全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2006 

基于整体性的隐密分析特征提取和融合方法研究

, PP. 2443-2446

Keywords: 隐密分析,固有特征,引入特征,整体性,特征提取,特征融合

Full-Text   Cite this paper   Add to My Lib

Abstract:

在Simmons的"囚犯问题"模型和Cachin的安全性理论模型下,如何提取并融合统计特征是隐密分析技术亟待解决的关键问题之一.基于对已有隐密分析技术及其所涉及的图像统计特征的分析,本文将隐密分析技术所涉及的统计特征定义为载体数据固有特征和隐密方法引入特征,并分别讨论了这两类特征的重要性.在阐述隐密分析技术的整体性研究方法的基础上,提出了一种基于整体性思想的特征提取及融合方法,并以研制的图像隐密分析系统(StegDetect)验证了此整体性特征提取及融合方法的有效性.

References

[1]  Simmons G J.The prisoner''s problem and the subliminal channel[A].Advances in Cryptography:Proceedings of CRYPTO''83[C].London:Plenum Press,1983.51-67.
[2]  Cachin C.An information-theoretic model for steganography[A].Information Hiding:Second International Workshop,vol.1525 of Lecture Notes in Computer Science[C].Portland,Oregon,U.S.A:Springer-Verlag Press,1998.306-318.
[3]  J Fridrich,R Du,M Long.Steganalysis of LSB encoding in colof image[A].Proceeding of IEEE International Conference on Multimedia and Expo[C].New York,USA:IEEE Press,2000.1279-1282.
[4]  J Fridrich,M Goljan,D Hogea.Steganalysis of JPEG images:Breaking the F5 algorithm[A].Proceeding of 5th Information Hiding Workshop LNCS vol.2578[C].New York:Springer Verlag Press,2002.310-323.
[5]  J Fridrich,M Goljan,D Hogea.Attacking the OutGuess[A].Proceeding of the ACM Workshop on Multimedia and Security 2002[C].Juan-les-Pins,France:ACM Press,2002.3-6.
[6]  Haay Farid.Detecting Steganographic Messages in Digital Images[R].USA:Dartmouth College,Computer Science,1999.TR2001-412.
[7]  Joon-Hyuk Chang.Image probability distribution based on generalized Gamma function[J].IEEE Signal Processing Letters,2005,12(4):325-328.
[8]  Walton S.Image authentication for a slippery new age[Z].Dr.Dobb''s J Software Tools Profess Program,1995.18-26.
[9]  Rainer B,Andreas Westfeld.Breaking Cauchy model-based JPEG steganography with first order statistics[A].Computer Security(ESORICS 2004),LNCS 3193[C].Sophia Antipolis,France:Springer Verlag,2004.125-140.
[10]  Sorina Dumitrescu.Detection of LSB steganography via sampie pair analysis[A] Proc of the 5th International Workshop on Information Hiding,LCNS 2578[C].New York:SpringerVerlag,2002.55-372.
[11]  Jessica Fridrich.On estimation of secret message length in LSB steganography in spatial domain[A].Security,Steganography,and Watermarking of Multimedia Contents[C].Saint Joey,USA:SPIE Press,2004.23-34.
[12]  Outguess软件[CP].http://www.outguess.org/,2002.
[13]  Stego Suit软件[CP].http://www.wetstonetech.com,2001.
[14]  R Chu,X You,X Kong.A DCT-based image steganographic method resisting statistical attacks[A].The 2004 IEEE International Conference on Acoustics,Speech,and Signal Processing[C].Montreal,Canada:Springer-Verlag Press,2004.953-956.
[15]  Phil Sallee.Model-based steganography[A].International Workshop on Digital Watermarking[C].Seoul,Korea:Springer-Verlag Press,2003.154-167.
[16]  A Westfeld,A Pfitzmann.Attacks on steganographic systems:Breaking the steganographic utilities EzStego,Jsteg,Stegnos,and S-tools-and some lessons learned[A].The 3rd Information Hiding Workshop,Lecture Notes in Computer Science 1768[C].New York:Springer-Verlag Press,2000.61-76.
[17]  刘畅.针对信息隐藏的数字图像数据特性研究[D].辽宁大连:大连理工大学,2002.
[18]  J Fridrich.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[A].International Workshop on Information Hiding[C].Toronto(CA):Springer Verlag Press,2004.67-81.
[19]  孔祥维.信息隐藏技术安全性的攻击框架及方法[A].信息隐藏全国学术研讨会(CIHW2002)论文集[C].北京:机械工业出版社,2002.42-47.
[20]  Edmund Y Lam,Joseph W Goodman.A mathematical analysis of the DCT coefficient distributions for images[J].IEEE Transactions on Image Processing,2000,9(10):1661-1666.
[21]  郭艳卿.信息隐藏的层次安全性[J].中山大学学报(自然科学版),2004,43(增刊):105-108.
[22]  Sallce P.Model-based methods for steganography and steganalysis[J].International Journal of Image and Graphics(IJIG),2005,Volume 5:167-190.
[23]  许国志.系统科学[M].上海:上海科技教育出版社,2000.310-319.
[24]  Spy Hunter软件[CP].http://www.spy-hunter.com/index.html,2002.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133