期刊文献+

一种基于相邻像素差值的隐写分析方法

Steganalysis Method Based on the Difference of Adjacent Pixels
下载PDF
导出
摘要 首先介绍BMP文件结构及特点,基于相邻像素相关的特性,提出了一种新的针对LSB替换的隐写分析算法.分别从横向和纵向扫描图像像素并统计相邻像素之间差值,然后根据差值奇偶和的比值对图像是否含有隐秘信息进行判断.实验编程环境为VS2008,实验结果表明此检测算法统计量小、实现简单,在隐秘信息嵌入量较多时具有较高检测率. This dissertation first introduces the structure and characteristic of BMP file. Based on the features of adjacent pixels, a steganalysis algorithm for the replacement of LSB is proposed. Scanning and counting the difference of adjacent pixels horizontally and vertically are the first step, and then this thesis judges whether the image contains secret information according to the ratio of odd and even. The development environment is VS2008, and the experiment shows that the algorithm can be simply applied with a small statistics. In addition, the new algorithm has a high detection capability with a large amount of secret information.
作者 张淞 范明钰
出处 《计算机系统应用》 2012年第11期183-186,共4页 Computer Systems & Applications
基金 国家高技术研究发展计划(863)(2009AA01Z403)
关键词 隐写分析 BMP文件 相邻像素 steganalysis BMP file adjacent pixels
  • 相关文献

参考文献13

  • 1Li B, Fang YM, Huang JW. Steganalysis of Multiple-Base Notational System SteganograPhy. IEEE Signal Processing Letters. 2008, 15: 493-496.
  • 2Yang CF, Liu FL, Luo XY, Liu B. Steganalysis Frameworks of Embedding in Multiple Least-Signifieant Bits. IEEE Trans. on Information Forensies and Secunty. 2008, 3(4):662-672.
  • 3Westfeld A, Pfitzmann A. Attacks on steganographic systems. Proceedings of Information Hiding, Third International Workshop. Berlin: Springer-Verlag, 2000:61-67.
  • 4Fridrich J, Goljanm DR. Detecting LSB stegano graphy in color and grayscale images. IEEE Multrniedia, 2001, 8(4): 22-28.
  • 5Fridrich J, Du R, Meng L. Steganalysis of LSB encoding in color images. Proe. of IEEE International Conference on Multimedia and Expo. New York, 2000: 1279-1282.
  • 6Dumitreseu S, Wu XL, Wang Z. Detection of LSB SteganograPhy via Sample Pair Analysis. IEEE Trans. on Signal Processing, 2003,51(7): 1995-2007.
  • 7张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75
  • 8Zhang XP, Wang SZ, Zhang KW. Steganography with leasthistogram abnormality. Computer Network Security, Lecture Notes in Computer Science. Springer-Verlag, 2003: 395-406.
  • 9张新鹏,王朔中,张开文.数字密写和密写分析.北京:清华大学出版社,2005.
  • 10贾玉珍,靳冰,刘琮,王大海.BMP文件结构的信息隐藏方法与实现[J].江西理工大学学报,2009,30(1):42-44. 被引量:6

二级参考文献10

  • 1王丽君,周萍萍.基于真彩色图像的信息隐藏算法[J].光电子技术与信息,2005,18(6):44-48. 被引量:4
  • 2Jack T B, Stevcn L, Nicholas F M.Copyright Protection for the Eled Ronic Distribution of Text Documents [J]. Proceedings of the IEEE, 1999,87(7): 1181-1196.
  • 3StefanK Fabien APP.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001.
  • 4IngemarJ.Cox Matthew L. Miller Jeffrey A.Bloom著 王颖等译.Digital Watermarking[M].电子工业出版社,2003年7月第一版..
  • 5Katzenbeisser Stefan等著 吴秋新等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 6Donovan Artz. Digital Steganography: Hiding Data within Data[J]. Internet Computing, IEEE , Volume:5 , Issue: 3 , May-June 2001 Pages: 75-80.
  • 7.BMP位图格式介绍[EB/OL].http: //yangss. nease. net/usr/digital/help/Bmp3.doc.,.
  • 8Bruce Schneier. Applied Cryptography[M]. John Wiley &Sons,1996.
  • 9戴元军.信息隐藏与数字水印技术[DB/OL].http: //zbinfo. net/72342393386434560/20020129/209645_3.shtml.,.
  • 10杨义先,钮心忻.多媒体信息伪装综论[J].通信学报,2002,23(5):32-38. 被引量:46

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部