期刊文献+

一种新的小波域高阶统计量图像隐写分析方法

A new image steganalysis method for higher-order statistical data in wavelet domain
下载PDF
导出
摘要 在对现有盲检测算法分析研究改进的基础上,提出一种新的JPEG图像信息隐藏盲检测方法.该方法把JPEG图像的DCT系数分解到小波域,计算出各个子带小波系数的一系列高阶统计特征,组成72维特征向量,引入特征缩放技术将特征向量进行缩放,并用支持向量机进行分类.针对CorelDraw图像库4种常用的隐写方法进行实验,结果表明该方法在4种不同隐写方式下的平均检测正确率均达到91%(嵌入率为100%)以上. On the basis of analysis, investigation, and modification of existing blind detection algorithm, a new method for blind detection of secret information in JPEG image was proposed. This method was used to decompose the DCT coefficients of JPEG images in wavelet domain and then calculate a series of higherorder statistical features of the sub-band wavelet coefficients, making up 72-dimensional featui'e vector. By introducing feature zooming technique, this 72-dimensional feature vector was scaled up and down, and classified with support vector machine. Experimental results of the images taken from CorelDraw image database showed that the mean correct detection rate was greater than 91% in four kinds of different steganography mode (embedding rate being 100%).
出处 《兰州理工大学学报》 CAS 北大核心 2009年第5期85-88,共4页 Journal of Lanzhou University of Technology
基金 甘肃省自然科学基金(0803RJZ024)
关键词 隐写分析 小波变换 高阶统计量 特征缩放 支持向量机 steganalysis wavelet transform higher-order statistics feature scaling support vector machine
  • 相关文献

参考文献12

  • 1AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics [C]//DELP E,WONG P W. Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III. California: [s. n.].2001 : 523-531.
  • 2AVCIBAS I, KHARRAZI M, MEMON N, et al. Image steganalysis with binary similarity measures [J]. EURASIP Journal on Applied Signal Processing, 2005,17: 2749-2757.
  • 3XUAN Guorong,SHI Yun Q,GAO Jianjiong,et al. Steganalysis Based on multiple features formed by statistical moments of wavelet characteristic functions [C]//Information Hiding Workshop (IHW05). Berlin: Springer-Verlng, 2005,314: 227- 234.
  • 4LYU S, FARID H. Detecting hidden messages using higher-order statistics and support vector machines [C]//PETITCOLAS F A P. 5th International Workshop on Information Hiding Berlin: Springer, 2002 : 749-757.
  • 5LYU S, FARID H. Steganalysis using color wavelet statistics and oneclass support vector machines [C]//Proceedings of SPIE: Electronic Imaging, Security, Steganngraphy, and Watermarking of Multimedia Contents ~. Bellingham WA: [s. n. ], 2004: 35-45.
  • 6FRIDRICH J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [C]// 6th Information Hiding Workshop. Toronto: [s. n. ], 2004 : 135-145.
  • 7BURR.US C S,GOPINATH R A, GUO Haitao.小波与小波变换导论[M].程正兴译.北京:机械工业出版社,2005:78-198.
  • 8HSU C W, CHANG C C. A Practical Guide to Support Vector Classification [EB/OL]. [2009-4-20]. Http://www. esie. ntu. edu. tw/-ejlin/papers/guide, pdf. 2005.
  • 9WANG Y P. Optimized Feature Extraction for Learning based Image Steganalysis [J]. IEEE Transaction on Information Fo- rensics and Security, 2007,2(1) : 31-45.
  • 10孙丰,陈向东,孙伟.基于位平面随机性测试的隐写分析算法[J].解放军理工大学学报(自然科学版),2006,7(6):548-552. 被引量:2

二级参考文献22

  • 1何军辉,梁小萍,李健乾,黄继武.基于位平面统计相关的支持向量机图像隐写分析算法[J].中山大学学报(自然科学版),2004,43(A02):17-20. 被引量:2
  • 2PETITCOLAS F A P, ANDERSON R J, KUHN M G. Information hiding-A survey[J]. Proceedings of the IEEE, 1999,87(7): 1062-1078.
  • 3BASHIR K. Steganography premium [ EB/OL].http ://www. programurl.com/software/steganography. htm, 2004.
  • 4KELLEY J. Terror groups hide behind Web encryption[EB/OL]. http://www. usatoday. com, 2001-02-05.
  • 5STARR B, UTLEY G. Hunt for bin Laden goes online[EB/OL], http ://www. cnn. com, 2002-07-02.
  • 6FRIDRICH J, GOLJAN M,DU R. Reliable detection of LSB steganography in grayscale and color images[C]. Ottawa : Proc of the ACM Workshop on Multimedia and Security, 2001.
  • 7DUMITRESCU S, WU X L. Steganalysis of LSB embedding in multimedia signals[C]. Switzerland:Multimedia and Expo ICME'02, 2002.
  • 8DUMITRESCU S, WU X L, WANG Z. Detection of LSB steganography via sample pair analysls[J]. IEEE Transactions Signal Processing, 2003, 51 ( 7 ) : 1995-2007.
  • 9FRIDRICH J, GOLJAN M,HOGEA D. Steganalysis of JPEG images, breaking the F5 algorithm [C].Netherlands: In 5th Information Hiding Workshop,2002.
  • 10FARID H,LYU S. Detecting hidden messages using higher-order statistics and support vector machines[C]. Netherlands: 5th Information Hiding Workshop,2002.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部