期刊文献+

一种基于粗糙集属性约简的图像隐藏信息检测方法 被引量:6

Steganalysis Based on the Rough Set Attribute Reduction
下载PDF
导出
摘要 基于统计分析的检测方法是图像隐藏信息检测常用的方法,与特定隐写分析方法相比,它比较灵活,能够快速地适应新的或未知的隐写算法。针对特征属性高维的特点,采用粗糙集属性约简的方法来降低数据规模。实验表明:与采用全部属性的检测系统相比,该方法在不影响分类精度的前提下有效提高了检测速度。 The statistical detection is generally used in steganalysis. Comparing with the special stega- nalysis, it has the advantage of flexing. However, it has the disadvantages in large-scale data,and low calculate speed. For the high dimensions of feature attributes, the attributes reduction based on rough set can delete the non-important knowledge while not alter the classification ability of knowledge. The result of experiment shows that the proposed detection technique achieves a comparable precise detection rate as algorithm based on all feature attributes, however, it evidently decreases detection time.
出处 《华东理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第1期122-125,共4页 Journal of East China University of Science and Technology
关键词 隐写术 隐写分析 粗糙集 属性约简 steganography steganalysis rough set attribute detection
  • 相关文献

参考文献7

  • 1Chandramouli R, Subbalakshmi K P. Current trends in steganalysis: A critical survey [A]. Proceeding of Eighth International Conference Control on Automation, Robotics and Vision [C]. KunMing: Elseviser Press, 2004. 964-967.
  • 2Fridrich J, Goljan M. Practical steganalysis of digital imagestate of the art[EB/OL], http://www, ws. binghamton, edu/ fridrich/publications, html, 2003.
  • 3Pawlak Z. Rough Set: Theoretical Aspects of Reasoning about Data [M]. Dordrecht :Kluwer Academic Publishers, 1991.
  • 4Fridrieh J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [A]. Proceeding 6th Information Hiding Workshop [C]. Berlin: Springer, 2004.67-891.
  • 5Upham D. Jsteg steganographic algorithm[EB/OL]. ftp:// ftp. funet, fi/pub/erypt/steganography/, 1999.
  • 6Latham A. Steganography: JPHIDE and JPSEEK[EB/OL]. http://linux01, gwdg. de/? alatham/stego, html,1999.
  • 7Provos N. Defending against statistical steganalysis [A]. Proceedings of the 10th USENIX Security Symposium [C]. Wash ington D C: USENIX Press,2001. 323-335.

同被引文献47

  • 1张翼,陈丽萍,唐向宏.基于小波变换和奇异值分解的图像水印算法[J].杭州电子科技大学学报(自然科学版),2007,27(2):37-40. 被引量:2
  • 2李太勇,贾华丁,吴江.基于三维混沌序列的数字图像加密算法[J].计算机应用,2006,26(7):1652-1654. 被引量:30
  • 3邓大勇,黄厚宽,李向军.不一致决策系统中约简之间的比较[J].电子学报,2007,35(2):252-255. 被引量:28
  • 4李鹏,田东平,张楠.基于混沌序列的数字图像隐藏技术[J].信息安全与通信保密,2007,29(6):222-225. 被引量:9
  • 5PAWLAK Z.Rough sets:theoretical aspects of reasoning about data[M].Dordrecht:Kluwer Academic Publishers,1991.
  • 6ZUGEN LIU.Steganalysis in multiple sources of cover Images[C].//2009 Ninth International Conference on Hybrid Intelligent Systems.2009.
  • 7ZHUO LI,KUIJUN LU,XIANTING ZENG,et al.Feature -based steganalysis for JPEG images[C].// Proceedings of ICDIP2009.2009:76-80.
  • 8LI ZHUO,CHEN JIAN,JIANG XIAONING,et al.Novel blind steganalysis for JPEG images[C].// Proceedings of Visual Information Communication,2009,2009:339-353.
  • 9WENQIONG YU,ZHUO LI,LINGDI PING.Blind detection for JPEG steganography[C].//Proceedings of IEEE ICNIT 2010.Manila:[s.n.]2010:128-132.
  • 10SHI Y Q,XUAN G R,ZOU D K,et al.Steganalysis based on moments of characteristic functions using wavelet decomposition[C].// Prediction-Error Image,and Neural Network.Proceedings of IEEE ICME 2005.Amsterdam:IEEE,2005:269-272.

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部