期刊文献+

针对隐写分析冗余评估指标的属性约简算法 被引量:2

Attribute Reduction for Steganalysis Redundant Indicators
下载PDF
导出
摘要 针对隐写分析评估指标体系中存在的知识冗余,提出了一种隐写分析评估指标的属性约简方法。在分析存在知识冗余的指标体系的基础上,采用BCC算法求出各评估指标初始区间及其约简,并用之将仿真实验数据离散化;之后将离散化矩阵作为HORAFA算法的输入,输出即得到最终的属性约简。仿真实验验证了该属性约简方法对冗余评估指标约简的有效性,通过对属性约简前后的评估算法兼容度分析,表明属性约简使评估结果的可靠性显著提高。 For the existence of knowledge redundancy in steganalysis evaluation indicators, an attribute reduction for steganalysis indicators is proposed. Based on analysing the indicators knowledge redundant, the algorithm uses BGC algorithm to get initial interzone and its reduction of each index, with which data of experiment result are despersed. The discrete matrix is used as tt^e input of Heuristics Optimal Finding Reduct Algorithm based on Frequencies Attributes(HORAFA) algorithm,and then the final reduction result of steganalysis evaluation indi- cators is obtained. The experiments results show that the algorithm is effective in steganalysis evaluation indicators reduction. It is proved that the attribute reduction algorithm can increase the reliability of evaluation results by analysing the compatibility of given evaluation algorithm before and after attribute reduction.
出处 《电讯技术》 北大核心 2011年第5期86-90,共5页 Telecommunication Engineering
关键词 信息安全 掩密技术 隐写分析 评估指标 属性约简 information security steganography steganalysis evaluation indicators attribute reduction
  • 相关文献

参考文献7

二级参考文献38

  • 1胡烨雯,张新鹏,王朔中.一种可估计最低位平面嵌入信息量的密写分析方法[J].上海交通大学学报,2004,38(z1):122-124. 被引量:5
  • 2刘鸿霞,夏春和.图像隐写分析现状研究[J].计算机工程与设计,2006,27(1):21-25. 被引量:9
  • 3Ker A D. Steganalysis of LSB Matching in Grayscale Images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
  • 4Li Zhi, Sui Aifen, Yang Yiman. A LSB Steganography Detection Algorithm[C]//Proc. the 14th IEEE Int'l Conf. on Personal Indoor and Mobile Radio Communication. Beijing, China: [s. n.], 2003.
  • 5Dumitrescu S, Wu Xiaolin, Memon N. On Steganalysis of Random LSB Embedding in Images[C]//Proc. of Int'l Conf. on Image Processing. New York, USA: [s. n.], 2002.
  • 6Jackson J T, Gunsch G H, Claypoole R L, et al. Wavelet-based Steganalysis Using a Computational Immune System Approach[C]// Proceedings of Visual Communications and Image Processing. Lugano, Switzerland: [s. n.], 2003.
  • 7Pevny T, Fridrich J. Mluti-class Blind Steganalysis for JPEG Images[C]//Proc. of SPIE/IS&T Electronic Imaging. San Jose, CA, USA: [s. n.], 2006.
  • 8PROVOS N.Defending against statistical steganalysis[M].Proc 10th USENIX Security Symposium.Washington,DC,2001.
  • 9Steganography software for Windows [OL].http:∥members.tripod.com/steganography/stego/software.html.
  • 10WESTFELD A.High capacity despite better steganalysis(F5-A steganographic algorithm) [J].In:Moskowitz,I S(eds):Information Hiding.4th International Workshop.Lecture Notes in Computer Science,2001(2137):289-302.

共引文献15

同被引文献37

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部