全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

对DCT域连续LSB隐写术的提取攻击

, PP. 484-491

Keywords: 信息隐藏,隐写术,隐写分析,提取攻击,时间序列

Full-Text   Cite this paper   Add to My Lib

Abstract:

基于JPEG图像的空域特征,针对DCT域连续LSB隐写术提出一种唯载密提取攻击方法。根据JPEG图像编码块在空域的块不连续性,将嵌入消息起止点估计问题转化为序列突变点的估计问题,建立逼近理想序列模型估计序列突变点。新模型不仅适用于对连续JSteg算法的提取攻击,对一类可抵抗χ2检验攻击的连续JSteg改进算法同样有效。实验结果表明,对消息嵌入起止点的平均估计误差约为260个系数。

References

[1]  Wang Shuozhong,Zhang Xinpeng,Zhang Weiming.Recent Advances in Image-Based Steganalysis Research.Chinese Journal of Computers,2009,32(1): 1247-1263 (in Chinese)(王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展.计算机学报,2009,32(1): 1247-1263)
[2]  Fridrich J,Goljan M,Soukal D.Searching for the Stego-Key // Proc of Security,Steganography and Watermarking of Multimedia Contents.San Jose,USA,2004: 70-82
[3]  Chen Jiayong,Zhu Yuefei,Zhang Weiming,et al.Chosen-Key Extracting Attack to Random LSB Steganography.Journal on Commutations,2010,30(5): 73-80 (in Chinese)(陈嘉勇,祝跃飞,张卫明,等.对随机LSB隐写术的选择密钥提取攻击.通信学报,2010,30(5): 73-80)
[4]  Trivedi S,Chandramouli R.Secret Key Estimation in Sequential Steganography.IEEE Trans on Signal Processing,2005,53(2): 746-757
[5]  Trivedi S,Chandramouli R.Active Steganalysis of Sequential Steganography // Proc of the International Society for Optical Engineering Conference.San Jose,USA,2003,5020(13): 123-130
[6]  Zhang Liping,Zhang Hanling.An Active Steganalysis Algorithm.Journal of Harbin Institute of Technology,2006,38(Z): 768-772 (in Chinese)(张利平,张汗灵.一种主动隐写分析算法.哈尔滨工业大学学报,2006,38(Z): 768-772)
[7]  Wang Ping,Luo Xiangyang,Liu Fenlin.An Improved Secret Key Estimation Method for Sequential Steganography // Proc of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Pasadena,USA,2006: 396-402
[8]  Luo Xiangyang,Wang Daoshun,Wang Ping,et al.Secret Key Estimation for Image Sequential Steganograph in Transform Domain // Proc of the IEEE Global Telecommunications Conference.Washington DC,USA,2007: 538-542
[9]  Westfeld A,Pfitzmann A.Attacks on Steganographic Systems // Proc of the 3rd International Workshop on Information Hiding.London,UK,1999: 61-76
[10]  Ma Ning,Zhang Weiming,Guan Wei,et al.Extracting Attack to Sequential Jsteg Stegosystems // Proc of the 10th Joint International Computer Conference.Kunming,China,2004: 277-281
[11]  Uphan D.JPEG-JSteg-V4[EB/OL].[2009-03-11].http://www.funet.fi/pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.2009
[12]  You Tianhui,Fan Zhiping.TOPSIS Method for Multiple Attribute Decision Making with Intervals.Journal of Northeastern University: Natural Science,2002,23(9): 840-843 (in Chinese)(尤天慧,樊治平.区间数多指标决策的一种TOPSIS方法.东北大学学报(自然科学版),2002,23(9): 840-843)
[13]  Mao Shisong,Wang Jinglong,Pu Xiaolong.Senior Mathematical Statistics.Beijing: Higher Education Press,1998: 86-91 (in Chinese)(茆诗松,王静龙,濮晓龙.高等数理统计.北京:高等教育出版社,1998: 86-91)
[14]  Provos N.Defending against Statistical Steganalysis // Proc of the 10th Conference on USENIX Security Symposium.Washington DC,USA,2001: 323-335

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133