期刊文献+

通用隐写分析算法的研究

Universal Steganalysis Algorithm Research
下载PDF
导出
摘要 该文提出了一种基于小波变换和支持向量机分类的隐写分析算法、算法采用图象小波分解后的各子带系数的高阶统计量作为自然图象统计属性,利用支持向量机构造分类器完成对裁密图象和自然图象的分类。并对提出的算法进行了测试.达到了预期的效果。 In this paper, a steganalysis algorithm based on wavelet transform and support vector machine classification is intro- duced. In the algorithm,higher-order statistics of each sub-band coefficients after image wavelet decomposition act as natural im- age statistics properties and classification of stego-image and natural images are completed by using support vector machines for the classifier. The proposed algorithm is tested and good results are achieved.
作者 魏瑞 WEI Rui (School of Physics and Telecommunication Engineering, Shaanxi University of Technolog3,, Hanzhong 7230(10, China)
出处 《电脑知识与技术》 2012年第9期6115-6117,6122,共4页 Computer Knowledge and Technology
基金 陕西理工学院科研项目(项目编号:SLGKY10-14)
关键词 隐写分析技术 小波变换 支持向量机 Steganalysis technique Wavelet transform Support Vector Machine
  • 相关文献

参考文献4

  • 1"Steganalysis Using Color Wavelet Statistics and One-Class Support Vector" Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA.
  • 2"Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines" Siwei Lyu and Hany Farid Dart- mouth College, Hanover NH 03755,USA,flsw,faridg@cs.dartmouth.edu,.
  • 3"Image Steganalysis With Banary Simil Arity Measures" Ismail Avcibas,Mehdi Kharrazi,Nasir Memon,Bulent Sankur.
  • 4梁小萍,何军辉,李健乾,黄继武.隐写分析——原理、现状与展望[J].中山大学学报(自然科学版),2004,43(6):93-96. 被引量:12

二级参考文献10

  • 1KELLEY J. Terror groups hide behind Web encryption[N].USA Today, Feb. 2001, http://www. usatoday. com./tech/news/2001 - 02 - 05 - binladen. htm.
  • 2WESTFELD A, PFITZMANN A. Attacks on steganographic systems [ C]. Proc. 3rd Int'l Workshop in Information Hiding. Springer Verlag, 1999:61 - 76.
  • 3FRIDRICH J, GOLJAN M, DU R. Reliable detection of LSB steganography in grayscale and color images [ C]. Proc.ACM, Special Session on Multimedia Security and Watermarking. Ottawa CA, 2001: 27- 30.
  • 4DUMITRESCU S, WU X L, WANG Z. Detection of LSB steganography via sample pair analysis[J]. IEEE Transactions on Signal Processing, 2003, 51(7): 1995 - 2007.
  • 5FRIDRICH J, GOLJAN M, HOGEA D. Steganalysis of JPEG images: breaking the F5 algorithm [ J]. 5th Information Hiding Workshop. Noordwijkerhout Netherlands, 2002: 10-323.
  • 6FRIDRICH J, GOLJAN M, HOGEA D. Attacking the OutGuess [ C ]. Proc. ACM Workshop Multimedia and Security. Juan- les- Pins, France, 2002.
  • 7LIU S H, YAO H X, GAO W. Steganalysis of data hiding techniques in wavelet domain [ C ]. International Conference on Information Technology: Coding Computing, ITCC. Las Vegas USA, 2004(1): 751-754.
  • 8AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics [ J ]. IEEE Transactions on Image Processing, 2003, 12(2): 221 - 229.
  • 9LYU S, FARID H. Steganalysis using color wavelet statistics and one-class support vector machines [ C ]. SPIE Symposium on Electronic Imaging. San Jose CA, 2004.
  • 10张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报,2004,15(1):151-158. 被引量:75

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部