期刊文献+

基于改进的Farid高阶统计量模型隐写检测

Steganalysis Based on R-Farid High Order Statistic Model
原文传递
导出
摘要 在分析经典Farid高阶统计量模型基础上,采用离散Haar小波对其线性预测模型相关性区域进行定位描述,并改进其偏向不一致缺陷,通过数学推导提出R-Farid线性预测模型;并提出了R-Farid高阶统计量模型。实验结果显示,其具有更好的隐写检测效果。 Through theoretical analyzing the classical Farid high order statistic linear prediction model based on discrete Haar wavelet, a R-Farid linear prediction model is proposed by revising its inconsistent relativity area, and then it is defined as Farid high order statistic model, a R-Farid high order statistic model is designed. Experimental results show that it really improves the steganalysis accuracy rate.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1007-1010,共4页 Geomatics and Information Science of Wuhan University
关键词 隐写检测 离散Haar小波分解 Farid高阶统计量模型 steganalysis discrete Haar wavelet Farid high order statistic model
  • 相关文献

参考文献7

  • 1Farid H. Detecting Hidden Messages Using Higher-order Statistical Models[C].International Conference on Image Processing, New York, 2002
  • 2陈丹,张键红,王育民.基于主成分分析的泛盲掩密分析方案[J].中国图象图形学报,2006,11(3):394-400. 被引量:1
  • 3Lyu Siwei, Farid H. Steganalysis Using Higher- Order Image Statistics[J].IEEE Transactions on Information Forensics and Security, 2006, 1 (1) : 111- 117
  • 4University of Washington. Groundtruth image databaser [EB/OL]. http://www. cs. washington. edu/ research/imagedatabase/groundtruth/ , 2005
  • 5Cox I J. A Secure Robust Watermark for Multimedia[J]. Workshop on Information Hiding, Cambridge, 1996:185-206
  • 6谢永华,李振宏,傅德胜.基于分割采样的小波域图像信息隐藏算法及性能分析[J].计算机应用与软件,2007,24(2):40-42. 被引量:2
  • 7Duda R O, Hart P E, Stork D G. Pattern Classifi- cation[M]. John Wiley & Sons, 2001

二级参考文献21

  • 1边肇棋 等.模式识别(第二版)[M].北京:清华大学出版社,2000..
  • 2Provos N,Honeyman P.Hide and seek:An introduction to steganography[J].IEEE Security & Privacy,2003,1 (3):32 ~ 44.
  • 3Fridrich J,Goljan M.Practical steganalysis-state of the art[A].In:Proceedings of SPIE Photonics West,Electronic Imaging 2002 on Security and Watermarking of Multimedia Contents[C],San Jose,California,USA.2002:1 ~13.
  • 4Westfeld A,Pfitzmann A.Attacks on steganographic systems[A].In:Pfitzmann A.(Eds.).Proceedings of 3rd Int'l Workshop Information Hiding[C].Dresden,Germany,Springer-Verlag,1999:61 ~ 76.
  • 5Fridrich J,Goljan M,Du Rui.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,Special Issue on Security,2001,8(4):22 ~28.
  • 6ZHANG Tao,PING Xi-jian.Reliable detection of LSB steganography based on the difference image histogram[A].In:Proceedings of International Conference Asian Symposium Signal Processing[C],Hong Kong,China,2003:545 ~ 548.
  • 7Farid H.Detecting hidden messages using higher-order statistical models[A].In:Billene Mercer(Ed.).Proceedings of International Conference Image Processing[C],Rochester,NY,USA:IEEE Press,2002:905 ~ 908.
  • 8Lyu S,Farid H.Detecting hidden messages using higher-order statistics and support vector machines[A].In:Petitcolas et al.(Eds.).Proceedings of 5th International Workshop on Information Hiding[C],Noordwijkerhout,the Netherlands:Springer-Verlag,2002:340 ~ 354.
  • 9Derek Upham.JPEG-JSteg-V4[EB/OL].http://www.funet.fi/ pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.
  • 10Romana Machado.EZStego[EB/OL].Http://www.stego.com.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部