期刊文献+

基于差分统计量的MP3Stego隐写分析算法 被引量:2

MP3 Steganalysis based on difference statistics
下载PDF
导出
摘要 通过深入剖析MP3Stego隐写原理,提出了针对MP3Stego隐写检测的新方法。该方法对MP3Stego隐写操作后与隐写之前的量化步长进行对比研究,发现相邻颗粒之间量化步长会比未隐写时有更大的波动,其方差值明显的增大。利用此变化提取检测特征,经重压缩校正后通过模式分类进行隐写分析,实现了对MP3Stego的隐写检测。实验结果表明,所提出的隐写分析方法具有较好的检测准确率和检测性能。 A new method is proposed through analyzing Steganographic method of MP3Stego deeply. By comparing quantization steps before and after the operation of Steganography,it is found that after the operation,the quantization steps between adjacent particles would have greater volatility and its variance increases obviously. The difference statistics of quantization steps are extracted as the detection feature. Then Support Vector Machine is applied to realize the Steganalysis. Experimental results show that the proposed Steganalytic analysis method has good detection accuracy and detection performance.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第7期88-92,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61170137) 浙江省重点创新团队项目(No.2010R50009)
关键词 MP3Stego 隐写分析 量化步长 MP3Stego MP3Stego Steganalysis quantization steps
  • 相关文献

参考文献16

  • 1Kelley J.Terrorist instructions hidden online[N/OL].(2001) [2013-04-01].http ://www.usatoday.eom/tech/news/2001-02- 05-binladen-side.htm,2001.
  • 2王朔中,张新鹏,张开文.数字隐写和隐写分析一互联网时代的信息战技术[M].北京:清华大学出版社,2005.
  • 3Westfeld A, Pfitzmann A.Attacks on steganographic sys- tems[C]//Proceedings of International Workshop on Infor- mation Hiding, 1999 : 61-76.
  • 4邓倩岚,林家骏.基于统计的LSB隐写分析方法[J].计算机安全,2006(1):23-24. 被引量:2
  • 5Petitcolas F.MP3 Stego [EB/OL]. ( 2002 ) [2013-04-01 ].http: //www.petitcolas.net/fabien/steganography/mp3stego/.
  • 6Westfeld A.Detecting low embedding rates[C]//Proceedings of International Workshop on Information Hiding, 2003: 324-339.
  • 7Bohme R,Westfeld A.Feature-based encoder classification of compressed audio[J].Multimedia Systems, 2005, 11 (2) : 108-120.
  • 8宋华,幸丘林,李维奇,戴一奇.MP3Stego信息隐藏与检测方法研究[J].中山大学学报(自然科学版),2004,43(A02):221-224. 被引量:9
  • 9Ozer H, Sankur B, Memon N, et al.Detection of audio coven channels using statistical footprints of hidden messages[J]. Digital Signal Processing, 2006, l 6 ( 4 ) : 389-401.
  • 10Qiao M, Sung A, Liu Q.Feature mining and intelligent com- puting for MP3 steganalysis[C]//Proceedings of International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.Los Alamitos: IEEE Computer Society Press, 2009 ~ 627-630.

二级参考文献2

  • 1Bender W,Gruhl D,Morimoto N.Techniquesfor data hiding[].IBM Systems Journal.1996
  • 2梁敬弘,王道顺,黄连生,戴一奇.对MP3Stego的攻击研究[J].计算机辅助设计与图形学学报,2003,15(8):954-960. 被引量:7

共引文献9

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部