期刊文献+

针对F5算法的盲检测隐写分析 被引量:3

New blind steganalysis for breaking F5 algorithm
下载PDF
导出
摘要 通常基于统计特征的隐写分析算法特征针对性强,而通用隐写分析算法适应性强。结合两者的优点,提出了一种针对F5数字隐写技术的盲检测算法。根据F5算法对载体图像统计特性带来的影响,提取了21个特征。在分类器设计方面,选用了对样本数量和质量依赖性小的支持向量机。最后对不同训练样本下算法的识别能力进行了实验仿真。实验结果表明,使用高嵌入率载密图像进行训练能达到很好的检测效果,在虚警率为4%的条件下,对25%载密图像的检测结果都达到了95%以上。 Generally, steganalysis based on statistical characteristic has a strong pertinency, and a blind steganalysis can adapt itself to the steganography. Hereby, a steganalysis for breaking F5 on the basis of these merits is given. The 21 features are extracte for detecting. SVM is used to classify, which weakly depends on the quantity and quanlity of training samples. The experimental results that are done on the different conditions show that the algorithm woks well. Especially for detecting images with embedding rate as low as 25%, and the detecting rate keeps more than 95% when keeping the false alarm rate less than 4%.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第5期1048-1050,1059,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60473022)。
关键词 隐写分析 F5 支持向量机 盲检测 统计特征 steganalysis F5 support vector machine blind steganalysis statistical characteristic
  • 相关文献

参考文献8

  • 1Westfeld A. F5-a steganographic algorithm high capacity despite better steganalysis[J]. Lecture notes in Computer Science,2001, 2137(2):289-302.
  • 2Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG Images: Breaking the F5 algorithm[C]. Noordwijkerhout, The Nertherlands: The 5th Information Hiding Workshop,2002:310-323.
  • 3Hong Ca,Sos Agaian,Wang Yufeng.An effective algorithm for breaking F5[C].IEEE 7th Workshop on Multimedia Signal Processing,2005:1-4.
  • 4Fridrich T Pevny. Towards multi-class blind steganalyzer for JPEG images[C]. Proc of Int Workshop on Digital Watermarking, LNCS 3710, Springer-Verlag, 2005:39-53.
  • 5Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic sehemes[C].6th International Workshop on Information Hiding.Toronto,Ontario, Canada:Springer-Verlag,2005:67-81.
  • 6Harmsen J,Pearlman W.Higher-order statistical steganalysis of palette images[C].Proc SPIE Security Watermarking Multimedia Contents,2003:131 - 142.
  • 7Vapnik V.The nature of statistical learning theory[M].New York: Spring Verlag, 1995.
  • 8Vapnik V.Statistical Leaming Theory[M].New York:Wiley, 1998.

同被引文献28

  • 1李云剑,陈亮,张雄伟.基于心理声学模型的自适应音频数字水印算法[J].中山大学学报(自然科学版),2004,43(A02):204-208. 被引量:1
  • 2李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述[J].通信学报,2005,26(2):100-111. 被引量:73
  • 3谢玲,张家树,和红杰.一种基于非均匀离散傅立叶变换的鲁棒音频水印算法(英文)[J].计算机学报,2006,29(9):1711-1721. 被引量:13
  • 4Westfeld A, F5 -A steganographic algorithm: High capaci ty despite better steganalysis[C]// Proceeding of 4th International Workshop on Information Hiding. New York: Springer-Verlag,2001 : 289-302.
  • 5Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm [C]// 5th Information Hiding Workshop. Netherlands: Springer, 2002:310-323.
  • 6Fridrieh J. Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]// Proceeding 6th Information Hiding Workshop. Berlin: Springer, 2004:67-891.
  • 7Johann A B, Georg Schaathun Hans, Wahid Abdui Wahab Ainuddin. Has F5 really been broken? [C] //The 3rd Inter- national Conference on Imaging for Crime Detection and Prevention. London:[s. n. ],2009 : 1-5.
  • 8Fridrich J, Goljan M, Hogea D, et al. Quantitative steganalysis: Estimating secret message length[J]. ACM Multimedia Systems Journal, 2003, 19(3): 288-302.
  • 9Chang Chinchen, Chen Tungshou, Chung Louzo. A steganographic method based upon JPEG and quantization table modification[J]. Information Sciences, 2002, 141:123-138.
  • 10Huang Jiwu, Shi Y Q, Shi Yi. Embedding image water-marks in DC components[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2000,10(6): 974 -979.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部