期刊文献+

基于训练集构造的图像通用盲检测算法改进 被引量:1

Improvement of Image Universal Blind Detection based on Training Set Construction
下载PDF
导出
摘要 现有通用盲检测技术普遍存在泛化问题,导致检测器实用性大大下降。根据正交设计原则构建隐写率失匹配集合,隐写算法失匹配集合和图像源失匹配集合,分别分析检测SPAM分析算法和Rich Model分析算法在隐写率失匹配,隐写算法失匹配和图像源失匹配方面的检测率。并根据测试结果提出通过训练小隐写率图像集,训练多类隐写算法,图像预分类和改进IQM分析算法几种方案解决泛化问题,实验结果显示经过改进后隐写分析算法性能得到明显提升。 The practicability of existing universal blind detection reduced greatly due to the generalization problem. Ac- cording to the principle of orthogonal design, this paper builds three sample sets of embedding rates mismatch, embed- ding algorithms mismatch and image sources mismatch between the training sample and the testing sample. The three sets are used to test the detection error rates of SPAM and Rich Model in the case of embedding rates mismatch, embed- ding algorithm mismatch and image source mismatch. This paper proposed several methods to improve the generalization ability of the universal blind detection, including training the sample by small embedding rates, learning various kinds of embeddingalgorithms, pre-elassifying the testing sample and improving the IQM algorithm. The results show that the that the performance of the improved algorithm is significantly improved.
出处 《成都信息工程学院学报》 2016年第1期70-75,共6页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(61310306028) 浙江省自然科学基金资助项目(Y15F020053)
关键词 通用盲检测 泛化能力 SPAM RICH MODEL 实用性 universal blind detection generalization ability SPAM rich model practicability
  • 相关文献

参考文献17

  • 1Dumitrescu S, Wu X L, Wang Z. Detection ofLSB Steganography via Sample Pair Analysis[ J].IEEE Trans, on Signal Processing, 2003, 51(7): 1995 - 2007.
  • 2Zhihua Xia, Xinhui Wang, Xingming Sun, et al.Steganalysis of least significant bit matching usingmulti-order differences[ J]. Security and Commu-nication Networks, 2014,7(8) : 1283-1291.
  • 3Zhihua Xia, Xinhui Wang, Xingming Sun, et al.Steganalysis of LSB matching using differences be-tween nonadjacent pixels [ C ]. Multimedia Toolsand Applications ,2014.
  • 4万宝吉,张涛,侯晓丹,朱振浩.基于Boosting算法融合的图像隐写分析方法[J].计算机工程,2013,39(12):148-151. 被引量:1
  • 5Pevny T, Bas P,Fridrich J. Steganalysis by Sub-tractivePixel AdjacencyMatrix [ J ]. IEEE Transac-tions onlnformation Security and Forensics, 2010,5(2): 215-224.
  • 6Fridrich J, Kodovsky J. Rich Models for Steganal-ysis of Digital Images [ J ]. IEEE Transactions onInformation Forensics and Security, 2012,7(3).
  • 7Kodovsky J, Fridrich J, Holub. V. : EnsembleClassifiers for Steganalysis of Digital Media. IEEETrans [ J ]. Information Forensics Security, 2011.
  • 8Kodovsky J, Pevny T, Fridrich J. Modem stega-nalysis can detect YASS[C]. In Proc. SPIE, E-lectronic Imaging, Security Forensics of Multime-diaXII,San Jose, CA, 2010, 7541:201-211.
  • 9Breiman L. Random forest[ J]. Machine Learn-ing, 2001, 45(l);5-32.
  • 10Filler T,Pevny T,Bas P. BOSS ( Break OurSteganography System) 2014 [EB/OL]. Availa-ble : http ://agents, fel. cvut. cz/stegodata/Boss-Base-1. 01 -cover, tar. bz2,2014.

二级参考文献17

  • 1Petitcolas P,Anderson J,Kuhn G.Information Hiding——A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2Sharp T.An Implementation of Key-based Digital Signal Steganography[C]//Proc.of the 4th Information Hiding Workshop.Berlin,Germany:Springer-Verlag,2001:13-26.
  • 3Wu D,Tsai W.A Steganographic Method for Images by Pixel-value Differencing[J].Pattern Recognition Letters,2003,24(9-10):1613-1626.
  • 4Kawaguchi E,Eason R O.Principle and Applications of BPCS Steganography[J].Multimedia Systems and Applications,1999,3528(1):464-473.
  • 5Cheng Hsing-Yang,Chi Yao-Weng.Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
  • 6Upham D.JPEG-JSteg-V4[EB/OL].(2007-06-01).http://www.funet.fi/pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.
  • 7Westfeld A.F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis[C]//Proc.of the 4th International Workshop on Information Hiding.New York,USA:[s.n.],2001:289-302.
  • 8Sallee P.Model-based Steganography[C]//Proc.of the 2nd International Workshop on Digital Watermarking.New York,USA:Springer-Verlag,2003:154-167.
  • 9Sallee P.Model-based Methods for Steganography and Steg-analysis[J].International Journal of Image and Graphics,2005,5(1):167-189.
  • 10Kovovsky J,Fridrich J,Pevny T.Statistically Undetectable JPEG Steganography:Dead Ends,Challenges,and Opportunities[C]//Proc.of the 9th ACM Multimedia & Security Workshop.Dallas,USA:[s.n.],2007:3-14.

同被引文献10

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部