全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于矩特征的隐写分析方法

Keywords: 隐写术,隐写分析,PDF矩,CF矩,一类分类器

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对互联网上大量的隐写软件利用图像隐藏秘密消息,提出一种基于矩特征的隐写分析方法.这种隐写分析技术能有效地检测出图像是否含有秘密信息,通过多分辨率表示图像,在不失有效信息量的基础上减小了数据量的处理,提取2种新颖的、能反映图像隐写前后的统计特性变化的特征,即PDF矩特征和CF特征,对干净图像进行定量描述,并且设计了与特征相匹配的柔性化线性一类分类器,具有一定的稳健性和柔化特性,提高了检测性能.

References

[1]  JHNSON N F,JAJODIA S.Exploring steganography:seeing the unseen[J].IEEE Computer,1998,31(2):26-34.
[2]  钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(12A):2421-2424.NIU Xin-xin,YANG Yi-xian.Study on the frame ofinformation steganographu and steganalysis[J].ActaElectronica Sinica,2006,34(12A):2421-2424.(inChinese)
[3]  毛家发,林家骏,戴蒙.基于图像攻击的隐藏信息盲检测技术[J].计算机学报,2009,32(2):318-327.MAO Jia-fa,LIN Jia-jun,DAI Meng.An attacked imagebased hidden messages blind detect technique[J].Chinese Journal of Computers,2009,32(2):318-327.(in Chinese)
[4]  XUAN G,SHI Y Q,GAO J,et al.Steganalysis based onmultiple features formed by statistical moments of waveletcharacteristic functions[C]∥Proceeding informationHiding Workshop.Bacelona:[S.l.],2005:262-277.
[5]  盛骤,谢式千.概率论与数理统计[M].北京:高等教育出版社,1993:185-194.
[6]  GOLJAN M,FRIDRICH J,HOLOTYAK T.New blindsteganalysis and its implocations[C]∥Proc SPIE,Security,Steganography and Watermarking of MultimediaContents VI.San Jose:[S.l.],2006:1-13.
[7]  毛用才,胡奇英.随机过程[M].西安:西安电子科技大学出版社,2000:132-141.
[8]  HARMSEN J J,PEALMAN W A.Steganalysis of additivenoise modelable information hiding[C]∥Proc SPIE,Secruity Steganography,and Watermarking of MultimediaContents VI.San Jose:[S.l.],2003:131-142.
[9]  COX I J,KILLIAN J,LEIGHTON F T,et al.Securespread spectrum watermarking for multimedia[J].IEEETrans Image Process,1997,6(12):1673-1687.
[10]  MARVEL L M,BONCELET C G,RETTER C T.Spreadspectrum image steganography[J].IEEE Trans ImageProcess,1999,8(8):1075-1083.
[11]  SHARP T.An implementation of key-based digital signalsteganography[C]∥Proc 4th Int Workshop onInformation Hiding.Pittsburgh:[S.l.],2001:13-26.
[12]  WANG Y,MOULIN P.Optimized feature extraction forlearning-based image steganalysis[J].IEEE Transactionson Information Forensics and Security,2007,2(1):31-45.
[13]  MONTGOMER D C,RUNGER G C.Applied statisticsand probability for engineers[M].New York:Wiley,1994:18-502.
[14]  DUDA R O,HART P E,STORK D G.Patternclassification[M].2nd ed.,New York:Wiley,2001:30-62.
[15]  EGGERS J J,BAUML R,TZSCHOPPE R,et cl.ScalarCosta scheme for information embedding[J].IEEE TransSignal Process,2003,51(4):1003-1019.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133