期刊文献+

基于MCM的block-DCT域盲隐写分析算法

Blind steganalysis algorithm based on MCM in block-DCT domain
下载PDF
导出
摘要 针对block-DCT域隐写,基于马尔可夫链模型(Markov Chain Model,MCM),提出了一种新的盲隐写分析算法。该算法分析研究了DCT系数的分布特点和统计特征,采用隐马尔可夫树(Hiding Markov Tree Mode,HMT)模型,实现了载体图像的预测;基于MCM构建二阶马尔可夫经验转移矩模型,捕捉块内和块间DCT系数的相关性,提取经验转移矩阵对角元素作为特征向量,构建特征向量夹角作为检测秘密信息是否存在的依据。实验结果证明:该检测方法比普通的隐写算法具有较高的可靠性和较好的综合性能。 Aiming at steganography of the block-DCT domain,a new blind steganalysis algorithm based on Markov Chain Model(MCM) is proposed.This algorithm analizes and researches the distribution characteristic and the statistical features of the DCT coefficients,the Hiding Markov Tree(HMT) model is applied to generate the estimated cover images,and a two-order Markov empirical transition matrix model is built to capture both inter-block and intra-block dependencies between the block-DCT coefficients.And then,the diagonal elements are extracted from its empirical transition matrix as eigenvectors of the images,and the angle of the eigenvectors is constructed for detection the present or not of secrete messages in the digital images without knowledge of the original cover images.At the end,it takes an example to illustrate both the reliability and general performances of the algorithm is superior to the general detection algorithm.
机构地区 军械工程学院
出处 《计算机工程与应用》 CSCD 北大核心 2008年第26期83-85,共3页 Computer Engineering and Applications
关键词 马尔可夫链模型 隐写分析 经验转移矩 隐马尔可夫 Markov Chain Model(MCM) steganalysis empirical transition matrix Hiding Markov Tree(HMT)
  • 相关文献

参考文献9

  • 1Sullivan K.Steganalysis for Markov cover data with applications to images[J].IEEE Transactions on Informations on Information Forensits and Security, 2006,1(2) : 275-286.
  • 2Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis of spread spectrum data hiding exploiting[EB/OL].http://vision.ece.ucsb.edu/ publications/OSSPIEKen.pdf.
  • 3Dumitrescu S,Wu X,Wang Z.Detection LSB steganography in via sample pair analysis[J].IEEE Trans Signal Process,2003,51(7):1995- 2007.
  • 4Coruse M S,Nowak R D,Baraniuk R G.Wavelet-based statistical signal processing using hidden Markov models[J].IEEE Trans Signal Processing, 1998,46(4) :886-902.
  • 5Dempster A P,Laird N M,Rubin D B.Maximum likelihood from incomplete data via the EM algorithm[J].J Royal Star Soe,1997,39: 1-38.
  • 6Pesquet J C,Krim H,Hamman E.Bayesian approach to best basis selection[C]//IEEE Int Conf on Acoust,Speech,Signal Proc,ICASSP'96, Atlanta, 1996: 2634-2637.
  • 7Farid H.Detecting hidden messages using higher-order statistical models [C]//Proc IEEE Int Conf Image Processing, New York, Sep 2002 : 905-908.
  • 8Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Fridrich J.LNCS 3200:6th Workshop on Information Hiding,2005:67-81.
  • 9Fu D,Shi Y Q,Zou D,et alJPEG steganalysis using empirical transition matrix in block DCT domain[C]//Proc IEEE 8th Workshop on Multimedia Signal Processing,Vicoria,BC,Canada,Oct 2006: 310-313.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部