期刊文献+

基于特征函数和质量因子的JPEG图像隐写分析 被引量:8

JPEG image steganalysis based on characteristic function and quality factor
下载PDF
导出
摘要 提出了一种新的JPEG通用隐写分析方法.通过分析JPEG图像DCT域和小波域的量化噪声模型和隐写模型,发现了量化噪声和嵌入噪声对图像的作用原理,并用直方图特征函数来区分2种噪声对图像的影响.基于JPEG质量因子对图像进行分类,为每个图像分类单独训练支持向量机分类器.实验显示,本文方法相比已有的一些常用JPEG通用隐写分析方法具有更好的检测性能. In this paper, we proposed a new JPEG universal steganalytic scheme. By analyzing JPEG quantization model and steganographic model in DCT domain and wavelet domain, the study shows difference of quantization noise and embedding noise. Features calculated from the characteristic functions of JPEG individual histograms and wavelet subbands histograms are used to discriminate them. We categorize JPEG images based on quality factor and train different SVM classifier for individual categories. Experiments show that our method has better performance than some exiting JPEG universal steganalytic methods.
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2010年第3期389-396,共8页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家863计划项目(2007AA01Z465) 国家自然科学基金(60970028) 国家自然科学基金重点项目(60633030) 国家自然科学基金面上项目(60573049)资助
关键词 信息隐藏 图像隐写 隐写分析 特征函数 质量因子 information hiding image steganography steganalysis characteristic function quality factor
  • 相关文献

参考文献14

  • 1Johnson N,Jajodia S.Exploring steganography:seeing the unseen[J].IEEE Computer,1998,31(2):26-34.
  • 2Johnson N,Jajodia S.Steganalysis of images created using current steganography software[C]//Aucsmith D.Information Hiding.Berlin/Heidelberg:Springer-Verlag,1998:273-289.
  • 3Provos N.Defending against statistical steganalysis[C]//Wallach D S.USENIX Security Symposium.Berkeley:USENIX Association,2001:24-24.
  • 4Wesffeld A.F5-a steganographie algorithm:High capacity despite better steganalysis[C]//Moskowitz I S.Information Hiding.Berlin/Heidelberg:Springer-Verlag,2001:289-302.
  • 5Lyu S,Farid H.Steganalysis using higher-order image statistics[J].IEEE Transactions on Information Forensics and Security,2006,1(1):111-119.
  • 6Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Fridrich J.Information Hiding.Berlin/Heidelberg:Springer-Verlag,2005:67-81.
  • 7Pevny T,Fridrich J.Multi-class detector of current steganographic methods for JPEG format[J].IEEE Transactions on Information Forensics and Security,2008,3(4):635-650.
  • 8Xuan G,Shi Y Q,Gao J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[C]///Barni M,Herrera J,Katzenbeisser S,et al.Information Hiding.Berlin/Heidelberg:Springer-Verlag,2006:262-277.
  • 9Shi Y Q,Chen C,Chen W.A markov process based approach to effective attacking JPEG steganography[C]//Camenisch J L,Collberg C S,Johnson N F,et al.Information Hiding.Berlin/Heidelberg:Springer-Verlag,2007:249-264.
  • 10Lam E Y,Goodman J W.A mathematical analysis of the DCT coefficient distributions for images[J].IEEE Transactions on Image Processing,2000,9(10):1661-1666.

同被引文献54

引证文献8

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部