期刊文献+

图像LSB匹配隐藏的预分类检测模型 被引量:2

Using pre-classification to attack LSB matching
原文传递
导出
摘要 当前针对图像LSB匹配隐藏的各种检测方法跨数据集测试性能不佳,其检测效果对于JPEG压缩的和未压缩的图像往往差别很大。对两类图像的颜色空间分布进行了分析,利用量化的DCT交流系数的最高有效位重压缩后不再服从广义Benford定律的现象,查明图像的压缩历史,进而根据图像的通道数以及是否被压缩分别采取不同算法或相同算法的不同参数集合进行检测。实验结果表明,基于该检测模型能够有效提升算法的跨数据集检测能力,增强隐藏检测算法的实用性。 Most steganalysis methods for image LSB matching suffer from a drop in the performance when applied to different image databases, especially for JPEG-eompressed and uncompressed covers, which is also the main restriction to prevent steganalysis from practical usage. In this paper, we specify, the JPEG compression of a bitmap by taking advantage of the quantized DCT alternating coefficients, which no longer obey the Benford' s law very well. Then variations of steganalysis methods and parameter sets are exploited according to the number of channels and whether the image has been compressed before. The algorithms' performances get a great boost by the proposed working mode.
出处 《中国图象图形学报》 CSCD 北大核心 2013年第2期207-213,共7页 Journal of Image and Graphics
基金 国家自然科学基金项目(61170226) 中央高校基本科研业务费专项资金项目(SWJTU11CX047)
关键词 信息隐藏 隐写分析 LSB匹配 预分类 Benford定律 Information hiding Steganalysis LSB matching Pre-classification Benford' s Law
  • 相关文献

参考文献10

  • 1Harmsen J,Pearlman W. Steganalysis of additive noise modelable information hiding[A].Bellingham,WA:Society of Photo-Optical Instrumentation Engineers,2003.131-142.
  • 2Ker A D. Steganalysis of LSB matching in grayscaleimages[J].IEEE Signal Processing Letters,2005,(06):441-444.doi:10.1109/LSP.2005.847889.
  • 3Zhang J,Cox I J,Do~rr G. Steganalysis for LSB matching in images with high-frequency noise[A].Piscataway,NJ:IEEE,2007.385-388.
  • 4Zhang T,Li W X,Zhang Y. Steganalysis of LSB matching based on statistical modeling of pixel difference distributions[J].Information Sciences,2010,(23):4685-4694.
  • 5Westfeld A. Detecting low embedding rates[A].London:Springer-Verlag,2002.324-339.
  • 6Penvny T,Bas P,Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J].IEEE Transactions on Information Forensics and Security V,2010,(02):215-224.
  • 7Chang C,Lin C. LIBSVM:a library of support vector machine[J].ACM Transcations on Intelligent Systems and Technology,2011,(03):209-234.
  • 8Fu D,Shi Y Q,Su W. A generalized Benford'slaw for JPEG coefficients and its applications in image forensics[A].Bellingham,WA:Society of Photo-Optical Instrumentation Engineers,2007.1-11.
  • 9Pevny T,Fridrich J. Detection of double-compression in JPEG images for applications in steganography[J].IEEE Transactions on Information Security and Forensics,2008,(02):91-110.
  • 10Fan Z G,Queiroz R L de. Identification of bitmap compression history:JPEG detection and quantizerestimation[J].IEEE Transactions on Image Processing,2003,(02):230-235.

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部