期刊文献+

对基于小波对比度和LSB逐层隐写方法的分析 被引量:2

Analysis Against the Layer-Wise Steganographic Method Based on Wavelet Contrast and LSB
下载PDF
导出
摘要 基于小波对比度和LSB的逐层隐写方法按图像小块的小波对比度确定可嵌入位平面层数,然后在时空域中逐层对可在该层嵌入信息的小块嵌入秘密信息,具有较大的信息嵌入量和良好的视觉隐蔽性.针对这种隐写方法,本文从图论的角度直观分析了隐写行为,导出两个基于直方图特性的统计量,理论证明了这两个统计量与嵌入率间存在的线性关系和不同的比例关系,并据此提出隐写检测方法.理论分析和实验结果均表明:本文方法不但能检测出秘密信息的存在性,而且可以大致估计出秘密信息嵌入量.本文方法对分析检测其它位平面逐层隐写也有借鉴作用. In the Layer-Wise steganographic method based on wavelet contrast and Least-Significant-Bit(LSB),the number of bit-plane embedded is decided by wavelet contrast,and secret information is embedded by the layer-wise model.The steganographic method can provide large embedding capacity and good imperceptibility.Aimed at this steganographic method,this paper visually analyzes steganographic actions by the methods in graph theory.Two feature statistics are defined based upon the histogram of the image under investigation.It is proved that there are linear relationships and different ratio relationships between the two feature statistics and the embedding rate.Then,a new steganalytic method is proposed.Theory analysis and experimental results show that our steganalytic method can not only announce the presence of hidden information,but also provide a approximative estimation of the embedding capacity.The steganalytic technique proposed in this paper is also useful to against other Layer-Wise steganographic methods.
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第7期1315-1322,共8页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划项目(2005AA142110) 福建省青年人才基金项目(2006F3076)资助
关键词 隐写分析 小波对比度 逐层隐写 图论 直方图 steganalysis wavelet contrast layer-wise steganographic method graph theory histogra
  • 相关文献

参考文献3

二级参考文献30

  • 1杨志,毛士艺,陈炜.一种新的基于小波对比度的图像融合算法[J].系统工程与电子技术,2005,27(2):209-211. 被引量:15
  • 2[6]Fridrich J, Goljan M. Practical steganalysis of digital images- state of art [ A ]. Security and Watermarking of Multimedia Contents Ⅳ,
  • 3[1]Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996,35 (3,4):313-336.
  • 4[2]Fridrich J, Goljan M. A new steganographic method for palette images [A]. Proceedings of IS&T PICS [C]. Savannah, Georgia ,USA :IS&I, 1999. 285- 289.
  • 5[3]Machado L R. EZ Stego. http : //www. stego. com/2003-04-25.
  • 6[4]Johnson N F, Duric Z, Jajodia S. Information hiding:steganography and watermarking- attacks and countermeasures [M ]. Boston: Kluwer Academic Publishers, 2001.
  • 7[5]Westfeld A. Pfitzmann A. Attacks on steganographic systems [ A ]. 3rd Intermational Workshop on Information Hiding, Lecture Notes in Computer Science 1978[C]. New York: Springer-Verlag, 2002.61-76.
  • 8Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 9Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 10Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13

共引文献40

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部