期刊文献+

利用DCT域特征的JPEG图像数字水印及数字图像隐藏盲检测 被引量:3

BLIND STEGANALYSIS AND WATERMARK ANALYSIS FOR JPEG IMAGES USING DCT FREQUENCY FEATURES
下载PDF
导出
摘要 对基于DCT系数的隐藏进行了分析,提出了一种频域特征的新算法。该算法无需任何的训练过程,对JPEG图像的各种数字图像隐藏和水印具有广泛的效果。将该算法成功地应用于通过数码相机、Internet和从无损格式图像压缩获得的图像样本。测试结果显示该算法对于基于DCT变换的数字隐藏检测具有良好的效果。 In this paper,we proposed a new steganalysis algorithm of frequency domain, features after studying the steganography based on DCT coefficients. This method does not require any training and can be widely used on steganography and Watermark of JPEG images from various sources. We have applied our algorithm on sample images captured from digital camera, the Intemet, and compressed images from lossless format. Experimental results show it works well on detection of DCT based steganography.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第12期271-274,277,共5页 Computer Applications and Software
关键词 盲检测 隐藏信息 数字水印 DCT Blind steganalysis Stegnography Digital watermark DCT
  • 相关文献

参考文献23

  • 1Kahn D. The history of steganography, in Proc. Information Hiding,First lntemational Workshop, Cambridge,U. K. ,1996.
  • 2Anderson R, Petitcolas F. On the limits of s!eganography. IEEE J. Sel. Areas Commun, 1998,16 (4). :474 - 481.
  • 3Johnson N, Jajodia S. Exploring steganography: Seeing the unseen. IEEE Computer, 1998,31 (2) :26 - 34.
  • 4Petitcolas E, Andersoa R, Kuhn M. Information hiding-a survey. Proc. IEEE, 1999,87 (7) : 1062 - 1078.
  • 5Fridricb J, Goljan M. Practical steganalysis: state of the art. in Proc. SPIE, Photonies West, Electronic Imaging,2002,
  • 6Farid H. Detecting hidden messages using higher-order statistical models. in Proc. IEEE International Conference on Image Processing ( ICIP' 02 ), Rochester, N Y, USA, September 2002,2:905 - 908.
  • 7Westfeld A, Pfitzmann A. Attacks on steganographic systems, in Proc. Information Hiding, Third Int. Workshop, Dresden, Germany, 1999.
  • 8Fridrich J,Goljan M, Hogea D. Steganalysis of JPEG images:breaking the F5 algorithm, in Proc. 5th International Workshop on Information Hiding, Noordwijkerhout,the Netherlands,October 2002:310 - 323.
  • 9Fridrich J, Goljan M, Hogea D. Attacking the OutGuess. Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, Decomber 6.
  • 10Kharrazi M,Senear H T, Memon N. Benehmarking Steganographic and SteganalyticTechniques. to appear in E. Delp et al. ( eds. ) : Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII,2005.

同被引文献28

  • 1景丽,肖慧敏.基于SIFT特征的小波域数字图像鲁棒水印方法[J].计算机应用研究,2009,26(2):766-768. 被引量:5
  • 2暴琳,张尤赛.基于DCT域的自适应图像数字水印盲检测算法[J].信息安全与通信保密,2005,27(3):139-141. 被引量:1
  • 3陈森,张兴周.基于小波和伪随机变换的盲检测图像水印算法[J].应用科技,2007,34(1):24-27. 被引量:5
  • 4付浩.混沌加密方法分析与研究[J].信息技术,2007,31(1):60-63. 被引量:2
  • 5ASLANTAS V. An optimal robust digital image watermarking based on SVD using differential evolution algorithm [ J]. Optics Communi- cations, 2009, 282(5): 769-777.
  • 6JOSEPH J K, RUANAIDH J J, THIERRY P. Rotation, scale, and translation invariant spread spectrum digital image watermarking [J]. Signal Processing, 1998, 66(3) : 303-317.
  • 7LEE H Y, KIM H S, LEE H K. Robust image watermarking using local invariant features [ J]. Optical Engineering, 2006, 45 (5): 1 - 10.
  • 8LOWED G. Distinctive image features from scale-invariant key- points [ J]. International Journal of Computer Vision, 2004, 60 (2): 91-110.
  • 9HARRIS C, STEPHENS M. A combined comer and edge detector [ EB/OL]. [ 2010 - 01 - 01 ]. http://www. bmva. org/bmvc/ 1988/avc.-88-023. pdf.
  • 10Do M N, Vetterl I M.Contourlets: a directional multire-solutionimage representation[C]//Proceedings of International Confer-iLence on Image Processing,2002 : 357-360.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部