全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2012 

图像隐写系统模糊相对熵安全性测度研究

DOI: 10.3969/j.issn.0372-2112.2012.08.004, PP. 1515-1522

Keywords: 隐写系统,模糊相对熵,马尔可夫模型,安全性测度

Full-Text   Cite this paper   Add to My Lib

Abstract:

模糊相对熵可很好地度量两个模糊集之间的差异.文章根据隐写通信过程的不确定性,定义了隐写系统n阶Markov链模型的模糊经验矩阵,提出了隐写系统的模糊相对熵和加权模糊相对熵安全性测度,证明了该安全性测度的非负性、交换性和一致性.此外,由该测度可推导出各种确定模式下安全性测度.仿真实验表明,与同模型下的确定模式安全性测度相比,模糊相对熵及加权模糊相对熵安全性测度对隐写算法安全性的度量能力更强,且随着阶数的增加,对应安全性测度的度量能力增强.隐写算法设计实验也表明模糊相对熵安全性测度可更好地指导设计高安全性的隐写算法.

References

[1]  Ross Anderson.Why information security is hard—an economic perspective.Proceedings of 17th Annual Computer Security Applications Conference.Washington,DC:IEEE Press,2001.39-40.
[2]  张良.一种基于幅度预测的隐写分析方法[J].电子学报,2010,38(11):2704-2707. ZHANG Liang.A Steganalysis scheme using magnitude prediction [J].Acta Electronica Sinica,2010,38(11):2704-2707.(in Chinese)
[3]  毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,YANGYi-xian,Shi Shu-jia.Steganalysis method based on JPEG cover image quantitative describing [J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)
[4]  Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to images [J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-287.
[5]  张湛,瞿芳,刘光杰等.基于高阶Markov链模型的数字图像隐写安全性评估方法[J].信息与控制,2010,39(4):455-461. Zhang Zhan,Qu Fang,Liu Guangjie,et al.A novel security evaluation method for digital image steganography based on high-order Markov chain model [J].Information and Control,2010,39(4):455-461.(in Chinese)
[6]  Pevn y T,J Fridrich.Benchmarking for steganography.Proceedings of the 10th Information Hiding International Workshop.Berlin:Springer Verlag,2008.251-267.
[7]  Xie Weixin,Bedrosian S D.Information measure for fuzzy sets [J].IEEE Transactions on System,Man and Cybernetics,1984,14(1):151-156.
[8]  胡为,胡静涛.加权模糊相对熵在电机转子故障模糊识别中的应用[J].信息与控制,2009,38(3):326-329. Hu Wei,Hu Jingtao.Application of weighted fuzzy relative entropy to fuzzy recognition of motor rotor fault [J].Information and Control,2009,38(3):326-329.(in Chinese)
[9]  Sharp T.An implementation of key-based digital signal steganography [J].Proceedings of Information Hiding Workshop,2001,2137:13-26.
[10]  王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. Wang Shuo-Zhong,Zhang Xin-Peng,Zhang Wei-Ming.Recent advances in image-based steganalysis research [J].Chinese Journal of Computers,2009,32(7):1247-1263.(in Chinese)
[11]  Cachin C.An information-theoretic model for Steganography [J].Information and Computation,2004,192(1):41-56.
[12]  张湛,刘光杰,王俊文等.基于图像高阶Markov链模型的扩频隐写分析[J].电子学报,2010,38(11):2578-2584. Zhang Zhan,Liu Guangjie,Wang Junwen,et al.Steganalysis of spread spectrum image steganography based on high-order Markov chain model [J].Acta Electronica Sinica,2010,38(11):2578-2584.(in Chinese)
[13]  王维琼.模糊信息度量的拓展及应用.西北大学,2005.7-10. Wang Weiqiong.Expansion and application of the fuzzy information measure.Northwest University,2005.7-10.(in Chinese)
[14]  戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yuewei,Liu Guangjie,Ye Shuguang.Adaptive steganography based on Hilbert filling curve [J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)
[15]  United States Department of Agriculture,Natural resources conservation service photo gallery. http://photo gallery.nrcs.usda.gov,2002.
[16]  BOWS-2 database of 10,000 watermarked images.http://bows2.gipsa-lab.inpg.fr/BOWS2Image DataBase.tgz.2008.
[17]  Xuan G,Shi Y,Gao J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions [J].Computer Science,2005,3727:262-265.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133