期刊文献+

基于多分类支持向量机的隐写域盲检测

Blind Steganalysis for Hiding Domains Based on Multi-class SVM
下载PDF
导出
摘要 提出一种区分隐写域(包括像素域、DCT域、DWT域)的盲检测方法,构造图像特征向量,建立一个多分类的支持向量机,根据特征向量对图像进行训练。该方法能够识别隐藏信息和其隐写域。实验结果表明,当嵌入容量达到20%时,识别率提高到85%以上。 This paper proposes a method to identify hiding domains(including the pixel,DCT,and DWT domains),constructs image features.Multi-class Support Vector Machine(SVM) is trained based on image features.The method can detect the presence of hidden message,and identify the hiding domains.Experimental results show that,the distinguish ratio rises while the embed capacity rising;the distinguish ratio can reach 85% when the embed capacity is 20%.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第12期138-140,共3页 Computer Engineering
基金 国家自然科学基金资助项目(50327040)
关键词 盲检测 隐写域 多分类 blind steganalysis hiding domain multi-class
  • 相关文献

参考文献7

  • 1夏煜,郎荣玲,戴冠中,黄殿中,钱思进.基于数字图像LSB嵌入的检测算法[J].计算机工程,2004,30(4):10-11. 被引量:7
  • 2Avcibas I, Memon N, Sankur, B. Steganalysis Using Image Quality Metrics[J]. IEEE Transactions on Image Processing, 2003, 12(2): 221-229.
  • 3Lyu S, Farid H. Detecting Hidden Messages Using Higher-order Statistics and Support Vector Machines[C]//Proc. of the 5th International Workshop on Information Hiding. [S. l.]: SpringerVerlag, 2002.
  • 4Kenneth S, Upamanyu M, Shivkumar C, et al. Steganalysis for Markov Cover Data with Applications to Images[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 275-287.
  • 5Kenneth S, Upamanyu M, Shivkumar C, et al. Detection of Hiding in the Least Significant Bit[J]. IEEE Transactions on Signal Processing, 2004, 52(10): 3046-3058.
  • 6Hsu C. BSVM 2.06[Z]. (2002-06-15). http://www.csie.ntu.edu. tw/-cjlin/bsvm/index.html.
  • 7Chang C. LIBSVM Version2.83[Z]. (2001-03-15). http://www. csie.ntu.edu.tw/-cjlin/libsvm/.

二级参考文献4

  • 1[1]Jack K. Terror Groups Hide Behind Web Encryption.http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm.
  • 2[2]Lee Yeuankuen, Chen Linghwei. An Adaptive Image Steganographic Model Based on Minimum-error LSB Replacement. In: Proceedings of the Ninth National Conference on Information Security, Taiwan,1999:8-15
  • 3[3]Westfeld A, Pfitzmann A. Attacks on Steganographic Systems. In:Processing of Information Hiding, Third International Workshop,Germany, 1999:61-76
  • 4[4]Provos N, Honeyman P. Detecting Steganographic Content on the Internet. Technical Report CITJ 01-la, University of Michigan, 2001

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部