期刊文献+

基于富模型的分层量化隐写分析算法 被引量:2

Layered quantitative steganalysis using rich model
下载PDF
导出
摘要 针对目前量化隐写分析对嵌入率较低的图像检测效果不好的问题,提出了一种分层量化隐写分析的思想。采用与负载值大小变化相关的权重系数构成的损失函数进行检测,并估计出负载值变化区间,然后对评估后的结果进行分段,使用增大相应分段权值的损失函数进行二次检测。实验结果表明,与经典的梯度增量树的算法比较,提出的加权思想以及分层检测法对负载值低的图像检测效果有所提升,整体检测具有较高的准确率。 Concerned with the bad effect of the detection of the images with lower embedding rate under the current quantita- tive steganalysis,this paper proposed a method of layered quantitative steganalysis. It initially used loss function consisted of changing weight coefficient related to payload value for testing to detect and estimate the payload range. Then it segmented the results of assessment into several parts, and used the loss function of increasing corresponding piecewise weight for a second de- tection. The experimental results show that, compared with classical gradient boosting tree algorithm, the detection effect of pro- posed algorithm for lower payload image is better improved, and the overall detection has higher accuracy.
出处 《计算机应用研究》 CSCD 北大核心 2016年第1期255-257,265,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61379152)
关键词 量化隐写分析 分层检测法 损失函数 梯度增量 负载值 quantitative steganalysis layered detection loss function gradient boosting payload
  • 相关文献

参考文献12

  • 1Fridrich J,Goljan M.On estimation of secret message length in LSB steganography in spatial domain[C] //Proc of SPIE,vol 5306.2004.
  • 2Pevny T,Fridrich J,Ker A D.From blind to quantitative steganalysis[J].IEEE Trans on Information Forensics and Security,2011,7(2):445-454.
  • 3孙子文,李慧.基于偏最小二乘回归建模的量化隐写分析[J].系统仿真学报,2013,25(4):709-713. 被引量:2
  • 4LUO XiangYang,LIU FenLin,YANG ChunFang,LIAN ShiGuo.Modification ratio estimation for a category of adaptive steganography[J].Science China(Information Sciences),2010,53(12):2472-2484. 被引量:2
  • 5Fridrich J,Kodovsky J.Rich models for steganalysis of digital images[J].IEEE Trans on Information Forensics and Security,2012,7(3):868-882.
  • 6Kodovsky J,Fridrich J.Quantitative steganalysis using rich models[C] //Proc ofSPIE,vol 8665.2013.
  • 7Kodovsky J,Fridrich J,Holub V.Ensemble classifiers for steganalysis of digital media[J].IEEE Trans on Information Forensics and Security,2012,7(2):432-444.
  • 8Friedman J H.Greedy function approximation:a gradient boosting machine[J].Annals of Statistics,2000,29(5):1189-1232.
  • 9Bas P,Filler P,Penvy P.Break our steganographic system:the ins and outs of organizing BOSS[C] //Proc of the 13th International Workshop on Information Hiding.2011.
  • 10Gül G,Kurugollu F.A new methodology in steganalysis:breaking highly undetectable steganograpy(HUGO)[C] //Proc of the 13th International Workshop on Information Hiding.2011:71-84.

二级参考文献23

  • 1张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报,2005,17(7):1625-1629. 被引量:20
  • 2HE Junhui1,2 & HUANG Jiwu1,2 1. School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China,2. Guangdong Province Key Laboratory of Information Security, Guangzhou 510275, China.Steganalysis of stochastic modulation steganography[J].Science in China(Series F),2006,49(3):273-285. 被引量:3
  • 3Tomas Pevny, Jessica Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis [C]//E J Delp, P W Wong, editors, Proc. SPIE 6505, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007. USA: SPIE, 2007.
  • 4Shi Yunqing, Xuan Guorong, Zou Dekun, et al. Image Steganalysis Based on Moments of Characteristic Function Using Wavelet Decomposition, Prediction-Error Image, and Neural Network [C]// Proc. Multimedia and Expo, 2005, IEEE International Conference on ICME 2005. USA: IEEE, 2005.
  • 5Jessica Fridrich, Miroslav Goljan, Rui Du. Reliable detection of LSB steganography in color and grayscale images [C]// ACM workshop on multimedia and security: new challenges, Ottawa, Ontario, Canada. New York, USA: ACM Press, 2001: 27-30.
  • 6Dumitrescu S, Wu X L, Wang Z. Detection of LSB steganography via sample pair analysis [C]// IEEE Transactions on Signal Processing 51. USA: IEEE, 2003: 1995-2007.
  • 7Jessica Fridrich, David Soukal, Miroslav Goljan. Maximum likelihood estimation of length of secret message embedded using ±K steganography in spatial domain [C]// Proc of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, CA, USA: SPIE, vol.5681, 2005: 595-606.
  • 8Sanjay Kumar Jena, G V V Krishna. Blind Steganalysis: Estimation of Hidden Message Length [J]. Proc of International Journal of Computers, Communications & Control (S1841-9836), 2007, 2(2): 149-158.
  • 9Yu Xiaoyi, Wang Aiming. Detection of Quantization Data Hiding [C]// Proc. of 2009 International Conference on Multimedia Information Networking and Security (MINES '09), Hubei, China. USA: IEEE, 2009: 45-47.
  • 10Tomas Pevny, Jessica Fridrich, A D Ker. From Blind to Quantitative Steganalysis [C]//Proc. SPIE, Electronic Imaging, Media Forensics and Security XI. San Jose, CA, USA: SPIE, 2009: 1-14.

共引文献2

同被引文献10

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部