期刊文献+

一种结合整数规划和YASS的图像隐写算法 被引量:2

An Image Steganography Algorithm Combined with Integer Programming and YASS
下载PDF
导出
摘要 为提高图像隐写率,在YASS算法的基础上,提出一种改进的图像隐写算法。分析不同图像分块离散余弦变换系数之间的固有联系,借鉴整数规划的思想设计迭代算法,对已隐写的载体进行数据校正。使用98维马尔科夫通用图像检测方法进行实验,结果表明,该算法能减少YASS隐写过程中由JPEG图像压缩引入的误码,提高隐写率,同时可有效抵抗通用隐写检测。 In order to increase the steganography rate, this paper proposes a new scheme of steganography which is based on YASS algorithm. After discussing the inherent relationship between Discrete Cosine Transform(DCT) coefficients in different blocks, a method of iterative programming is proposed which is referenced to integer programming, and the carrier which has steganography has been corrected. In aspect of anti-detection, 98 degree's Markov steganalysis method is used to detect the stego images. Experimemal result shows that this optimization algorithm is proved to effectively decrease the errors caused by JPEG compression during YASS steganography. In this way, steganographic rate is increased to a great extent. This method is also proved to get the same outstanding performance in common anti-detection.
出处 《计算机工程》 CAS CSCD 2013年第10期147-150,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60702043)
关键词 YASS算法 图像隐写 整数规划 JPEG图像 离散余弦变换 YASS algorithm image steganography integer programming JPEG image Discrete Cosine Transform(DCT)
  • 相关文献

参考文献10

  • 1Pevn, T, Filler T, Bas P. Using High-dimensional Image Models to Perform Highly Undetectable Steganography[C]// Proc. of the 12th International Workshop on Information Hiding. Calgary, Canada: Springer-Vedag, 2010.
  • 2Solanki K, Sarkar A, Manjunath B S. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis[C]/! Proc. of the 9th International Workshop on Information Hiding. Saint Malo, France: Springer-Verlag, 2007.
  • 3Fridrich J. Feature Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes[C]//Proc. of the 6th Workshop on Information Hiding. Toronto, Canada: Springer-Verlag, 2004.
  • 4Sarkar A, Solanki K, Manjunath B S. Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis[C]//Proc. of SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents X. San Jose, USA: SPIE, 2008.
  • 5Yu Lifang, Zhao Yao, Ni Rongrong, et al. A High-performance YASS-like Scheme Using Randomized Big-blocks[C]//Proc. of IEEE International Conference on Multimedia and Expo. Singapore: IEEE Press, 2010.
  • 6Li Bin, Shi Yunqing, Huang Jiwu. Steganalysis of YASS[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 369-382.
  • 7刘洪,王建军.一种新的YASS的隐写分析方法[J].复旦学报(自然科学版),2009,48(4):443-450. 被引量:4
  • 8雷雨,杨晓元,潘晓中,郭敦陶.基于局部随机性的YASS隐写分析方法[J].计算机学报,2010,33(10):1997-2002. 被引量:4
  • 9Abbasfar A, Divsalar D, Kung Y. Accumulate Repeat- accumulate Codes[J]. IEEE Transactions on Communications, 2007, 55(4): 692-702.
  • 10Chang Shih-Fu, David G. Manipulation and Compositing of MCDCT Compressed Video[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(1): 1-11.

二级参考文献26

  • 1Westfeld A. F5-a steganographic algorithm: high capacity despite better steganalysis [C] // Proceedings of 4th International Workshop on Information Hiding. Pittsburgh, USA: Springer, 2001.
  • 2Provos N. Defending against statistical steganalysis [C] // Proceedings of 10th USENIX Security Symposium, Berkeley. CA, USA: USENIX Association, 2001.
  • 3Sallee P. Model-based methods for steganography and steganalysis [J]. International Journal of Image and Graphics, 2005,5(1) : 167-190.
  • 4Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [C] /// Proceedings of 6th information Hiding Workshop. Toronto, ON, Canada: Springer 2004.
  • 5Yun-qing Shi, Chun-hua Chen, Wen Chen. A Markov process based approach to effective attacking JPEG Steganography [C] // Proceedings of the 8-th Information Hiding Workshop. Saint Malo. Brittany, France: Springer, 2006.
  • 6Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis [C]// Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, CA, USA: SPIE, 2007.
  • 7Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resists blind steganalysis [C] // Proceedings of 9th International Workshop on Information Hiding. Saint Malo, Brittany France: Springer, 2007.
  • 8Sarkar A, Solanki K, Manjunath B S. Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis [C] //Proc SPIE-Security, Steganography, and Watermarking of Multimedia Contents ( X ). San Jose, CA, USA: SPIE, 2008.
  • 9Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [C]// Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII. San Jose, CA, USA: SPIE, 2006.
  • 10Kodovsky J, Fridrich J. Influence of embedding strategies on security of steganographic methods in the JPEG domain [C]// Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. San Jose, CA, USA: SPIE, 2008.

共引文献5

同被引文献14

  • 1Yu L F,Zhao Y,Ni RR,et al. A high-performance ASS- like scheme using randomized big-blocks [C]//IEEE International Conference on Multimedia and Expo (ICME). NewJersey: IEEEComputer Society, 2010:474-479.
  • 2Solanki K,SarkarA,ManjunathB S. YASS: Yet another steganographic scheme that resists blind steganalysis [C]// Proc. of the 9th International Workshop on Information Hiding. Berlin:Springer-Verlag, 2008:16-31.
  • 3Fridrich J. Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Proc. of 6th Information Hiding Workshop.Toronto, Canada, Springer, 2004.
  • 4Li B,Huang J W,Shi YQ. Steganalysisof YASS [J]. IEEE Transactionson Information Forensics and Security,2009,4 (3):369-382.
  • 5Li B, Huang J W,Shi YQ. Steganalysis of YASS [J]. IEEE TransACtionson Information Forensics and Security,2009,4 (3) :369-382.
  • 6Pevn'y T,Fridrich J. Merging Markovand DCT features for multi-class JPEGsteganalysis[C]//Proceedings of the Interna- tional Society for Optical Engineering. Bellingham, Wash- ington: SPIE,2007:I-13.
  • 7刘九芬,王勇,张卫明.基于MME和IRB的信息隐写算法[J].计算机工程与设计,2011,32(2):457-459. 被引量:1
  • 8曾凡培.粗集神经网络在网络入侵中的应用研究[J].计算机仿真,2011,28(7):161-164. 被引量:5
  • 9马丽红,李晓,吕先明.基于虚拟嵌入块和量化器原点抖动的YASS改进算法[J].华南理工大学学报(自然科学版),2013,41(1):38-46. 被引量:2
  • 10黄辉.基于TDD-LTE技术的城市轨道交通车地无线通信网络化技术[J].城市轨道交通研究,2016,19(4):29-33. 被引量:20

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部