期刊文献+

基于FCM算法的隐写分析算法综合评估 被引量:6

Comprehensive Evaluation of Steganalysis Algorithm Based on FCM Algorithm
下载PDF
导出
摘要 从与图像隐写分析算法评估相关的问题入手,分析隐写分析算法评估的指标,利用FCM算法实现对各种隐写分析算法的性能评估和比较。该评估算法不仅能对现有隐写分析算法进行评价,以选出最优算法,也适合对新的隐写分析算法进行性能评价。实验结果表明,该评估算法是有效的。 Started with the issues related to evaluation of image steganalysis algorithm, the index for evaluation of steganalysis algorithm is analyzed. The evaluation and comparison to performance of steganalysis algorithm are implemented by using FCM algorithm. This evaluation algorithm can not only conduct evaluation to existed steganalysis algorithm, which chooses out the best one, but also conduct evaluation to new steganalysis algorithms. Experimental results show this evaluation algorithm is effective.
作者 龚劬 郭吉强
出处 《计算机工程》 CAS CSCD 北大核心 2009年第4期175-176,179,共3页 Computer Engineering
关键词 隐写分析 FCM算法 性能指标 综合评估 steganalysis Fuzzy C-Means(FCM) algorithm performance index comprehensive evaluation
  • 相关文献

参考文献8

二级参考文献34

  • 1Lee Yeuan-Kuen, Chen Ling-Hwei. An adaptive image steganographic model based on minimum-error LSB replacement[A]. In.. Proceedings of the Ninth National Conference on Information Security [C], Taiwan, China, 1999 : 8-15.
  • 2Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In.. Proceedings of Third international Workshop, IH'99[C], Dresden, Germany, Springer Verlag, 1999:61-75.
  • 3Fridrich J, Du R, Meng L. Steganalysis of LSB encoding in color images [A]. In: 2000 IEEE international conference on multimedia and Expo[C], New York City, 2000,3 : 1279-1282.
  • 4Fridrich Jessica, Goljan Miroslav, Du Rui. Detecting LSB steganography in color and gray-scale images [J ]. IEEE Tranactions on Multimedia, 2001,8(4):22-28.
  • 5Hary Farid. Detecting hidden messages using higher-order statistical models [A]. In: Proceedings IEEE international conference on image processing[C], Rochester, NY, 2002:23-27.
  • 6Provos N, Honeyman P. Detecting steganographic content on the internet[R], Technical Report CITI 01-1a, University of Michigan, U.S. ,2001.
  • 7[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 8[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 9[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23
  • 10[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230

共引文献106

同被引文献42

引证文献6

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部