期刊文献+

针对BPCS隐写的隐写分析法 被引量:3

Reliable Detection of BPCS Steganography
下载PDF
导出
摘要 为实现对位平面复杂度分割(BPCS)隐写的有效检测,分析了图像复杂度直方图在像素块替换前后的变化,针对载密图像的位平面复杂度直方图出现明显的不连续点,定义了新的直方图不连续性测度,并提出了改进的检测算法.与已有算法相比,改进算法的虚警率和漏检率降低20%以上,并且易于实现,有利于实现实时检测. Bit-plane complexity segmentation (BPCS) steganography replaces bit-plane pixel blocks of high complexity with secret data. The continuity of the complexity histogram of the pixel block is affected by the embedded data. Based on the analysis of the security flaw in the BPCS steganography, a detection algorithm against BPCS embedding is proposed. The algorithm can reliably detect the existence of hidden data. It is easy to implement and computationally efficient, and suitable for real-time detection.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2009年第4期113-116,121,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家重点基础研究发展计划项目(2007CB311203) 高等学校博士学科点专项科研基金项目(20070013007) 国家自然科学基金项目(60803157 60821001)
关键词 隐写分析 位平面复杂度分割隐写算法 复杂度直方图 位平面像素块 steganalysis bit-plane complexity segmentation complexity histogram bit-plane pixel blocks
  • 相关文献

参考文献5

  • 1Kawaguchi E, Eason R O. Principle and application of BPCA:steganography[C]//Proceeding of SPIE: Multi- media Systems and Application. San Diego: [ s. n. ], 1998 : 464-472.
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceeding of IEEE, 1999, 87(7) : 1062-1078.
  • 3Wang Huaiqing, Wang Shuzhong. Cyber warfaresteganography vs steganalysis[J]. Communications of the ACM, 2004, 47(10): 76-82.
  • 4傅瑜,李文生.基于视觉模型的双正交小波图像水印算法[J].电子科技大学学报,2003,32(6):673-678. 被引量:4
  • 5张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20

二级参考文献21

  • 1[1]Wang H, Kuo C C J. Image protection via watermarking on perceptually significant wavelet coefficients[C].Proceedings of the IEEE Multimedia Signal Processing Workshop, Redondo Beach, California, 1998. 278-284
  • 2[2]Hundur D, Hatzinakos D. A robust digital image watermarking method using wavelet-based fusion[C]. Proceedings of the International Conference on Image Processing, Santa Barbara, California, 1997. 544-547
  • 3[3]Wilson T A, Rogers S K, Myers L R. Perceptual-based hyperspectral image fusion using multiresolution analysis[J].Optical Engineering, 1995, 34(15): 3 154-3 164
  • 4[4]Xia X, Boncelet C G, Arce G R. Wavelet transform based watermark for digital images[J]. Optics Express, 1998,3(12): 497-511
  • 5[5]Nill N B. A visual model weighted cosine transform for image compression and quality assessment[J]. IEEE Tanscation on Communication, 1985, 33(6):551-557
  • 6[6]Tan S H, Ngan K N. Classified perceptual coding with adaptive puantization[J]. IEEE Transaction on Circuits and systems for Video Technology, 1996, 37(6): 375-383
  • 7[7]Villasenor J D, Belzer B, Liao J. Wavelet filter evaluation for image compression[J]. IEEE Transactions on Image Processing, 1995, 4(8): 1 053-1 060
  • 8Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 9Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 10Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13

共引文献22

同被引文献24

  • 1张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3吴健珍,谢剑英,杨煜普.An adaptive blind watermarking scheme utilizing neural network for synchronization[J].Journal of Harbin Institute of Technology(New Series),2007,14(2):281-286. 被引量:1
  • 4KAWAGUCHI E J,EASON R O.Principle and applications of BPCS-steganography[C]//Proceedings of SPIE:Multimedia Systems and Applications,1998,3528:464-472.
  • 5Wu Dachun,TSAI W.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letter,2003,24(2003):1613-1626.
  • 6MACHADO R,NODA H,SPAULDING J,SHIRAZI M N,KAWAGUCHI E J.Application of bit-plane decomposition steganography to JPEG2000 encoded images[J].IEEE Signal Processing Letters,2002,9:410-413.
  • 7SPAULDING J,NODA H,SHIRAZI M N,KAWAGUCHI E J.BPCS steganography using EZW lossy compressed images[J].Pattern Recognition Letters,2002,23:1579-1587.
  • 8HIROHISA H.A data embedding method using bpcs principle with new complexity measures[C]//Pacific Rim Workshop on Digital Steganography,2002.
  • 9WANG C,Wu N,TSAI C,HWANG M.A high quality steganographic method with pixel-value differencing and modulus function[J].The Journal of Systems and Software,2008,81:150-158.
  • 10LIN C,HSUEH N.A lossless data hiding scheme based on three-pixel block differences[J].Pattern Recognition,2008,41:1415-1425.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部