期刊文献+

基于HMT和ICA的主动隐写分析 被引量:2

Active Steganalysis for Stego-image Based on HMT and ICA
原文传递
导出
摘要 提出一种基于HMT预测的ICA盲源分离主动分析方法,该方法仅仅需要得到一幅隐秘图像,并采用小波域HMT(hidden markov tree)模型预测出载体图像的一个估计,最后使用ICA盲分离来提取秘密信息和载体图像。仿真实验给出了该方法提取出的载体图像和秘密信息,并对其进行了分析。 Two copies of stego image are needed in the active steganalysis proposed by Chandramouli, as an improvement, a method of active steganalysis is proposed in which only one copy of stego image is needed and the practicability is enhanced. An estimate of a cover image by wavelet-domain hidden Markov tree(HMT) is obtained; and the estimate is regarded as amother stego-image which is different in the embed ratio. Then cover image and the secret message are separated by using the independent component analysis(ICA). Simulation experiments validate the advantage of HMT model, and give the results of blind separation.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1059-1061,1066,共4页 Geomatics and Information Science of Wuhan University
关键词 主动隐写分析 HMT模型 ICA 仿真 active steganalysis HMT model independent component analysis simulation
  • 相关文献

参考文献5

  • 1Sun J, Xu W B. A Global Search Strategy of Quanturn Behaved Particle Swarm Optimization [C]. IEEE Conference on Cybernetics and Intelligent Systems, New York, 2004
  • 2Chandramoouli R. A Mathematical Framework for Active Steganalysis[J]. Special Issue on Multimedia Security, ACM Multimedia System Journal manuscript, 2003, 9(3): 301- 311
  • 3Romberg J K, Choi H, Baraniuk R G. Bayesian Tree-Structured Image Modeling Using Wavelet-Do main Hidden Markov Models[J]. IEEE Transac tions on Image Processing, 2001, 10(7): 1 056 -1 068
  • 4王毅,齐华,郝重阳.一种基于独立分量分析的模糊图像盲分离算法[J].计算机应用,2006,26(10):2366-2368. 被引量:8
  • 5张金霞.基于ICA Fixed-Point算法的信号图像分析[J].青海大学学报(自然科学版),2005,23(5):75-77. 被引量:1

二级参考文献16

  • 1Comon P.Independent component analysis-a new concept[J].Signal Processling,1994,36:287-314.
  • 2Bell A J,Jsejnowski T.An information-maximigation approach to blind separation and blind deconvolution[J].Neural computation,1995,7(6):318-332.
  • 3Hyvarinen A,Oja E.A fast Fixed-Point Algorithm for Independent Component Analysis[J].Signal Processing,1997,(39):3917-3920.
  • 4Hyvarinen A.A Statistical Analysis[J].Neural Networks for Signal Processing,1997,(40):388-397.
  • 5JUTTEN C,HERAULT J.Blind separation of sources,Part Ⅰ:An adaptive algorithm based on neuromimatic architecture[J].Signal Processing,1991,24(1):1-10.
  • 6COMON P.Independent component analysis,a new concept[J].Signal Processing,1994,36:287-314.
  • 7GERACE I,CRICCO F,TONAZZINI A.An extended maximum likelihood approach for the robust blind separation of autocorrelated images from noisy mixtures[A].In:Proc.ICA2004[C].Granada,Spain,2004.954-961.
  • 8CASTELLA M,PESQUET JC.An Iterative Blind Source Separation Method for Convolutive Mixtures of Images[A].In:Proc.ICA2004[C].Granada,Spain,2004.922-929.
  • 9HYVARINEN A.Fast and robust fixed-point algorithms for independent component analysis[J].IEEE Transactions on Neural Networks,1999,10(3):626-634.
  • 10AMARI S,CHEN TP,CICHOCKI A.Non-holonomic constraints in learning algorithms for blind source separation[J].Neural Computation,2000,12:1463-1484.

共引文献7

同被引文献11

  • 1张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 2Shi Y Q,Xuan G R,Zou D,et al.Image steganalysis based on moments of characteristic functions using wavelet decom- position, prediction-error image, and neural network[C]// Proceedings of 2005 IEEE International Conference on Mul- timedia and Expo, Amsterdam, 2005 : 269-272.
  • 3Lyu S,Farid H.Steganalysis tics[J].IEEE Transactions on curity, 2006,1 ( 1 ) : 111-119.
  • 4using higher-order image statis- Information Forensics and Se- Fridrich J, Pen~' T.Multi-class blind steganalysis for JPEG images[C]//Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
  • 5Shi Y Q, Chen C, Chert W.A Markov process based approach to effective attaching JPEG steganography[C]//Proceedings of the 8th Information Hiding Workshop,2006.
  • 6Fu D, Shi Y Q, Zou D.JPEG steganalysis using empirical transition matrix in block DCT domain[J].IEEE,2006.
  • 7Pevny T, Fridrich J.Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Proc SPIE,2007.
  • 8楼偶俊,王钲旋.基于特征点模板的Contourlet域抗几何攻击水印算法研究[J].计算机学报,2009,32(2):308-317. 被引量:26
  • 9冯帆,王嘉祯,马懿,张拥军.基于HMT模型的block-DCT域隐写图像移除攻击[J].计算机应用与软件,2009,26(11):274-277. 被引量:2
  • 10石慧,林闯,李明楚,孙晰锐.基于Contourlet变换的抗几何攻击数字水印算法[J].光电子.激光,2011,22(10):1575-1581. 被引量:7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部