期刊文献+

对随机LSB隐写术的选择密钥提取攻击 被引量:9

Chosen-key extracting attack to random LSB steganography
下载PDF
导出
摘要 提出一种针对随机LSB隐写术的选择密钥提取攻击方法。对一类伪随机置换隐写术建立有向圈模型,证明了有向圈模型中存在大量等价密钥和相邻密钥,并给出计算等价密钥量的方法。利用等价密钥和相邻密钥的性质,结合突变点检测法,提出一种基于选择密钥的提取攻击算法,其计算复杂度低于Fridrich方法。理论分析和实验结果均表明,即使对消息嵌入率估计存在较大误差,该算法仍具有较强稳健性。 A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.
出处 《通信学报》 EI CSCD 北大核心 2010年第5期73-80,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60803155) 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z471 2007AA01Z477)~~
关键词 信息隐藏 隐写分析 伪随机置换 隐写密钥 提取攻击 JSteg steganography steganalysis pseudo-random permutation stego-key extracting attack JSteg
  • 相关文献

参考文献13

  • 1WU Mingqiao,ZHU Zhongliang,JIN Shiyao.Detection of Jsteg Hiding Using Image Statistical Model[J].Chinese Journal of Electronics,2006,15(1):165-168. 被引量:3
  • 2张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75
  • 3KER A.Resampling and the detection of LSB matching in colour bitmaps[A].Proceedings of the SPIE,Security,Steganography,and Watermarking of Multimedia Contents Ⅶ[C].2005.1-15.
  • 4WANG Y,MOULIN P.Optimized feature extraction for learn-ing-based image steganalysis[J].IEEE Transactions on Information Forensics and Security,2007,2(1):31-45.
  • 5S-tools,S-tools4.0[EB/OL].http://www.snapfiles.com/get/stools.html,2008.
  • 6FRIDRICH J,GOLFAN M,SOUKAL D.Searching for the stego key[A].Security,Steganography and Watermaking of Multimedia Contents[C].2004.70-82.
  • 7FRIDRICH J,GOLJAN M,SOUKAL D,et al.Forensic steganalysis:determining the stego key in spatial domain steganography[A].Seeu-rity,Steganography and Watermaking of Multimedia Contents[C].2005.631-642.
  • 8周治平 王永志 纪志成等.隐写路径搜寻方法研究.哈尔滨工业大学学报,2006,38:768-772.
  • 9张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 10张卫明,李世取,刘九芬.隐写术CPT的等价密钥分析[J].电子学报,2007,35(12):2258-2261. 被引量:3

二级参考文献22

  • 1WU Mingqiao,ZHU Zhongliang,JIN Shiyao.Detection of Jsteg Hiding Using Image Statistical Model[J].Chinese Journal of Electronics,2006,15(1):165-168. 被引量:3
  • 2JPEG-JSteg-V4[Z]. (1996-07-01). http://www.funet.fi/pub/crypt/ steganography/jpeg- JSteg-v4.diff.gz.
  • 3Trivedi S, Chandramouli R. Secret Key Estimation in Sequential Steganography[J]. IEEE Transactions on Signal Processing, 2005, 53(2): 746-757.
  • 4Ma Ning, Zhang Weiming, Guan Wei, et al. Extracting Attack to Sequential Jsteg Stegosystems[C]//Proceedings of the 10th Joint International Computer Conference. Kunming, China: [s. n.], 2004: 277-281.
  • 5Katzenbeisser Stefan等著 吴秋新等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 6张利平 张汗灵.一种主动隐写分析算法.哈尔滨工业大学学报:自然科学版,2006,38:806-808.
  • 7Chandramouli R.A mathematical framework for active steganalysis.ACM Multimedia Systems Journal,Special Issue on Multimedia Watermarking,2003,9(3):303-311
  • 8Fridrich J,Goljan M,Soukal D.Searching for the stego key//Proceedings of the SPIE-Security,Steganography and Watermarking of Multimedia Contents Ⅵ.San Jose,CA,2004:70-82
  • 9Zhang T,Ping X J.A new approach to reliable detection of LSB steganography in natural images.Signal Processing,2003,83(10):2085-2093
  • 10Fridrich J,Goljan M.On estimation of secret message length in LSB steganography in spatial domain//Proceedings of the SPIE-Security,Steganography and Watermarking of Multimedia Contents Ⅵ.San Jose,CA,2004:23-34

共引文献95

同被引文献76

引证文献9

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部