期刊文献+

有限先验情景下的隐写分析技术研究

Research on Stegnanlytic Techniques Under the Condition of Limited Prior Knowledge
下载PDF
导出
摘要 作为隐写技术的对抗手段,隐写分析主要致力于检测、阻止甚至破坏互联网上可能存在的基于隐写的隐蔽通信行为.实用隐写分析技术的研究,对打击恐怖组织及不法分子对隐写技术的滥用、维护国家安全和社会稳定具有重要的意义.首先阐述了隐写分析技术的研究意义及研究现状,然后,从需求极为迫切的图像隐写分析切入,针对有限先验信息的情境,提出新的隐写分析研究框架.以海量多样代表性样本数据为研究对象,重点研究具有超完备性的隐写分析特征基构造方法,利用超完备特征基对测试样本进行表示,根据表示系数对隐写方法进行预测,为研制准确性更高、实用性更强的隐写分析方法提供理论和技术支撑. Steganalysis, as the countermeasure of steganography, mainly concentrates on the detection , prevention and destruction of the possible steganography based on covert communication behaviors on the Internet. Research in practical steganographic analysis technology plays an important role in fighting against the steganography abuse by terrorist groups and criminals and maintaining national security and social stability. This paper firstly introduces the research significance and related works in the past, and then proposes the new steganalysis framework to address urgently needed image steganalysis with limited prior knowledge. Taking plentiful, multiple and typical data as study objects, this paper focuses on studying the methods to construct over-completed steganographic analysis feature bases . using these feature bases to represent testing samples and predicting the steganography method of testing samples according to the representing coefficients, which provides theoretical and technical support for developing steganalysis schemes with higher accuracy and better practicality.
出处 《信息安全研究》 2016年第10期888-895,共8页 Journal of Information Security Research
基金 国家自然科学基金项目(61402079)
关键词 隐写分析技术 隐写分析框架 有限先验知识 特征基 表示系数 stegnanlytic technique steganalysis framework limited prior knowledge feature bases representing coefficients
  • 相关文献

参考文献3

二级参考文献54

  • 1刘劲,康志伟,何怡刚.一种基于小波对比度和LSB的密写[J].电子学报,2007,35(7):1391-1393. 被引量:19
  • 2Cox I,Kilian J,Leighton T,et al.Secure spread spec-trum watermarking for multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673-1687.
  • 3Marvel L M,Boncelet C G,Retter C T.Spread spectrum image steganography[J].IEEE Transactions on Image Processing,1999,8(8):1075-1083.
  • 4Fridrich J,Goljan M.Digital image steganography using stochastic modulation.Proceedings of SPIE-The International Society for Optical Engineering.Santa Clara:SPIE,2003.191-202.
  • 5Harmsen J J,Pearlman W A.Steganalysis of additive noise modelable information hiding.Proceedings of SPIE-The International Society for Optical Engineering.Santa Clara:SPIE,2003.131-142.
  • 6Wang Y,Moulin P.Steganalysis of block-structured stegotext.Proceedings of the SPIE-The International Society for Optical Engineering.San Jose:SPIE,2004.477-488.
  • 7Chandramouli R.Subbalakshmi K P.Active steganalysis of spread spectrum image steganography.Proceedings of the 2003 IEEE International Symposium on Circuits and Systems.Bangkok:IEEE,2003.830-833.
  • 8Ji R R,Yao H X,Liu S H,et al.A new steganalysis method for adaptive spread spectrum steganography.Proceedings-2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Pasadena:IEEE,2006.363-368.
  • 9Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis of spread spectrum data hiding exploiting cover memory.Proceedings of SPIE-The International Society for Optical Engineering.San Jose:SPIE,2005.38-46.
  • 10Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to images[J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-287.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部