期刊文献+

空域LSB信息伪装及其隐写分析 被引量:8

Steganography Based on LSB and Its Steganalysis
下载PDF
导出
摘要 介绍了最不重要比特(LSB)替换和LSB匹配2种典型的基于图像的信息伪装算法,阐述了两者的隐藏原理及优缺点。分类论述了各类隐写分析算法,分析其检测原理,给出了各类算法的适用范围和优缺点,对每类算法中的典型分析方法进行评价。根据信息嵌入过程对载体图像的影响分析得出LSB匹配信息伪装算法的安全性要高于LSB替换信息伪装算法的结论。指出了提高隐藏信息安全性的途径和努力方向。 This paper introduces two steganography algorithms based on image, LSB replace and LSB matching, expounds on these two algorithms' hiding principle and explains their advantages and disadvantages. It expounds each sort of steganalysis, analyses their detecting principles, gives their applying range and features, and appraises the representative analyzing method of each algorithm. By analyzing the effect on the carrier image of the embedding process, it concludes that the security of the LSB matching is much higher than that of the LSB replace. It also points out the approach and direction to improve the security of information hiding.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第1期173-174,189,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60473022)
关键词 信息隐藏 信息伪装 隐写分析 LSB替换 LSB匹配 information hiding steganography steganalysis LSB replace LSB matching
  • 相关文献

参考文献14

  • 1Callon R,Doolan P,Feldman N,et al.A Framework for Multiprotocol Label Switching[EB/OL].(1999-07-15).http://www.ietf.org/html.charters/mpls-charter.html.
  • 2Johnson N F,Jajodia S.Steganalysis of Images Created Using Current Steganography Software[M].[S.l.]:Springer-Verlag,1998.
  • 3Westfeld A.Attacks on Steganographic Systems[C]//Proc.of the 3rd Int'l Workshop in Information Hiding.Dresden,Germany:[s.n.],1999.
  • 4Jessica F,Miroslav G,Rui D.Detecting LSB Steganography in Color and Gray-scale Images[J].IEEE Transactions on Multimedia,2001,8(4):22-28.
  • 5张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75
  • 6Andrew D K.Steganalysis of LSB Matching in Grayscale Images.IEEE Signal Processing Letters,2005,12(6):441-444.
  • 7Holotyak T,Fridrich J,Soukal D.Stochastic Approach to Secret Message Length Estimation in ± K Embedding Steganography[C]//Proc.of the International Society for Optical Engineering.San Diego,California:[s.n.],2005:673-684.
  • 8Avcibasi,Memon N,Sankur B.Steganalysis Using Image Quality Metrics[J].IEEE Transactions on image Processing,2003,12(2):221-222.
  • 9Farid L S.Steganalysisusing Color Wavelet Statistics and One Class Support Vector Machines[C]//Proceedings of Symposium on Electronic Imaging.San Jose,CA:[s.n.],2004.
  • 10Menezes A,Oorschot P,Vanstone S.Handbook of Applied Cryptography[M].[S.l.]:CRC Press,1996.

二级参考文献1

  • 1Katzenbeisser Stefan等著 吴秋新等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001..

共引文献78

同被引文献61

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部