期刊文献+

基于区域相关性的JPEG图像隐写盲检测方法 被引量:3

Regional Correlation Based Blind Detection of JPEG Image Steganography
下载PDF
导出
摘要 针对JPEG压缩算法,分析了DCT系数的分布特点和统计特征以及块内和块间系数的相关性,提出一种基于区域相关性的JPEG图像隐写盲检测算法。采用宏观校准和微观校准估计出载体图像,以Markov模型描述块内和块间DCT系数的相关性,提取概率转移矩阵的差值作为检测特征,通过支持向量机进行分类,实现了对DCT域多种隐写算法的检测。混合图像库的实验结果表明,该方法的检测性能优于典型的隐写分析算法。 Targeting at current compression algorithms for JPEG images, the distribution and statistical features as well as intra-block and inter-block correlations of Discrete Cosine Transform(DCT) coefficients are analyzed in depth. A blind steganalysis approach for JPEG images based on region correlation is proposed. First, macroscopic and microscopic calibrations are combined to estimate cover images. Then, intra-block and inter-block correlations of DCT coefficients are described according to the Markov model. Finally, the differences of transition probability matrices are extracted as characteristics for detection, which are classified by a support vector machine. Hence steganographic algorithms for JPEG images can be determined. Experiments on a mixed image database reveal that the proposed steganalyzer outperforms existing typical steganalyzers.
作者 李侃 平西建
出处 《信息工程大学学报》 2012年第3期306-311,共6页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(60970142)
关键词 隐写分析 转移概率矩阵 区域相关性 steganalysis transition probability matrix regional correlation
  • 相关文献

参考文献1

  • 1HUANG FangJun1,2 & HUANG JiWu1,2 1 School of Information Science and Technology,Sun Yat-Sen University,Guangzhou 510275,China,2 Guangdong Key Lab. of Information Security Technology,Sun Yat-Sen University,Guangzhou 510275,China.Calibration based universal JPEG steganalysis[J].Science in China(Series F),2009,52(2):260-268. 被引量:8

二级参考文献10

  • 1Shi Y Q,Xuan G,Zou D, et al.Steganalysis based on mo-ments of characteristic functions using wavelet decomposition, prediction-error image, and nerual network[].International Conference on Multimedia and Expro.2005
  • 2Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[].Information Hiding th International Workshop.2004
  • 3Shi Y Q,Chen C,Chen W.A Markov process based approach to e?ective attacking JPEG steganography[].Information Hiding th International Workshop.2007
  • 4Fu D,Shi Y Q,Zou D, et al.JPEG steganalysis using em-pirical transition matrix in blick DCT domain[].Interna-tional Workshop on Multimedia Signal Processing.2006
  • 5http://photogallery.nrcs.usda.gov .
  • 6Sallee P. http://redwood.ucdavis.edu/phil/demos/jpegtbx/jp-egtbx.htm .
  • 7Fridrich J,Goljan M,Hogea, D.Steganalysis of JPEG images: Breaking the F5 algorithm[].Information Hiding th Inter-national Workshop.2003
  • 8A.Westfeld.High capacity despite better steganalysis(F5-A steganographic algorithm)[].Proceedings of theth International Workshop on Information Hiding.2001
  • 9SALLEE P.Model-based methods for steganographyand steganalysis[].International Journal of Image andGraphics.2005
  • 10Provos N.Defending against statistical steganalysis[].th USENIX Security Symposium.2001

共引文献7

同被引文献43

  • 1朱秀明 宣国荣 姚秋明 等.基于EM算法的数字取证中图像重采样检测.哈尔滨工业大学学报,2006,38:868-871.
  • 2周琳娜,张茹,郭云彪.数字图像内容取证[M].北京:高等教育出版社.2011:81-109.
  • 3Popescu A C, Farid H. Exposing digital forgeries by detect- ing traces of resampling[J ]. IEEE Transactions on Signal Processing, 2005,53(2):758- 767.
  • 4Meng X, Niu S, Zou J. Tamper detection for shifted doubleJPEG compression[C]//Intelligent Information Hiding and Multimedia Signal Processing, 2010: 434 - 437.
  • 5Bianchi T, Piva A. Detection of non-aligned double JPEG compression with estimation of primary compression param- eters[ C]//18th IEEE International Conference on Image Processing, 2011 : 1929 - 1932.
  • 6Bianchi T, De Rosa A, Piva A. Improved DCT coefficient analysis for forgery localization in JPEG images[ C]//IEEE International Conference on Acoustics, Speech and Signal Processing, 2011 : 2444 - 2447.
  • 7CHEN Chunhua, Shi Yun Q, Wei Su. A machine learning based scheme for double JPEG compression detection[C]// 19th International Conference on Pattern Recognition, 2008 : 1 - 4.
  • 8ChenY L,Hsu C T. Detecting recompression of JPEG im- ages via periodicity analysis of compression artifacts for tampering detection[J ]. IEEE Transactions on Information Forensics and Security, 2011,6(2) :396 -406.
  • 9LIU Zhulong, LI Xianghua, ZHAO Yuqian. Passive detec- tion of copy-paste tampering for digital image forensics [C]//International Conference on Intelligent Computation Technology and Automation, 2011,2 : 649 - 652.
  • 10Barni M, Costanzo A, Sabatini L. Identification of cut & paste tampering by means of double-JPEG detection and image grnentation [ C] //Proceedings of 2010 IEEE In- ternational Symposium on Circuits and Systems, 2010: 1687 - 1690.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部