期刊文献+

基于微观模板的多类JPEG图像盲隐密分析方法

Multi-class Blind Steganalysis for JPEG Images Based on Micro-templates
下载PDF
导出
摘要 为准确判断一幅JPEG图像使用了何种隐密软件,针对JPEG隐密软件可能采用的DCT域隐密操作,建立了基于微观模板的统计特征空间,并在此基础上提出了一种多类JPEG图像盲隐密分析方法。实验结果表明:对JSteg、F5和Outguess 3种典型JPEG图像隐密软件各自生成的、含密量大于20%的JPEG隐密图像,该方法的隐密软件识别正确率均在97%以上。基于微观模板的统计特征提取方案可有效区分不同的DCT域隐密操作,有助于对JPEG隐密软件的检测判决。 To judge which steganographic algorithm is used for a JPEG image, some possible steganographic operations in DCT domain is investigated and a new steganographic feature space is constructed based on the methodology of micro-templates. Supported by this feature space, a new multiclass blind steganalyzer for JPEG images is presented. Experimental results indicate that, for stegoimages with secret message length greater than 20% , which are produced by typical steganographic software, such as JSteg, F5 and Outguess respectively, the steganalyzer can reliably classify all the stego-images to their embedding techniques with high accuracy above 97%. The methodology of micro-templates can effectively distinguish different steganographic operations in DCT domain, which favors the detection of JPEG steganographic algorithms.
出处 《南京理工大学学报》 CAS CSCD 北大核心 2008年第3期295-299,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60572111)
关键词 微观模板 JPEG 多类 图像 盲隐密分析 micro-templates JPEG multi-class images blind steganalysis
  • 相关文献

参考文献18

  • 1尤新刚 周琳娜 郭云彪.信息隐藏学科的主要分支及术语[A]..全国第三届信息隐藏学术研讨会(CIHW''2001)[C].西安:西安电子科技大学出版社,2001..
  • 2Provos N, Honeyman P. Detecting steganographic con tent on the internet [ EB/OL ]. http://www.citi. umich. edu/techreports/reports/citi-tr-01-11. pdf, 2001 -08 -31.
  • 3Simmons G J, The prisoners' problem and the subliminal channel [ A ]. Advances in Cryptography : Proceedings of Crypto' 83 [ C]. New York, USA: Plenum Press, 1984. 51-67.
  • 4Avcibas I, Memon N, Sankar B. Steganalysis using image quality metrics [ J ]. IEEE Transactions on Image Processing, 2003, 12 (2) : 221 -229.
  • 5Lyu S, Farid H. Detecting hidden messages using higherorder statistics and support vector machines [ A ]. 5th International Workshop on Information Hiding [ C ]. Heidelberg, Germany : Springer-Verlag, 2002. 340 - 354.
  • 6Fridrich J. Feature-based steganalysis for JPEG images and its implication for future design of steganographic schemes [ A]. In 2004, LNCS 3200 [ C]. Heidelberg, Germany : Springer-Verlag, 2004. 67 - 81.
  • 7Fridrich J, Goljan M, Du R. Reliable detection of LSB steganography in color and grayscale images [A]. Proc of the ACM Workshop on Multimedia and Security [C]. New York, NY, USA: ACM, 2001. 27 -30
  • 8Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images : Breaking the F5 algorithm [ A ]. Proceeding of 5th Information Hiding Workshop [ C]. Heidelberg, Germany : Springer-Verlag, 2002. 310 - 323.
  • 9Fridrich J, Goljan M, Hogea D. Attacking the Out- Guess [ A ]. Proceedings of the ACM Workshop on Multimedia and Security 2002 [ C], New York, USA: ACM, 2002. 3 -6.
  • 10Bohme R. Breaking Cauchy model-based JPEG steganography with first order statistics [ A ]. Proc of 9th ESORICS LNCS Computer Security-ESORICS 2004 [ C ]. Heidelberg, Germany : Springer-Verlag, 2004. 125 - 140.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部