期刊文献+

基于像素相关性的数字图像隐写分析 被引量:3

Digital image steganalysis based on pixel correlation
下载PDF
导出
摘要 根据自然图像相邻像素之间具有一定相关性的特点,提出一种基于图像像素相关性度量的隐写分析方法。首先利用H ilbert空间填充曲线对图像各位平面像素以及图像像素进行扫描,将其构造成一维序列,然后分别采用自相关系数和像素前后差值比对图像相邻像素间的相关性进行度量,提取特征输入到分类器中。实验表明,该算法能够实现对JSteg、F5、OutGuess三种隐写算法的有效检测。 According to the adjacent pixels of natural images have certain correlation,proposed a steganalysis method which based on correlation measurement of image pixels.Firstly,used Hilbert space filling curve scanning pixels of the image and pixels of each planes,constructed one-dimensional sequence.Then correlated the correlation coefficient and the ratio of the difference between the adjacent pixels to measure the correlation.Extracted the features to input the classifier.The experiments prove the algorithm can effectively detect JSteg,F5 and OutGuess algorithms.
出处 《计算机应用研究》 CSCD 北大核心 2011年第6期2221-2223,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60842006)
关键词 隐写分析 相关性 空间填充曲线 支持向量机 steganalysis correlation space filling curve SVM
  • 相关文献

参考文献12

  • 1FRIDRICH J, GOLJAN M. Practical steganalysis of digital images:state of the art [ C ]//Proc of SPIE : Security and Watermarking of Mul- timedia Contents. 2002 : 1 - 13.
  • 2WESTFELD A, PFITZMANN A. Attacks on steganographic systems [ C]//Proc of the 3rd International Workshop on Information Hiding. London : Springer-Verlag, 2000:61 - 76.
  • 3张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:74
  • 4FRIDRICH I, GOLJAN M, HOGEA D. Steganalysis of JPEG ima- ges: breaking the F5 algorithm [ C ]//Proc of the 5th International Workshop Information Hiding. London: Springer-Verlag, 2002: 310- 323.
  • 5FRIDRICH J, GOLJAN M, HOGEA D. Attacking the OutGuess [C ]//Proc of ACM Workshop on Multimedia and Security. New York : ACM Press,2002:3- 6.
  • 6AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics[ J ]. IEEE Trans on Image Process, 2003,12 ( 2 ) : 221- 229.
  • 7AVCIBAS I, MEMON N, SANKUR B. Image steganalysis with bina- ry similarity measures[ C ]//IEEE International Conference on Image Processing. 2002:340-354.
  • 8FARID H. Detecting hidden messages using higher-order statistical models[C]// Proc Internaiional Conference Image Processing. [ S. l. ] : IEEE Press,2002:905-908.
  • 9FARID H, LYU S. Detecting hidden messages using higher-order sta- tistics and support vector machines[ C]//Proc of the 5th International Workshop on Information Hiding. London :Springer-Verlag,2002:340- 354.
  • 10徐旭,平西建,张涛,王国新.针对LSB匹配隐写的图像复原隐写分析[J].计算机辅助设计与图形学学报,2009,21(2):262-267. 被引量:7

二级参考文献19

  • 1魏菁菁,王道顺.基于小波变换的LSB替换的检测算法[J].清华大学学报(自然科学版),2007,47(4):595-598. 被引量:2
  • 2Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C] //Proceedings of SPIE, Santa Clara, 2003, 5022:131-142.
  • 3陈丹,王育民.一种针对加性空域掩密算法的通用掩密分析技术研究[c]//第7届全国信息隐藏暨多媒体信息安全学术大会论文集,南京,2007:233-237.
  • 4Mehrabi M A, Faez K, Bayesteh A R. Image steganalysis based on statistical moments of wavelet subband histograms in different frequencies and support vector machine [C]// Proceedings of IEEE the 3rd International Conference on Natural Computation, Haikou, 2007:24-27.
  • 5Liu Q Z, Sung A H, Ribeiro B, etal. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1):21-36.
  • 6Liu Q Z, Sung A H, Chen Z X, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayseale images[J]. Pattern Recognition, 2008, 41(1): 56-66.
  • 7Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[M] // Lecture Notes in Computer Science. Heidelberg: Springer, 2003, 2578:310- 323.
  • 8Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6) :441-444.
  • 9Gonzalez R C,Woods RE.数字图像处理[M].第2版.阮秋琦,阮宇智,等译.北京:电子工业出版社,2003:175-183.
  • 10University of Washington. CBIR image database[OL]. (2005-12-10) [2008 03-14]. http://www, cs. washington. edu/research/imagedatabase/roundtruth/.

共引文献79

同被引文献27

  • 1GUAN Q, DONG J, TAN T. An effective image steganalysis method based on neighborhood information of pixels[C]. The 18th IEEE International Conference on Image Processing, 2011: 2721-2724.
  • 2ZOU D, SHI Y Q, WEI S, et al. Steganalysis based on markov model of thresholded prediction-error image[C]. IEEE International Conference on Multimedia and Expo, 2006: 1365-1368.
  • 3PEVNY T, FRIDRICH J. Multiclass detector of current steganographic methods for JPEG format[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4): 635-650.
  • 4KODOVSK Y J,FRIDRICH J. Calibration revisited[C]. The 11th ACM Multimedia Security Workshop Proceedings, 2009: 63-74.
  • 5PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
  • 6SHI Y Q, GUO R X, ZOU D, et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network[C]. IEEE International Conference on Multimedia and Expo, Amsterdam, 2005: 269-272.
  • 7BOSS.base.(2011,5).http://boss.gipsa-lab.grenoble-inp.fr/.
  • 8WEINBERGER M J, SEROUSSI G., SAPIRO G.. LOCO-I: a low complexity, context-based, lossless image compression algorithm[C].Data Compression Conference, 1996: 140-149.
  • 9GOLJAN M, FRIDRICH J, HOLOTYAK T. New blind steganalysis and its implications[C]. Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, 2006: 1-13.
  • 10MIELIKAINEN J. LSB matching revisited, signal processing letters[J]. IEEE, 2006, 13(5): 285-287.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部