期刊文献+

针对二值图像分块奇偶密写的统计分析

Statistical Analysis of Binary Image against Block Parity Steganography
下载PDF
导出
摘要 一种实现简单的二值图像密写方法是将图像分为2×2的小块后利用边缘块的奇偶性来隐藏秘密信息.将含密图像以不同行列作边界分块时,图像块像素和的直方图存在明显差异,且非边缘块的数目变化较大.这一异常会暴露秘密信息的存在.通过将含密图像错位分块后作二次密写,并统计不同分块方式下非边缘块数目的变化量,可估计出嵌入量.该方法容易实现,实验验证了该方法的有效性. An effective data hiding method for binary images divides the cover image into 2-by-2 blocks and embeds 1 bit in each edge block by making use of the parity of the block-sum. In this paper a steganalytic scheme is described against this technique. The proposed scheme uses difference between histograms of the block-sum when the block border is changed. By removing the top row and the left-most column to crop the suspected image, a test embedding is performed. This is used for estimating the initial embedding rate. Simulation results show that the proposed method can provide a satisfactory estimate of the embedding capacity.
出处 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第3期221-224,共4页 Journal of Shanghai University:Natural Science Edition
基金 国家自然科学基金资助项目(6037209060502039)
关键词 二值图像密写 密写分析 直方图 data hiding steganalysis block histogram
  • 相关文献

参考文献7

  • 1WANG H,WANG S.Cyber warfare:steganography vs.steganalysis[J].Communications of the ACM,2004,47(10):76-82.
  • 2MATSUI K,TANAKA K.Video-steganography:how to secretly embed a signature in a picture[J].IMA Intellectual Property Project,1994,1(1):187-206.
  • 3MEI Q,WONG K,MENON N.Data hiding in binary text documents[C]//SPIE Proc Security and Watermarking of Multimedia Contents.2001,4314:369-375.
  • 4TSENG Y,PAN H.Secure and invisible data hiding in 2-color images[C]//IEEE Symposium on Computers and Communications.2001:887-896.
  • 5刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方法[J].东南大学学报(自然科学版),2003,33(z1):98-101. 被引量:16
  • 6郭云彪,胡岚,尤新刚,张春田.针对二值图像信息隐藏的攻击方法[J].中山大学学报(自然科学版),2004,43(A02):176-179. 被引量:5
  • 7YU X,WANG Y,TAN T.Steganalysis of data hiding in binary images[C]//International Conference on Pattern Recognition(ICPR'04).2004,4:877-880.

二级参考文献7

  • 1[3]Eggers J, Bauml R, Girod B. A communications approach to image steganography [A]. In: Proceedings of SPIE [C], 2002, 4675: 26-37.
  • 2[4]Petitcolas F, Anderson R, Kuhn M. Information hiding - a survey [J]. Proceedings of the IEEE,1999,87(7):1062-1078.
  • 3[5]Brown A. S-tools for windows [EB/OL]. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip,1996.
  • 4[6]Machado R. Ezstego, stego online, stego [EB/OL]. http://www.stego.com,1997.
  • 5[7]Hansmann F. Steganos, DeusEx machina communications [EB/OL]. http://www.steganography.com,1996.
  • 6[8]Chen M, Wong E K, Memon N, et al. Recent developments in document image watermarking and data hiding [A]. In: Proceedings of SPIE [C]. 2001, 4518:166-175.
  • 7[9]Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Pfitzmann A, ed. Information Hiding: Third International Workshop, LNCS[C]. Springer-Verlag,1999, 1768: 47-60.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部