期刊文献+

基于距离和的隐写分析 被引量:1

Steganalysis Based on Sum of Distances
下载PDF
导出
摘要 为了攻击GIF格式图像中的隐秘术,提出了一种基于图像子块"距离和"的隐写分析算法。该算法中首先将距离用一个索引值同子块中其他索引值的差的绝对值表示,由于索引值的差值可正可负,因而将一个"距离和"区分为"正距离和"和"负距离和"2个矢量,考虑到"正距离和"和"负距离和"两者代数和的符号,它们被归类为"主距离和"和"次距离和";接着采用直方图计算这些量的统计状态,并通过统计邻接"图像子块"的"距离和"共生矩阵来得到32个统计量;然后通过计算这些统计量的"直方图特征函数的块中心"来得到56维特征向量;最后运用支持向量机构造隐写分析算法。实验结果表明,该算法对GIF图像上多种隐秘术的检测性能均胜过传统算法。此外,"图像子块中不同索引值个数"还可用来改进抽取特征向量的方法。 To attack steganographic schemes in graphics interchange format (GIF) images, a steganalytic algorithm was proposed based on sum of distances (SOD) of sub-block. The distance was computed as an absolute value of the difference between one index and other one in a sub-block of an image. The difference between two indices may be positive or negative so that an SOD was further classified into two kinds. Considering the sign of algebraic sum of positive and negative SODs in a sub-block, the two SODs were differentiated as primary and secondary SODs respectively. 32 statistics were computed using these quantities in an image and a 56-dimensional feature vector was obtained. A steganalytic algorithm was designed based on the feature vector and Support vector machine. Experimental results show that the presented algorithm outperforms traditional methods. The number of different indices in a sub-block was utilized to improve the extracting feature vectors techrique.
出处 《中国图象图形学报》 CSCD 北大核心 2009年第2期267-274,共8页 Journal of Image and Graphics
基金 浙江省自然科学基金项目(Y105355) 浙江省科技计划重大专项(2006C11105)
关键词 隐写分析 距离和 特征向量 GIF steganalysis, sum of distances, feature vector, GIF(graphics interchange format)
  • 相关文献

参考文献15

  • 1Westfeld A, Pfitzmann A. Attacks on steganographic systems: breaking the steganographic utilities EzStego, Jsteg, Stegnos and S-Tools and some lessons learned [ A ]. In: Proceedings of Information Hiding- Third International Workshop [ C ] , Dresden, Germany, 1999: 61-75.
  • 2Machado R. EzStego[ CP/OL]. 1996, http://www. stego. com, 2006- 06-10.
  • 3Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [ J]. Magazine of IEEE Multimedia Special Issue on Security, 2001, 8(4) : 22-28.
  • 4Fridrich J, Goljan M, Soukal D. Higher-order statistical steganalysis of palette images [ A ]. In: Proceedings of SPIE Electronic Imaging [C], Santa Clara, CA, USA, 2003: 178-190.
  • 5Dumitrescu S, Wu Xiao-lin, Wang Zhe. Detection of LSB steganography via sample pair analysis [J]. IEEE Transactions on Signal Processing, 2003, 51 ( 7 ) : 1995-2007.
  • 6Lyu S, Farid H. Detecting hidden messages using higher-order statistics and support vector machines[ A ]. In: Proceedings of 5th International Workshop Information Hiding [ C], Noordwijkerhout, Netherlands: Springer-Verlag, 2003: 340-354.
  • 7Kwan M. GIFShuffle [ CP/OL]. 1998, http://www.darkside. com. au/ GIFShuffle/, 2006-06-10.
  • 8Brown A. S-Tools [ CP/OL]. 1998, http://idea. sec. dsi. uimi. it/ pub/ security/crypt/code/s-tools3. zip, 2006-06-10
  • 9Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Proceedings of Information Hiding-Third International Workshop[ C ] , Dresden, Germany, 1999 : 47-60.
  • 10张新鹏,王朔中.对OPA密写的检测和增强安全性的调色板图像密写方案[J].电子学报,2004,32(10):1702-1705. 被引量:4

二级参考文献14

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding-A Survey[J].Proceedings of IEEE,1999,87(7):1062-1078.
  • 3W Bender,D Gruhl,N Morimoto,A Lu Techniques for Data Hiding[J].IBMSystem Journal,1996,35(3,4):313-336.
  • 4D C Wu,W H Tsai.A Steganographic Method for Images by Pixel-Value Differencing[J].Pattern Recognition Letters,2003,24(9,10):1613-1626.
  • 5A Westfeld.F5-A Steganographic Algorithm[A].In 4th International Workshop on Information Hiding,Lecture Notes in Computer Science 2137[C].Heidelberg,Berlin,Springer-Verlag,2001,289-302.
  • 6J Fridrich,M Goljan.Practical Steganalysis of Digital Images-State of the Art[A].In:Security and Watermarking of Multimedia Contents IV,Proceedings of SPIE 4675[C].San Jose,USA:SPIE,2002,1-13.
  • 7H Wang,S Wang.Cyber Warfare-Steganography vs.Steganalysis[J].Communication of the ACM(to appear)
  • 8X Zhang,S Wang.Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security[J].Pattern Recognition Letters,2004,25(3):331-339.
  • 9X Zhang,S Wang,K Zhang.Steganography with Least Histogram Abnormality[A].In Computer Network Security,Lecture Notes in Computer Science 2776[C].Heidelberg,Berlin:Springer-Verlag,2003,395-406.
  • 10http://www.darkside.com.au/gifshuffle/

共引文献3

同被引文献12

  • 1Ker A.Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters,2005,12(6):441-444.
  • 2Kwan M.Gifshuffle2.0[CP/OL].(1998)[2010-12-15].http:∥www.darkside.com.au/gifshuffle/.
  • 3Machado R.EzStego[CP/OL] (1996)[2010-12-15].http:∥www.stego.com/.
  • 4Fridrich J,Golian M.A new steganographic methods for palette-based images[C] ∥Proc IS&TPICS Conference.1999:285-289.
  • 5Fridrich J,Du R.Secure steganographic methods for palette images[C] ∥Proc 3rd Information Hiding Workshop(IH'99).LNCS,2000,1768:47-60.
  • 6Wu M,Ho Y,Li J.An iterative method of palette-based image steganography[J].Pattern Recognition Letters,2004,25(33):301-309.
  • 7Zhang X,Wang S.Analysis of parity assignment steganography in palette images[C] ∥Proc Knowledge-Based Intelligent Information andEngineering Systems.LNCS,2005,3683:1025-1031.
  • 8Kong X,Wang Z,You X.Steganalysis of palette images:attack optimal parity assignment algorithm[C] ∥Proc 5th InernationalConference on Information Communications and Signal Processing.2005:860-864.
  • 9Lyu S,Farid H.Detecting hidden messages using higher-order statistics and support vector machines[C] ∥Proc 5th Information HidingWorkshop(IH'03).LNCS,2003,2578:340-354.
  • 10Xuan G,Shi Y,Gao J.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[C] ∥ProcInformation Hiding Workshop(IH'05).LNCS,2005,3727:262-277.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部