期刊文献+

大容量自适应隐写对抗的博弈研究 被引量:2

Game Research on Large-Payload and Adaptive Steganographic Counterwork
下载PDF
导出
摘要 攻击方拥有自适应规范边信息条件下,如何提高大容量自适应隐写的安全性成为亟待解决的问题.本文对大容量自适应隐写方和攻击方进行博弈建模,分析了博弈均衡存在的条件,通过理论证明给出均衡局势下隐写对抗双方的混合策略和期望支付,最后利用仿真实验验证了理论分析的正确性.研究表明,攻击方的策略与嵌入的信息量无关,期望支付随着嵌入信息量的增加而增加;隐写方选择在载体中某位置进行较多嵌入的概率随着该位置的复杂度增加而增加且不为零.该结论对设计安全的大容量自适应隐写具有一定的指导意义. Given that the attacker has the side information of adaptivity criterion,it is an urgent problem for the steganographer to improve the security of large-payload and adaptive steganography.This paper proposed a game-theoretic model for the tw o sides.Through theoretical derivation,w e provided the necessary conditions for game equilibrium,along w ith the mixed strategies and expected payoffs of the tw o sides in equilibrium.Results of numerical simulation validated the theoretical analysis.This research reveals that the attacker's strategy is independent of the number of hidden bits,and the expected payoff increases w ith the number of hidden bits.The probability that one position is selected by steganographer to embed more bits is alw ays greater than zero and increases w ith the complexity of that position.These conclusions bring some guidance for devising secure adaptive steganography w ith large payload.
作者 刘静 汤光明
出处 《电子学报》 EI CAS CSCD 北大核心 2014年第10期1963-1969,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.61101112) 中国博士后基金(No.2011M500775) 河南省科技攻关计划(No.122102210047)
关键词 隐写 博弈论 大容量 均衡局势 steganography game theory large-payload equilibrium
  • 相关文献

参考文献20

  • 1郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电子学报,2006,34(6):1048-1052. 被引量:17
  • 2H C Wu,N 1Wu,C S Tsai,M S Hwang. Image steganographicscheme based on pixel-value differencing and LSB replacement methods[J].IEEE Proceedings-Vision, Image arid Signal Pro- cessing,2005, 152(5) :611 - 615.
  • 3B Nguyen, S Yoon, H Lee. Muti bit plane image steganography [ A] .Proceedings of International Workshop on Digital Water- marking[ C]. Berlin: Springer, 2006.61 - 70.
  • 4C H Yang, C Y Weng, S J Wang, H M Sun. Adaptive data hid- ing in edge areas of images with spatial LSB domain systems [J].IEEE Transactions onnforrnation Forensics and Security, 2008,3(3) :488 - 497.
  • 5戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(B12):35-38. 被引量:10
  • 6W Hong. Adaptive image dam hiding in edges using patched reference table and pair-wise embedding technique[J]. Infor- mation Sciences,2013,221 ( 1 ) :473 - 489.
  • 7E Franz. Steganography preserving statistics properties [ A ]. Proceedings of 5th International Workshop on Information Hid- ing[ C]. Noordwijkerhout: Springer, 2002.278 - 294.
  • 8W Luo, F Huang, J Huang. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transaction on In- formation Forensics and Security, 2010,5 (2) : 201 - 214.
  • 9W Luo,F Huang,J Huang.A more secure steganography based on adaptive pixel-value differencing scheme [J]. Multimed Tools Application, 2011,52(2 - 3) :407 - 430.
  • 10T Pevny, T Filler, Bas P. Using high-dimensional image mod- els to perform highly undetectable steganography [ A ]. Pro- ceedings of 12th International Conference on Information Hid- ing[C]. Calgary: Springer, 2010.161 - 177.

二级参考文献73

  • 1张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 2何军辉,黄继武.彩色JPEG图像的隐写分析[J].电子学报,2005,33(B12):2543-2548. 被引量:4
  • 3HE Junhui1,2 & HUANG Jiwu1,2 1. School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China,2. Guangdong Province Key Laboratory of Information Security, Guangzhou 510275, China.Steganalysis of stochastic modulation steganography[J].Science in China(Series F),2006,49(3):273-285. 被引量:3
  • 4钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(B12):2421-2424. 被引量:10
  • 5PARK Y-R, KANG H-H, et al. A steganographic scheme in digital images using information of neighboring pixels [A]. Lecture Notes in Computer Scence(Advances in Natural Computation) [C]. Heidelbergpp: Springer Berlin, 2005.962 - 967.
  • 6PARK Y-R, KANG H-H,et al. An image steganography using pixel characteristics[ A]. Lecture Notes in Artificial Intelligence ( Computational Intelligence and Security) [ C]. Heidelbergpp: Springer Berlin,2005. 581 - 588.
  • 7ZHANG X P, WANG S Z, Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005,12( 1 ) :67 - 70.
  • 8YANG C Y, LIN J C, Image hiding by base-oriented algorithm [J]. Optical Engeering, 2006,45 ( 11 ) : 117001 - 1 - 117001 - 10.
  • 9WESTFELD A. Space filling curves in steganalysis[A]. Proccedings of SPIE: Security, Steganography and Watermarking for Multimedia[ C]. San Jose, California: SPIE, 2005.28 - 37.
  • 10VOLOSHYNOVSHIY S, PEREIRA S, et al. Attacking modelling: towards a second generation watermarking benckmark [J]. Signal Processing, 2001,81 (6) : 1177 - 1214.

共引文献35

同被引文献4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部