期刊文献+

空域序列隐写图像的密钥估计算法 被引量:2

Stego key estimation algorithm in spatial sequential image steganography
下载PDF
导出
摘要 在已知嵌入消息长度的条件下,隐写密钥可以看做消息嵌入的起始位。将图像像素划分为不同类点,通过分析信息嵌入和最低位置反对各类点的影响,得到图像嵌入信息部分和未嵌入信息部分的差异,最终设计了针对空域序列LSB(least significant bits)隐写图像的密钥估计算法。实验结果表明,该算法可对隐写密钥进行快速有效的估计。 This paper focused on the problem of estimating the stego key,which could be considered as the beginning of the secret message under the condition that the message length was known. Classified the pixels into different kinds. Based on the analysis of the effects on different kinds of pixels message embedding and least significant bit plane flipping have,obtained the difference between the part with message and the part without message in image. And then devised the stego key estimation algorithm of spatial sequential LSB image steganography. The experiment shows that this algorithm can estimate the stego key effectively and quickly.
作者 刘静 汤光明
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3896-3898,共3页 Application Research of Computers
基金 河南省信息安全重点实验室基金课题资助项目(10ISLB001)
关键词 隐写分析 空域 最小有效位隐写 密钥估计 steganalysis spatial domain LSB steganography stego key estimation
  • 相关文献

参考文献8

  • 1CHANDRAMOULI R. A mathematical framework for active steganalysis[ J ]. ACM Multimedia Systems Journal:Special Issue on Multimedia Watermarking,2003,9 ( 3 ) : 301 - 311.
  • 2FRIDRICH J, GOLJAN M, DU Rui. Detecting I.SB steganography in color and gray-scale image [ J ]. IEEE Multimedia, 2001,8 (4) : 22- 28.
  • 3FRIDRICH J, GOLJAN M. On estimation of secret message length in LSB steganography in spatial domain [ C ]//Proc of SPIE. 2004 : 23- 34.
  • 4TRIVEDI S. Secret key estimate in sequential steganography [ D ]. Hboken, New Jersey: Stevens Institute of Technology, 2003.
  • 5吴明巧,朱中梁,金士尧.基于拉普拉斯模型的序列隐写密钥估计[J].计算机工程与科学,2008,30(2):9-14. 被引量:3
  • 6陈嘉勇,刘九芬,周涵,张卫明.序贯LSB隐写术的提取攻击[J].计算机工程,2008,34(24):146-148. 被引量:4
  • 7翟卫东,吕述望,刘振华.基于广义高斯分布的彩色图像空域隐写检测算法[J].通信学报,2004,25(2):33-42. 被引量:9
  • 8University of South California. The USC-SIPI image database [DB/OL]. (2009). http://sipi. use. edu/services/database/Database. html.

二级参考文献19

  • 1WU Mingqiao,ZHU Zhongliang,JIN Shiyao.Detection of Jsteg Hiding Using Image Statistical Model[J].Chinese Journal of Electronics,2006,15(1):165-168. 被引量:3
  • 2尤新刚 郭云彪 周林娜.信息隐藏对图像空域数据特性的影响[A]..CIHW2000/2001[C].,2001.208-214.
  • 3翟卫东 刘振华 吕述望.应用于隐写检测中的几个统计学结论[A]..通信技术[C].,2003.75-77.
  • 4马振华 刘坤林 陆璇 等.现代应用数学手册(概率统计与随机过程卷)[M].北京:清华大学出版社,2000.328-395.
  • 5JPEG-JSteg-V4[Z]. (1996-07-01). http://www.funet.fi/pub/crypt/ steganography/jpeg- JSteg-v4.diff.gz.
  • 6Trivedi S, Chandramouli R. Secret Key Estimation in Sequential Steganography[J]. IEEE Transactions on Signal Processing, 2005, 53(2): 746-757.
  • 7Ma Ning, Zhang Weiming, Guan Wei, et al. Extracting Attack to Sequential Jsteg Stegosystems[C]//Proceedings of the 10th Joint International Computer Conference. Kunming, China: [s. n.], 2004: 277-281.
  • 8张利平 张汗灵.一种主动隐写分析算法.哈尔滨工业大学学报:自然科学版,2006,38:806-808.
  • 9Tirkel A Z, Rankin G A,Schyndel R V,et al. Electronic Watermark[C]//Proc of Digital Image Computing, Technology and Applications, 1993 : 666-672.
  • 10Machado R. Ezstego[EB/OL]. [2006 -11-12]. http://www. stego. com.

共引文献13

同被引文献16

  • 1ZHANGWei-ming,LIShi-qu,CAOJia,LIUJiu-fen.Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information[J].Wuhan University Journal of Natural Sciences,2005,10(1):315-318. 被引量:5
  • 2徐长勇,平西建,张涛.视频信息伪装技术综述[J].计算机应用研究,2006,23(12):8-11. 被引量:4
  • 3张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 4Westfeld A,Pfitzmann A.Attacks on steganographic system[C]∥Proceedings of the 3rd Information Hiding Workshop.Berlin:Springer-Verlag,1999:61-75.
  • 5周涵.低虚警率下隐写检测算法的量化评估与应用研究[D].郑州:信息工程大学信息工程学院,2008.
  • 6Fridrich J,Goljan M,Soukal M,et al.Forensic steganalysis:determining the stego key in spatial domain steganography[C]∥Proc of Security,Steganography and Watermarking of Multimedia Contents.San Jose:SPIE,2005:631-642.
  • 7Liu J,Tang G M.Stego key estimation in LSB steganography[J].Journal of Multimedia,2012,7(4):309-313.
  • 8田雨果,林泽冰,刘九芬,等.明文序贯LSB隐写检测与提取方法[J].南京理工大学学报,2012,36(S):1-6.
  • 9Stewart L E.Essays about computer security[M].Cambridge:University of Cambridge Computer Laboratory,1999.
  • 10教育部语言文字应用研究所计算语言学研究室.在线语料库字词频数据[EB/OL].[2013-09-26].http:∥www.cncorpus.org/Resouces.aspx.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部