全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2014 

大容量自适应隐写对抗的博弈研究

DOI: 10.3969/j.issn.0372-2112.2014.10.015, PP. 1963-1969

Keywords: 隐写,博弈论,大容量,均衡局势

Full-Text   Cite this paper   Add to My Lib

Abstract:

攻击方拥有自适应规范边信息条件下,如何提高大容量自适应隐写的安全性成为亟待解决的问题.本文对大容量自适应隐写方和攻击方进行博弈建模,分析了博弈均衡存在的条件,通过理论证明给出均衡局势下隐写对抗双方的混合策略和期望支付,最后利用仿真实验验证了理论分析的正确性.研究表明,攻击方的策略与嵌入的信息量无关,期望支付随着嵌入信息量的增加而增加;隐写方选择在载体中某位置进行较多嵌入的概率随着该位置的复杂度增加而增加且不为零.该结论对设计安全的大容量自适应隐写具有一定的指导意义.

References

[1]  郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电子学报,2006,34(6):1048-1052. Guo Yun-biao,You Xin-gang,Zhang Chun-tian,Zhou Lin-na.Study of image bit-plane complexity in the information hiding[J].Acta Electronica Sinica,2006,34(6):1048-1052.(in Chinese)
[2]  H C Wu,N I Wu,C S Tsai,M S Hwang.Image steganographic scheme based on pixel-value differencing and LSB replacement methods[J].IEE Proceedings-Vision,Image and Signal Processing,2005,152(5):611-615.
[3]  B Nguyen,S Yoon,H Lee.Multi bit plane image steganography[A].Proceedings of International Workshop on Digital Watermarking[C].Berlin:Springer,2006.61-70.
[4]  W Luo,F Huang,J Huang.Edge adaptive image steganography based on LSB matching revisited[J].IEEE Transaction on Information Forensics and Security,2010,5(2):201-214.
[5]  张良.一种基于幅度预测的隐写分析方法[J].电子学报,2010,38(11):2704-2707. Zhang liang.A steganalysis scheme using magnitude prediction[J].Acta Electronica Sinica,2010,38(11):2704-2707.(in Chinese)
[6]  毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,Yang Yi-xian,Shi Shu-jian.Steganalysis method based on JPEG cover image quantitative describing[J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)
[7]  R B?hme,A Westfeld.Exploiting preserved statistics for steganalysis[A].Proceedings of 6th International Workshop on Information Hiding[C].Toronto:Springer,2004.82-96.
[8]  Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images[C]. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, San Francisco, 2011, vol. 7880: 1-14.
[9]  B?hme R, Westfeld. A. Exploiting preserved statistics for steganalysis[C]. Proceedings of 6th International Workshop on Information Hiding, Toronto, 2004, LNCS 3200: 82-96.
[10]  Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting[J]. IEEE Siganl Processing Letters, 2012, 19(6): 336-339.
[11]  Sch?ttle P, B?hme R. A Game-Theoretic Approach to Content-Adaptive Steganography[C]. Proceedings of 14th International Conference on Information Hiding, Berkeley, 2012, LNCS 7692: 125-141.
[12]  Johnson B, Sch?ttle P, B?hme R. Where to hide the bits?[C]. Proceedings of Third International Conference Decision and Game Theory for Security, Budapest, 2012, LNCS 7638: 1-17.
[13]  Gauvain J L, Lee C H. Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains[J]. IEEE Transactions on Speech and Audio Processing, 1994, 2(2): 291-298.
[14]  Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. 1st edn. New York: Cambridge University Press, 2009: 10-12.
[15]  C H Yang,C Y Weng,S J Wang,H M Sun.Adaptive data hiding in edge areas of images with spatial LSB domain systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
[16]  戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yue-wei,Liu Guang-jie,Ye Shu-guang.Adaptive steganography based on Hilbert filling curve[J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)
[17]  W Hong.Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique[J].Information Sciences,2013,221(1):473-489.
[18]  E Franz.Steganography preserving statistics properties[A].Proceedings of 5th International Workshop on Information Hiding[C].Noordwijkerhout:Springer,2002.278-294.
[19]  W Luo,F Huang,J Huang.A more secure steganography based on adaptive pixel-value differencing scheme[J].Multimed Tools Application,2011,52(2-3):407-430.
[20]  T Pevny,T Filler,Bas P.Using high-dimensional image models to perform highly undetectable steganography[A].Proceedings of 12th International Conference on Information Hiding[C].Calgary:Springer,2010.161-177.
[21]  T Filler,J Fridrich.Design of adaptive steganographic schemes for digital images[A].Proceedings of SPIE,Electronic Imaging,Security and Forensics of Multimedia XIII[C].San Francisco:SPIE,2011.1-14.
[22]  S Tan,B Li.Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting[J].IEEE Signal Processing Letters,2012,19(6):336-339.
[23]  P Sch?ttle,R B?hme.A game-theoretic approach to content-adaptive steganography[A].Proceedings of 14th International Conference on Information Hiding[C].Berkeley:Springer,2012.125-141. [LL]
[24]  B Johnson,P Sch?ttle,R B?hme.Where to hide the bits?[A].Proceedings of Third International Conference on Decision and Game Theory for Security[C].Budapest:Springer,2012.1-17.
[25]  A D Ker.Steganalysis of embedding in two least-significant bits[J].IEEE Transactions on Information Forensics and Security,2007,2(1):46-14.
[26]  罗向阳,刘粉林,杨春芳,廉士国.一类自适应隐写的更改比率估计[J].中国科学:信息科学,2011,41(3):297-310. Luo Xiang-yang,Liu Fen-Lin,Yang Chun-fang,Lian Shi-guo.Modification ratio estimation for a category of adaptive steganography[J].Science China:Information Sciences,2011,41(3):297-310.(in Chinese)
[27]  Fridrich J.Steganography in Digital Media:Principles,Algorithms,and Applications(1st Ed)[M].New York:Cambridge University Press,2009.10-12.g F, Huang J. A more secure steganography based on adaptive pixel-value differencing scheme[J]. Multimed Tools Appl, 2011, 52(2-3):407-430.
[28]  Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]. Proceedings of 12th International Conference on Information Hiding, Calgary, 2010, LNCS 6387: 161-177.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133