全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于距离和的隐写分析基于距离和的隐写分析

DOI: 10.11834/jig.20090212

Keywords: 隐写分析,距离和,特征向量,GIF

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了攻击GIF格式图像中的隐秘术,提出了一种基于图像子块“距离和”的隐写分析算法。该算法中首先将距离用一个索引值同子块中其他索引值的差的绝对值表示,由于索引值的差值可正可负,因而将一个“距离和”区分为“正距离和”和“负距离和”2个矢量,考虑到“正距离和”和“负距离和”两者代数和的符号,它们被归类为“主距离和”和“次距离和”;接着采用直方图计算这些量的统计状态,并通过统计邻接“图像子块”的“距离和”共生矩阵来得到32个统计量;然后通过计算这些统计量的“直方图特征函数的块中心”来得到56维特征向量;最后运用支持向量机构造隐写分析算法。实验结果表明,该算法对GIF图像上多种隐秘术的检测性能均胜过传统算法。此外,“图像子块中不同索引值个数”还可用来改进抽取特征向量的方法。

References

[1]  Machado R. EzStego[ CP/OL]. 1996, http://www. stego. com, 2006- 06-10.
[2]  Fridrich J, Goljan M, Soukal D. Higher-order statistical steganalysis of palette images [ A ]. In: Proceedings of SPIE Electronic Imaging [C], Santa Clara, CA, USA, 2003: 178-190.
[3]  Kwan M. GIFShuffle [ CP/OL]. 1998, http://www.darkside. com. au/ GIFShuffle/, 2006-06-10.
[4]  张新鹏 王朔中.对OPA密写的检测和增强安全性的调色板图像密写方案[J].电子学报,2004,(10):1072-1075.
[5]  CorelDraw image library [DB/OL]. http ://www. corel. com, 2006- 03-12.
[6]  Chang Chih-chung, Lin Chih-jen. LIBSVM: a library for support vector machines, 2001 [EB/OL]. http://www. csie. ntu. edu. tw/ - cjlin/ LibSVM, 2005-09-20.
[7]  Westfeld A, Pfitzmann A. Attacks on steganographic systems: breaking the steganographic utilities EzStego, Jsteg, Stegnos and S-Tools and some lessons learned [ A ]. In: Proceedings of Information Hiding- Third International Workshop [C] , Dresden, Germany, 1999: 61-75.
[8]  Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia Special Issue on Security, 2001, 8(4) : 22-28.
[9]  Dumitrescu S, Wu Xiao-lin, Wang Zhe. Detection of LSB steganography via sample pair analysis [J]. IEEE Transactions on Signal Processing, 2003, 51 ( 7 ) : 1995-2007.
[10]  Lyu S, Farid H. Detecting hidden messages using higher-order statistics and support vector machines[ A ]. In: Proceedings of 5th International Workshop Information Hiding [C], Noordwijkerhout, Netherlands: Springer-Verlag, 2003: 340-354.
[11]  Brown A. S-Tools [ CP/OL]. 1998, http://idea. sec. dsi. uimi. it/ pub/ security/crypt/code/s-tools3. zip, 2006-06-10
[12]  Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Proceedings of Information Hiding-Third International Workshop[C] , Dresden, Germany, 1999 : 47-60.
[13]  Harmsen J, Pearlman W. Steganalysis of additive noise modelable information hiding[ A ]. In: Proceedings of SPIE Electronic Imaging 5022[C], Santa Clara, CA, USA, 2003: 21-24.
[14]  Harmsen J, Bowers K, Pearlman W. Fast additive noise steganalysis [ A]. In: Proceedings of the SPIE International Society for Optical Engineering [C], San Jose, CA, USA, 2004, 5306, 489-495.
[15]  MATLAB [ CP/OL ]. http ://www. mathworks. com/, 2005-09-20.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133