期刊文献+

基于D-S证据理论的融合图像隐写分析 被引量:12

Fusion image steganalysis based on Dempster-Shafer evidence theory
原文传递
导出
摘要 提出一种基于证据权的D-S证据理论的图像隐写分析方法.首先在空域,离散余弦变换(DCT)域和离散小波变换(DWT)域分别提取图像特征并各自进行预分类;然后对各域分类结果进行基本概率分配并进行证据权修正,利用D-S组合规则计算融合概率分配函数,形成最终的决策级融合分类结果.针对典型的隐写方法(如F5,JPHide,Jstego和YASS算法)进行检测,仿真结果显示,所提出的方法能显著提高单分类器的性能. Based on evidence weight and Dempster-Shafer(D-S) evidence theory, an image steganalysis scheme is presented. The image is classified predictively by the characters exffacted from spatial, discrete cosine transform(DCT) and discrete wavelet transform(DWT) domain respectively. The basic probability assignments of varies classified results are assigned and modified by evidence weight. Then the fusion probability assignment function is computed by Dempster's combinational rule, and the last decision level fusion classify result is obtained. The detection works are presented to attack typical steganographical schemes such as F5, JPHide, Jstego and YASS. The simulation results show that the presented method can significantly improve the performance of single classifier.
出处 《控制与决策》 EI CSCD 北大核心 2011年第8期1192-1196,共5页 Control and Decision
基金 国家自然科学基金项目(60774030) 中央高校基本科研业务费专项资金项目(JUSRP21131)
关键词 融合决策 隐写分析 D-S证据理论 证据权 fusion decision steganalysis D-S evidence theory evidence weight
  • 相关文献

参考文献14

  • 1Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resists blind steganalysis[C]. Lecture Notes in Computer Science. Berlin: Springer, 2007, 4567: 16-31.
  • 2Sarkar A, Solanki K, Manjunath B S. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis[C]. Proc of SPIE-IS&T Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. San Jose: SPIE Press, 2008, 6819-681917:1-11.
  • 3Kharrazi M, Sencar H, Memon N. Improving steganalysis by fusion techniques: A case study with image steganalysis[C]. Proc of SPIE. San Jose: SPIE Press, 2006: 123-137.
  • 4Andrew D K. A fusion of maximum likelihood and structural steganalysis[C]. Lecture Notes in Computer Science. Berlin: Springer, 2007, 4567: 204-219.
  • 5Benjamin M R, Gilbert L E Sos S A. Multi-class classifi-cation averaging fusion for detecting steganography[C]. Proc of IEEE Int Conf on System of Systems Engineering. Washington DC: IEEE, 2007: 1-5.
  • 6Rodriguez B, Peterson G, Bauer K. Fusion of steganalysis systems using Bayesian model averaging[C]. IFIP Int Federation for Information Processing. Boston: Springer, 2008: 345-355.
  • 7Dong J, Chen X C, Guo L, et al. Fusion based blind image steganalysis by boosting feature selection[C]. LectureNotes in Computer Science. Berlin: Springer, 2008, 5041: 87-98.
  • 8孙子文,纪志成.基于马尔可夫模型和特征融合的图像隐写分析[J].控制与决策,2009,24(8):1239-1242. 被引量:5
  • 9刘海燕,赵宗贵,刘熹.D-S证据理论中冲突证据的合成方法[J].电子科技大学学报,2008,37(5):701-704. 被引量:76
  • 10Sun Z W, Hui M M, Guan C. Steganalysis based on co-occurrence matrix of differential image[C]. Proc of IIHMSP 2008. Harbin, 2008: 15-17.

二级参考文献32

  • 1董火明,高隽,汪荣贵.多分类器融合的人脸识别与身份认证[J].系统仿真学报,2004,16(8):1849-1853. 被引量:17
  • 2黄聪,宣国荣,高建炯,施云庆.基于图像及其预测误差图小波频域矩的隐写分析[J].计算机应用,2006,26(8):1851-1853. 被引量:1
  • 3黄聪,高建炯,宣国荣,施云庆.基于小波直方图频域矩的JPEG图像隐写分析[J].计算机工程与应用,2006,42(30):95-97. 被引量:3
  • 4平玲娣,刘祖根,史烈,孙康.基于易变特征实现隐藏信息的盲检测[J].浙江大学学报(工学版),2007,41(3):374-379. 被引量:4
  • 5Farid H,Siwei L.Detecting hidden messages using higher-order statistics and support vector machines[C].Proc of 5th Int Workshop on Information Hiding.Heidelberg:Springer,2002:340-354.
  • 6Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C].Proc of 6th Int Workshop on Information Hiding.Heidelberg:Springer,2004:67-81.
  • 7Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis of spread spectrum data hiding exploiting cover memory[C].Proc of Security,Steganography and Watermarking of Multimedia Contents-Ⅶ.San Jose:SPIE,2005:38-46.
  • 8Shi Y Q,Chen C,Chen W.A Markov process based approach to effective attacking JPEG steganography[C].Information Hiding Workshop 2006.Heidelberg:Springer,2006:249-264.
  • 9Ekenel H K,Sankur B.Muhiresolution face recognition[J].Image and Vision Computing,2005,23(5):469-477.
  • 10Cai H,Agaian S S.Spatial-frequency feature vector fusion based steganalysis[C].IEEE Int Conf on Systems,Man and Cybernetics.Taipei:IEEE Press,2006:1866-1870.

共引文献83

同被引文献146

  • 1刘大鹏,卢虹冰,漆家学,吴巨海,苏毅.基于多小波变换的医学图像融合算法研究[J].中国医学物理学杂志,2011,28(3):2637-2643. 被引量:6
  • 2叶清,吴晓平,宋业新.基于权重系数与冲突概率重新分配的证据合成方法[J].系统工程与电子技术,2006,28(7):1014-1016. 被引量:33
  • 3钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(B12):2421-2424. 被引量:10
  • 4何友,王国宏,陆大劲,等.多传感器信息融合及应用[M].北京:电子工业出版社,2010:230-231.
  • 5文成林,徐晓滨.多源不确定信息融合理论及应用[M].北京.科学出版社,2012.134.
  • 6Aven T,Zio E. Some Considerations on the Treatment of Uncertainties in Risk Assessment for Practical Decision Making [ J ]. Reliability Engineering and System Safety, 2011, 96(1): 64-74.
  • 7Joslyn C, Kreinovich V. Convergence Properties of An Interval Probabilistic Approach to System Reliability Es- timation[ J]. International Journal of General Systems , 2005, 34(4): 465-482.
  • 8Hafaifa A, Laaouad F, Guemana M. A New Engineering Method for Fuzzy Reliability Analysis of Surge Control in Centrifugal Compressor [ J ]. American Journal of Engi- neerinig and Applied Sciences, 2009, 2(4) :676-682.
  • 9Guo H, Xia Z, Chen L, et al. Estimation of Reliability with Hybrid Uncertainties in the Unified Framework of Random Set Theory [ C ]. Intelligent Computation Tech- nology and Automation,2009.
  • 10ICICTA'09. Second Inter- national Conference on IEEE ,2009,2:507-512.

引证文献12

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部