期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
AMENDATORY DEFINITION OF SECURITY FOR STEGANOGRAPHIC SYSTEM 被引量:1
1
作者 Song Hui Kong Xiangwei You Xingang 《Journal of Electronics(China)》 2010年第2期267-272,共6页
The security of steganographic system is significant in this research field. The security defined by relative entropy D (P C || PS )is widely cited to measure the security of different steg-anographic systems. However... The security of steganographic system is significant in this research field. The security defined by relative entropy D (P C || PS )is widely cited to measure the security of different steg-anographic systems. However,two examples are presented to show that some limitations exist in Cachin’s definition. Based on the analysis of a basal hypothesis testing problem,a very useful con-clusion can be drawn to define the security of steganographic system. According to the above illation,an amendatory definition is presented based on the probability of the empirical probability distribution. With the help of new definition,the relationship between security and capacity can be interpreted clearly,and truly secure steganographic method could be designed. 展开更多
关键词 SECURITY steganographic system Relative entropy UNIVERSALITY Hypothesis testing
下载PDF
Coverless Steganography for Digital Images Based on a Generative Model 被引量:5
2
作者 Xintao Duan Haoxian Song +1 位作者 Chuan Qin Muhammad Khurram Khan 《Computers, Materials & Continua》 SCIE EI 2018年第6期483-493,共11页
In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independ... In this paper,we propose a novel coverless image steganographic scheme based on a generative model.In our scheme,the secret image is first fed to the generative model database,to generate a meaning-normal and independent image different from the secret image.The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image.Thus,we only need to transmit the meaning-normal image which is not related to the secret image,and we can achieve the same effect as the transmission of the secret image.This is the first time to propose the coverless image information steganographic scheme based on generative model,compared with the traditional image steganography.The transmitted image is not embedded with any information of the secret image in this method,therefore,can effectively resist steganalysis tools.Experimental results show that our scheme has high capacity,security and reliability. 展开更多
关键词 Generative model coverless image steganography STEGANALYSIS steganographic capacity security.
下载PDF
Digital Image Steganographer Identification:A Comprehensive Survey
3
作者 Qianqian Zhang Yi Zhang +2 位作者 Yuanyuan Ma Yanmei Liu Xiangyang Luo 《Computers, Materials & Continua》 SCIE EI 2024年第10期105-131,共27页
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ... The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online.Accurately discerning a steganographer from many normal users is challenging due to various factors,such as the complexity in obtaining the steganography algorithm,extracting highly separability features,and modeling the cover data.After extensive exploration,several methods have been proposed for steganographer identification.This paper presents a survey of existing studies.Firstly,we provide a concise introduction to the research background and outline the issue of steganographer identification.Secondly,we present fundamental concepts and techniques that establish a general framework for identifying steganographers.Within this framework,state-of-the-art methods are summarized from five key aspects:data acquisition,feature extraction,feature optimization,identification paradigm,and performance evaluation.Furthermore,theoretical and experimental analyses examine the advantages and limitations of these existing methods.Finally,the survey highlights outstanding issues in image steganographer identification that deserve further research. 展开更多
关键词 Information hiding steganalysis steganographer identification steganography covert communication survey
下载PDF
A Study of Steganographic Image Security
4
作者 CHEN Ming-qi directed by YANG Yi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第3期81-82,共2页
关键词 intelligence security steganographic intelligence steganographic image intellectual property protection
原文传递
A Method to Estimate the Steganographic Capacity in DCT Domain Based on MCUU Model
5
作者 MAO Jiafa HUANG Yanhong +3 位作者 NIU Xinxin XIAO Gang ZHU Linan SHENG Weiguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第4期283-290,共8页
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze t... In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model. 展开更多
关键词 maximize capacity under undetectable(MCUU) model steganographic capacity steganography steganalysis image complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部