期刊文献+

基于双边转移概率矩阵的JPEG图像隐写检测

Steganalysis of JPEG images based on bilateral transition probability matrix
下载PDF
导出
摘要 针对当前基于JPEG图像的典型隐写算法,基于离散余弦变换(DCT)域分块内及分块间相邻系数之间的相关性进行分析,通过将相邻三个系数的中间位置的系数作为条件,统计两边系数的条件分布概率矩阵,将提取的所得矩阵作为隐写检测敏感特征,提出了一种基于DCT系数双边转移概率分布的JPEG图像隐写检测算法。实验结果表明,在不同嵌入率下,该算法的检测性能均优于已有检测算法。 For the typical steganographic algorithms in JPEG images,this paper firstly analyzed the correlation between neighboring coefficients of intra-and inter-block in Discrete Cosiine Transform(DCT) domain,and then extracted the conditional distribution probability matrix of the bilateral coefficients as the sensitive steganalytic features by taking the middle coefficient of three neighboring coefficients as the condition.At last,this paper proposed a JPEG image steganalytic algorithm on a basis of bilateral transition probability distribution of DCT coefficients.The experimental results show that,for different embedding ratios,the algorithm proposed in this paper outperforms the existing algorithms.
作者 赵艳丽 王兴
出处 《计算机应用》 CSCD 北大核心 2013年第4期1074-1076,1107,共4页 journal of Computer Applications
基金 河南省重点攻关项目(082102210067 112102210408)
关键词 隐写 JPEG图像 系数相关性 双边转移概率 隐写检测 steganography JPEG image coefficients correlation bilateral transition probability steganalysis
  • 相关文献

参考文献1

  • 1HUANG FangJun1,2 & HUANG JiWu1,2 1 School of Information Science and Technology,Sun Yat-Sen University,Guangzhou 510275,China,2 Guangdong Key Lab. of Information Security Technology,Sun Yat-Sen University,Guangzhou 510275,China.Calibration based universal JPEG steganalysis[J].Science in China(Series F),2009,52(2):260-268. 被引量:8

二级参考文献10

  • 1Shi Y Q,Xuan G,Zou D, et al.Steganalysis based on mo-ments of characteristic functions using wavelet decomposition, prediction-error image, and nerual network[].International Conference on Multimedia and Expro.2005
  • 2Fridrich J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[].Information Hiding th International Workshop.2004
  • 3Shi Y Q,Chen C,Chen W.A Markov process based approach to e?ective attacking JPEG steganography[].Information Hiding th International Workshop.2007
  • 4Fu D,Shi Y Q,Zou D, et al.JPEG steganalysis using em-pirical transition matrix in blick DCT domain[].Interna-tional Workshop on Multimedia Signal Processing.2006
  • 5http://photogallery.nrcs.usda.gov .
  • 6Sallee P. http://redwood.ucdavis.edu/phil/demos/jpegtbx/jp-egtbx.htm .
  • 7Fridrich J,Goljan M,Hogea, D.Steganalysis of JPEG images: Breaking the F5 algorithm[].Information Hiding th Inter-national Workshop.2003
  • 8A.Westfeld.High capacity despite better steganalysis(F5-A steganographic algorithm)[].Proceedings of theth International Workshop on Information Hiding.2001
  • 9SALLEE P.Model-based methods for steganographyand steganalysis[].International Journal of Image andGraphics.2005
  • 10Provos N.Defending against statistical steganalysis[].th USENIX Security Symposium.2001

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部