期刊文献+

基于GMM模型的自适应扩频隐写安全性分析

Security Analysis of Adaptive Spread Spectrum Image Steganography Based on Gaussian Mixture Model
下载PDF
导出
摘要 对自适应隐写的安全性问题进行分析,提出一种基于自然图像的高斯混合模型分析方法。在总嵌入强度相同的条件下,比较自适应和非自适应扩频隐写载密随机变量概率密度函数的特征函数,验证自适应扩频隐写的统计安全性高于等嵌入强度下非自适应扩频隐写。分析结果表明,该方法能为提升信息隐藏系统的抗统计分析性能提供理论依据。 Aiming at the security problem of adaptive steganography,the analysis method based on Gaussian mixture model(GMM) of real image is proposed.Compared the stego random characteristic function of probability density function between the adaptive Spread Spectrum Image Steganography(SSIS) and the general non adaptive one under the condition that the total embedding intensity is equal,it demonstrates that the security of adaptive SSIS is higher than that of non-adaptive schemes.Analysis result shows that the method provides theoretical evidence for using adaptive scheme to improve statistical imperceptibility of steganography.
出处 《计算机工程》 CAS CSCD 2012年第1期137-139,共3页 Computer Engineering
关键词 自适应隐写 安全性分析 高斯混合模型 扩频隐写 KL散度 adaptive steganography security analysis Gaussian Mixture Model(GMM) Spread Spectrum Image Steganography(SSIS) Kullback-Leibler(KL) divergence
  • 相关文献

参考文献9

  • 1Cachin C. An Information-theoretic Model for Steganography[C]// Proc. of the 2rid International Workshop on Information Hiding. Berlin, Germany: Springer, 1998.
  • 2Koval O, Voloshynovskiy S, Holotyak T, et al. Information- theoretic Analysis of Steganalysis in Real Images[C]//Proc. of the 8th Workshop on Multimedia and Security. New York, USA: ACM Press, 2006.
  • 3Ker A D. Estimating Steganographic Fisher Information in Real Images[C]//Proc. of the 11th International Workshop on Information Hiding. Berlin, Germany: Springer Verlag, 2009.
  • 4孙怡峰,刘粉林.Gauss-Markov载体下扩频隐写的抗检测性能分析[J].数据采集与处理,2010,25(4):462-468. 被引量:4
  • 5Wu Dachun, Tsai W H. A Steganographic Method for Images by Pixel-value Differencing[J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
  • 6Zhang Xinpeng, Wang Shuozhong. Steganography Using Multiple- base Notational System and Human Vision Sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1): 67-70.
  • 7谢建全,阳春华.大容量的信息隐藏算法[J].计算机工程,2008,34(8):167-169. 被引量:10
  • 8Pevny T, Filler T, Bas E Using High-dimensional Image Models to Perform Highly Undetectable Steganography[C]//Proc. of the 12th International Workshop on Information Hiding. Berlin/Heidelberg, Germany: Springer Verlag, 2010.
  • 9Wang Ying, Moulin R Optimized Feature Extraction for Learning- based Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1): 31-45.

二级参考文献27

  • 1Kodovsky J,Fridrich J.Influence of embedding strategies on security of steganographic methods in the JPEG domain[C]//Proc Security,Forensics,Steganography,and Watermarking of Multimedia Contents X,SPIE 6819.[S.l.]:SPIE-IS&T,2008:02-1-02-13.
  • 2Chadramouli R,Memon N D.Steganography capacity:a steganalysis perspective[C]//Proc Security,Steganography,and Watermarking of Multimedia Contents V,SPIE 5020.[S.l.]:SPIE-IS&T,2003:173-177.
  • 3Katzenbeisser S,Petitcolas F A P.Defining security in steganographic systems[C]//Proc Security,Steganography,and Watermarking of Multimedia Contents IV,SPIE 4675.[S.l.]:SPIE-IS&T,2002:260-268.
  • 4Hopper N J,Langford J,Ahn L.Provably secure steganography[C]//Proc Advances in Cryptology'02,LNCS 2442.Heidlberg:Springer-Verlag,2002:77-92.
  • 5Cachin C.An information-theoretic model for steganography[C]//Proc IH'98,LNCS 1525.Heidlberg:Springer-Verlag,1998:306-318.
  • 6Wang Y,Moulin P.Perfectly secure steganography:capacity,error exponents,and code constructions[J].IEEE Transactions on Information Theory,2008,54(6):2706-2722.
  • 7Ker A D,Pevn y T.The square root law of stegan-ographic capacity[C]//Proc MM&Sec'08.Oxford:ACM,2008:107-116.
  • 8Filler T,Ker A D,Fridrich J.The square root law of steganographic capacity for Markov covers[C]//Proc Media Forensics and Security,SPIE 7254.[S.l.]:SPIE-IS&T,2009:08-1-08-11.
  • 9Koval O,Voloshynovskiy S,Holotyak T,et al.Information-theoretic analysis of steganalysis in real images[C]//Proc MM & Sec'06.Geneva:ACM,2006:11-16.
  • 10Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to image[J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-187.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部