器,实现图像中隐藏信息的盲检测分析。实验结果及分析表明本文的方法能较有效地实现信息隐藏的盲检测分析。 Applying wavelet decomposition to build high-scale statistical model for capturing statistical difference between cover images and stego-images. However, not all wavelet statistics are able to reflect well statistical change due to hidden message embedded. By exploring analysis of variance, the statistics that are more sensitive to hidden message are chosen as features of images. Kernel-based support vector machine is chosen as classifier to implement blind steganalysis of images. Experiment results show that our method can reach a high testing rate to hidden message of images.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第6期1460-1463,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60075002)资助课题
关键词 信息隐藏 信息隐藏分析 小波分解 方差分析 支撑向量机 Steganography Steganalysis Wavelet decomposition Analysis of variance Support Vector Machine (SVM)
  • 相关文献

参考文献9

  • 1Fridrich J,Goljan M,and Hogea D.Attacking the outguess.Proc.of the ACM Workshop on Multimedia and Security,Juan-les-Pins,France,ACM Press,2002:3-6.
  • 2Fridrich J,Goljan M,and Hogea D.Steganalysis of JPEG images:Breaking the F5 algorithm.5th Information Hiding Workshop,Noordwijkerhout,Netherlands,Springer Verlag,2002:310-323.
  • 3Farid H and Lyu S.Higher-order wavelet statistics and their application to digital forensics.IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR),Madison,Wisconsin,2003:5-9.
  • 4Tzschoppe R,Bauml R,Huber J B,and Kaup A.Steganographic system based on higher-order statistics.Proc.of SPIE and IS&T.Imaging,Security Watermarking Multimedia Contents V,Santa Clara,CA,2003:156-166.
  • 5Avcibas I,Sankur B,and Sayood K.Statistical analysis of image quality measures.Journal of Electronic Imaging,2002,11(2):206-223.
  • 6Devore J and Peck R.Statistics-The Expioration and Analysis of Data.5th Edition.CA,USA:Duxbury/Thomson Learning,2005,Chap15.
  • 7Scholkopf B,Mika S,and Burges C JC,et al..Input space versus feature space in kernel-based method.IEEE Trans.on Neural Networks,1999,10(5):1000-1017.
  • 8Philip G.Adding images to your site.http://philip.greenspun.com.
  • 9Chang C and Lin C.LIBSVM-a library for support vector machines.http://www.csie.ntu.edu.tw/-cjlin/libsvm.

同被引文献30

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 3史晓非,刘人杰,苗瑞.一种峭度依赖的参数自适应盲分离算法[J].电子与信息学报,2006,28(11):2033-2036. 被引量:1
  • 4Dumitrescu S and Wu Xiaolin. A new framework of LSB steganalysis of digital media [J]. IEEE Trans. on Signal Processing, 2005, 53(10): 3936-3947.
  • 5Ker A D. Derivation of error distribution in least squares steganalysis [J]. IEEE Trans. on Information Forensics and Security, 2007, 2(2): 140-148.
  • 6Dumitrescu S, Wu Xiallin, and Wang Zhe. Detection of LSB steganography via sample pair analysis [J]. IEEE Trans. on Signal Processing, 2003, 51(7): 1995-2007.
  • 7Yu Xiao-yi, Tan Tie-niu, and Wang Yun-hong. Extended optimization method of LSB steganalysis [C]. IEEE International Conference on Image Processing 2005. Genova, Italy, 2005(11): 1102-1105.
  • 8Ker A D. Steganalysis of embedding in two least-significant bits [J]. IEEE Trans. on Information and Security, 2007, 2(1): 46-54.
  • 9Huang Hesu and Kyriakakis C. Blind dereverberation of audio signals using a modified constant modulus algorithm [C]. 121st Audio Engineering Society. San Francisco, CA, US, 2006: 6974-6977.
  • 10Johnson M K, Lyu S, and Farid H. Steganalysis of recorded speech [C]. SHE Symposium on Electronic Imaging. San Jose, CA, US, 2005: 664-672.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部