期刊文献+

基于属性依赖度的图像隐写分析算法 被引量:2

Image Steganalysis Algorithm Based on Attribute Dependent Degree
下载PDF
导出
摘要 针对文献[6]将粗糙集属性约简应用于信息隐藏盲检测中检测正确率有所下降的问题,提出了基于属性依赖度的图像隐写分析算法,该算法利用粗糙集理论属性依赖度提出决策表离散优化的措施,寻找一种提高整个决策表分类能力的办法,以达到提高检测正确率的目的。首先利用该算法对决策表进行优化,其次通过属性约简得到最小约简,最后采用支持向量机构造分类器,对Cox、Piva两种不同隐写术进行实验结果表明,使用该算法不仅检测正确率有较大提高,而且检测效率也有较大提高。 The accuracy of hidden information blind detection in which rough set attribute reduction is adopted would drop to some extent in ref[6].Steganalysis algorithm based on decision attribute dependent degree is proposed.In this algorithm,improved measures for the discretization of the decision table are proposed to get the best decision ability of discretized decision table with the detection accuracy improved,according to the knowledge of decision attributes dependent degree in rough set theory.Experiments are taken to Cox,Piva as the following order: firstly,optimize the decision table by this algorithm;secondly,get the minimal feature after attributes reduction;thirdly,build the classifier by SVM.The experimental results shows that the detection accuracy and efficiency have been greatly improved by the help of the proposed algorithm.
作者 余文琼
出处 《三明学院学报》 2010年第6期506-509,537,共5页 Journal of Sanming University
基金 福建省教育厅B类项目(JB10172) 三明学院科研基金项目计划(2009B0901/G) 三明学院教改科研项目(ZL0701/SF)
关键词 隐写分析 检测正确率 属性依赖度 分类能力 steganalysis detection accuracy attribute dependent degree classification ability
  • 相关文献

参考文献10

  • 1PAWLAK Z.Rough sets:theoretical aspects of reasoning about data[M].Dordrecht:Kluwer Academic Publishers,1991.
  • 2ZUGEN LIU.Steganalysis in multiple sources of cover Images[C].//2009 Ninth International Conference on Hybrid Intelligent Systems.2009.
  • 3ZHUO LI,KUIJUN LU,XIANTING ZENG,et al.Feature -based steganalysis for JPEG images[C].// Proceedings of ICDIP2009.2009:76-80.
  • 4LI ZHUO,CHEN JIAN,JIANG XIAONING,et al.Novel blind steganalysis for JPEG images[C].// Proceedings of Visual Information Communication,2009,2009:339-353.
  • 5WENQIONG YU,ZHUO LI,LINGDI PING.Blind detection for JPEG steganography[C].//Proceedings of IEEE ICNIT 2010.Manila:[s.n.]2010:128-132.
  • 6戴蒙,林家骏,毛家发.一种基于粗糙集属性约简的图像隐藏信息检测方法[J].华东理工大学学报(自然科学版),2008,34(1):122-125. 被引量:6
  • 7SHI Y Q,XUAN G R,ZOU D K,et al.Steganalysis based on moments of characteristic functions using wavelet decomposition[C].// Prediction-Error Image,and Neural Network.Proceedings of IEEE ICME 2005.Amsterdam:IEEE,2005:269-272.
  • 8COX I J,KILIAN J,LEIGHTON T,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Transaction on Image Processing,1997,6(12):1 673-1 687.
  • 9PIVA A,BARNI M,BARTOLINI E,et al.DCT-based watermark recovering without resorting to the uncorrupted original image[J].In Proc Int Conf on Image Processing.Adanta:[s.n.]1997:520-523.
  • 10CHANG CHIH CHUNG,LIN CHIH JEN.LIBSVM:a library for support vector machines,2001[CP/DK].http://www.csie.ntu.edu.tw/cjlin/libsvm.

二级参考文献7

  • 1Chandramouli R, Subbalakshmi K P. Current trends in steganalysis: A critical survey [A]. Proceeding of Eighth International Conference Control on Automation, Robotics and Vision [C]. KunMing: Elseviser Press, 2004. 964-967.
  • 2Fridrich J, Goljan M. Practical steganalysis of digital imagestate of the art[EB/OL], http://www, ws. binghamton, edu/ fridrich/publications, html, 2003.
  • 3Pawlak Z. Rough Set: Theoretical Aspects of Reasoning about Data [M]. Dordrecht :Kluwer Academic Publishers, 1991.
  • 4Fridrieh J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [A]. Proceeding 6th Information Hiding Workshop [C]. Berlin: Springer, 2004.67-891.
  • 5Upham D. Jsteg steganographic algorithm[EB/OL]. ftp:// ftp. funet, fi/pub/erypt/steganography/, 1999.
  • 6Latham A. Steganography: JPHIDE and JPSEEK[EB/OL]. http://linux01, gwdg. de/? alatham/stego, html,1999.
  • 7Provos N. Defending against statistical steganalysis [A]. Proceedings of the 10th USENIX Security Symposium [C]. Wash ington D C: USENIX Press,2001. 323-335.

共引文献5

同被引文献19

  • 1SMITH S M,BRADY J M,SUSAN. A new approach to low levet image processing [R].Internal Technical Report TR95SMSI ,Defense Research Agency.Oxford:Oxford University, 1995.
  • 2DAVID G L.Distinctive image features from scale-invariant key pointsr [J ]. International Journal of Computer Vision, 2004,60 (2) :91-110.
  • 3KRYSTIAN MIKOLAJCZYK, CORDELIA SCHMID. Scale and affine invariant interest point detectors [J ]. Interna- tional Journal of Computer Vision, 2004,60 ( 1 ) : 63 - 86.
  • 4FISCHLER M A, BOLLES R C. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography [J ]. Communications of the ACM, 1981,24 (6): 381 - 395.
  • 5ZOGHLAMI I, FAUGERAS O, DERICHE R.Using geometric comers to build a 2Dmosaic from a set of images [ C ] //Computer Vision and Pattern Recognition.Proceedings, 1997 IEEE Computer Society Conference, 1997.
  • 6HARTLEY R, ZISSERMAN A. Multiple view geometry in computer vision[M ]. 2nd ed. Longden:Cambridge Uni- versity, 2003.
  • 7FISCHLER M, BOLLES R. Random sample consensus:A paradigm for model fitting with application to image analy- sis and automated cartography[J]. Communications of the ACM, 1981,24:381-395.
  • 8Harris C, Stephens M.A combined comer and edge detection [ C ]//Proc 4th Alvey Vision Conf.1988:189-192.
  • 9王连生.核电压力壳上法兰空心锻造工艺的数值模拟和试验研究[D].北京:清华大学,1995.
  • 10CHEN HUIQIN, ZHANG QIAOLI, LIU JIANSHENG. Simulation and prediction of microstructure in hot forming of metal[J]. Trans Nonferrous Met Sco of China, 2000, 10(40): 26-30.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部