期刊文献+

一类自适应隐写的更改比率估计 被引量:3

Modification ratio estimation for a category of adaptive steganography
原文传递
导出
摘要 针对图像自适应隐写的检测问题,分析了最低多有效位(MLSB,multiple least signific ant bits)替换隐写的样本对分析模型在对自适应隐写的适用性,给出了适于该模型检测的自适应隐写须满足的条件,对满足条件的一类自适应隐写,给出了基于特定区域和像素对分析的定量分析一般方法,然后针对一种典型自适应隐写,给出了具体的特定区域选取方法、样本对跟踪集选取方法和隐写更改比率估计算法.实验结果表明针对这种隐写,该算法能够较为准确地估计隐写更改比率,验证了文中方法的有效性. This paper investigates the detection of adaptive image steganography.Firstly,the sample pair analysis model of multiple least-significant bits(MLSB) replacement is analyzed,and the conditions under which the adaptive steganography can be detected via this model are given.For the category of adaptive steganography satisfying these conditions,a general quantitative steganalysis method is presented based on specific areas and sample pair analysis.Then,for a typical adaptive steganography,some concrete methods are proposed to select specific areas and trace sets of sample pairs,and estimate the stego modification ratios.Experimental results show that the proposed methods can estimate the stego modification ratio accurately.This verifies the validity of the proposed general quantitative steganalysis method.
出处 《中国科学:信息科学》 CSCD 2011年第3期297-310,共14页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:60902102 60970141) 河南省科技创新杰出人才计划(批准号:094200510008) 解放军信息工程大学博士论文创新基金(批准号:BSLWCX200804)资助项目
关键词 自适应隐写 隐写分析 MLSB 样本对分析 更改比率 adaptive steganography steganalysis MLSB(multiple least significant bits) sample pair analysis modification ratio
  • 相关文献

参考文献27

  • 1LUO XiangYang,LIU FenLin,YANG ChunFang,WANG DaoShun.Image universal steganalysis based on best wavelet packet decomposition[J].Science China(Information Sciences),2010,53(3):634-647. 被引量:9
  • 2WANG GuoXin PING XiJian XU ManKun ZHANG Tao BAO XiRui.Steganalytic method based on short and repeated sequence distance statistics[J].Science in China(Series F),2008,51(10):1466-1474. 被引量:4
  • 3HE Junhui1,2 & HUANG Jiwu1,2 1. School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China,2. Guangdong Province Key Laboratory of Information Security, Guangzhou 510275, China.Steganalysis of stochastic modulation steganography[J].Science in China(Series F),2006,49(3):273-285. 被引量:3
  • 4张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 5Jessica Fridrich,Miroslav Goljan,Dorin Hogea,David Soukal.Quantitative steganalysis of digital images: estimating the secret message length[J]. Multimedia Systems . 2003 (3)
  • 6Niimi M,,Ei T,Noda H,et al.An attack to BPCS-steganography using complexity histogram and countermeasure. Proceedings of International Conference on Image Processing . 2004
  • 7Yu X Y,Tan T N,Wang Y H.Reliable detection of BPCS-steganography in natural images. Proceedings of the third International Conference on Image and Graphics . 2004
  • 8Yu X,Babaguchi N.A fast and e-ective method to detect multiple least significant bits steganography. Proceedings of ACM Symposium on Applied Computing . 2008
  • 9Luo X Y,Liu F L,Yang C F,et al.Steganalysis of adaptice image steganography in multiple gray code bit-planes. Multimed Tool Appl . 2010
  • 10S. G. Lian,D. Kanellopoulos,G. Ruffo.Recent advances in multimedia information system security. Inf Sloven Soc Inform . 2009

二级参考文献21

  • 1姜楠,王健,杨义先.新的唯秘密载体信息隐藏分析方法[J].北京邮电大学学报,2006,29(2):1-4. 被引量:7
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey [J]. Proceedings of IEEE, 1999, 87(7): 1062~ 1078
  • 3Wang H, Wang S. Cyber warfare-steganography vs.steganalysis [ J ]. Communications of the ACM, 2004, 47 (10):76 ~ 82
  • 4Fridrich J, Goljan M. Practical steganalysis of digital imagesstate of the art [A]. In: Security and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE 4675 [C]. San Jose, 2002. 1~13
  • 5Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3,4): 313~336
  • 6FridrichJ, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia,Special Issue on Security, 2001, 8(4): 22~28
  • 7Westfeld A, Pfitzm A. Attacks on steganographic systems [A]. In: The 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science 1768 [C].Dresden: Springer-Verlag, 1999. 61~76
  • 8Zhang Xinpeng, Wang Shuozhong, Zhang Kaiwen.Steganography with least histogram abnormality [A]. In:Computer Network Security, Lecture Notes in Computer Science 2776 [C]. St, Petersburg: Springer-Verlag, 2003. 395~ 406
  • 9Kawaguchi E, Eason R O. Principle and application of BPCSsteganography [A]. In: Multimedia Systems and Applications,Proceedings of SPIE 3528, Boston, 1998. 464~472
  • 10Nods H, Spaulding J, Shirazi M N, et al. Application of bitplane decomposition steganography to JPEG2000 encoded images [J]. IEEE Signal Processing Letters, 2002, 9(12): 410~413

共引文献30

同被引文献57

  • 1刘文芬,管伟,曹佳,张卫明.基于污染数据分析实现LSB秘密消息的检测[J].计算机研究与发展,2006,43(6):1058-1064. 被引量:4
  • 2郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电子学报,2006,34(6):1048-1052. 被引量:17
  • 3张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 4Luo Weiqi, Huang Fangjun, Huang Jiwu.Edge Adaptive Image Steganography Based on LSB Matching Revisited[J].IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
  • 5Mielikainen J.LSB Matching Revisited[J].IEEE Signal Processing Letters, 2006, 13(5): 285-287.
  • 6Kodovsky J, Fridrich J.On Dangers of Overtraining Steg- anography to Incomplete Cover Model[C]//Proceedings of the 13th ACM Multimedia Workshop on Multimedia and Security.New York, USA: [s.n.], 2011.
  • 7BOSSbase[EB/OL].(2011-05-10).http://boss.gipsa-lab.grenoble- inp.fr/.
  • 8Guan Qingxiao, Dong Jing, Tan Tieniu.An Effective Image Steganalysis Method Based on Neighborhood Information of Pixels[C]//Proc.of the 18th IEEE International Conference on Image Processing.Brussels, Belgium: [s.n.], 2011: 2721- 2724.
  • 9Pevny T, Bas P, Fridrich J.Steganalysis by Subtractive Pixel Adjacency Matrix[J].IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
  • 10Lin Chih-Jen.LIBSVM Tools[EB/OL].(2011-09-10).http:// www.csie.ntu.edu.tw/~cjlin/libsvmtools/.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部