期刊文献+

基于ICA模型的主动隐写分析

Active Steganalysis Based on ICA Model
下载PDF
导出
摘要 提出一种基于独立成分分析(ICA)模型的主动隐写分析方案。该方案假设秘密信息是独立同分布序列且统计独立于载体图像,将隐写分析过程视为ICA模型的求解问题。借助于最大后验概率估计器,该方案仅使用一幅隐写图像即能提取出秘密信息,克服了Chandramouli所提方案的局限性。仿真实验结果表明,该方案能提取大约80%的秘密信息,且性能随嵌入长度的增加而提高。 A new active steganalysis scheme which only uses one copy of stego image is presented. This paper views active steganalysis as an Independent Component Analysis(ICA) problem under the assumption that embedded secret message is an independent, identically distributed (i.i.d) random sequence and independent to cover image. With only one copy of stego image, it adoptes Maximum Posteriori(MAP) estimator to obtain an estimation of cover image and generates another two signals with the estimated version. All the three signals are as input signals of ICA algorithm. The proposed scheme overcomes the constraint of Chandramouli's method which needs two copies of stego image. Experimental results show that the proposed method achieves acceptable performance and improves its performance with larger message length.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第10期153-154,160,共3页 Computer Engineering
基金 河北省科技厅基金资助项目(05213579)
关键词 主动隐写分析 独立成分分析模型 最大后验概率估计器 active steganalysis Independent Component Analysis(ICA) model Maximum Posteriori(MAP) estimator
  • 相关文献

参考文献5

  • 1宋华,尤新刚,戴一奇.基于SVM的JPEG图像隐密分析研究[J].计算机工程,2006,32(10):6-8. 被引量:7
  • 2Avcibas I,Memon N,Sankur B.Steganalysis Using Image Quality Metrics[J].IEEE Transactions on Image Processing,2003,12(2):221-229.
  • 3Trivedi S,Chandramouli R.Active Steganalysis of Sequential Steganography[C]//Proc.of SPIE Conference.California,USA:[s.n.],2003:123-130.
  • 4Chandramouli R.A Mathematical Framework for Active Steganalysis[J].Multimedia Systems.2003,9(3):303-311.
  • 5Hyvrinen A.Fast and Robust Fixed-point Algorithms for Independent Component Analysis[J].IEEE Transactions.on Neural Network,1999,10(3):626-634.

二级参考文献5

  • 1Westfeld A,Pfitzmann A.Attacks on Steganographic Systems[C].Proceedings of 3rd International Workshop on Information Hiding,Berlin:Springer-Verlag,2000:61-75.
  • 2Fridrich J,Goljan M,Hogea D.Steganalysis of JPEG Images:Breaking the F5 Algorithm[C].Proc.of 5th Int'l Workshop on Information Hiding,Berlin:Springer-Verlag,2002.
  • 3Fridrich J,Goljan M,Hogea D.Attacking the OutGuess[C].Proc.of ACM:Special Session on Multimedia Security and Watermarking,Juan-les-Pins,France,2002.
  • 4Farid H.Detecting Steganographic Message in Digital Images[R].New Hampshire,Dartmouth College,TR:2001-412,2001.
  • 5Vapnik V N.The Nature of Statistical Learning Theory[M].New York:Springer-Verlag,1995.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部