期刊文献+

基于多元回归的JPEG隐密分析方案 被引量:2

Steganalytic Scheme for JPEG Images Based on Multivariate Regression
下载PDF
导出
摘要 为解决JPEG图像隐密分析算法的设计问题,在DCT域共生矩阵的基础上构建了JPEG图像共生特征空间,并将定量隐密分析算法看成多元共生特征与含密量之间的回归模型,提出了一种JPEG图像定量隐密分析算法设计方案.此方案以已知含密量的JPEG图像为研究对象,而无需分析对应的JPEG隐密机制,因此具有较强的通用性.实验结果表明,对安全性较高的MB1隐密算法,本文方案仍可设计出高检测能力的定量隐密分析方法. A co-occurrence feature space is constructed, which can effectively reflect the changes of higher-order statistical characteristics caused by JPEG steganographic techniques. Supported by this feature space,a new scheme for designing steganalytic algorithms is presented based on multivariate regression model. With only JPEG stego images and no embedding details needed, this designing scheme is able to provide a good generality. Experimental results indicate that, our designing scheme can also produce remarkable steganalytic algorithm even for MB1 embedding mechanism, which has reached high performance of security.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第6期1378-1381,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.60572111)
关键词 多元回归 JPEG 隐密分析 共生特征 MB1 multivariate regression JPEG, steganalysis,co-occurrence feature,MB(model based)
  • 相关文献

参考文献11

  • 1Fabien A P Pefitcolas,Ross J Anderson,Markus G Kuhn. Informarion hiding-a survey[J]. IEEE Special Issue on Protection of Multimedia Content, 1999,87 (7) : 1062 - 1078.
  • 2Tao Zhang, Xijian Ping. A Fast and Effective Steganalytic Technique against Jsteg-Like Algorithms [ A ].Proceedings of ACM Symposium on Applied Computing[ C]. Florida USA: ACM Press,2003. 307 - 311.
  • 3Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[ A ]. Proceeding of 5th Information Hiding Workshop [ C ]. Noordwijkerhout Netherlands: Springer Verlag, 2002.310 - 323.
  • 4Fridrich J, Goljan M, Hogea D. Attacking the OutGuess [ A]. Proceedings of the ACM Workshop on Multimedia and Security 2002[ C]. Juan-les-Pins France:ACM Press,2002.3 - 6.
  • 5Sallee P. Model-based steganography[ A]. Proceedings of International Workshop on Digital Watermarking[ C]. Busan Korea: Springer-Verlag, 2004.154 - 167.
  • 6Fridrich J, Goljan M, Soukal D. Perturbed quantization steganography with wet paper codes [ A ]. Proceedings of ACM Multimedia Security Workshop [ C]. Magdeburg Germany: ACM Press,2004.4- 15.
  • 7Bohme R. Breaking Cauchy model-based JPEG steganography with first order statistics [ A ]. Proceedings of 9th European Symposium on Research in Computer Security[ C] .Sophia Antipolis France: Springer-Verlag,2004. 125 - 140.
  • 8Gokhan Gill, Ahmet Emir Dirik, Ismail Avcibas. Steganalytic features for JPEG compression-based perturbed quanfization [J]. IEEE Signal Processing Letters.2007,14(3) :205 - 208.
  • 9Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis [ A ]. Proceedings of Security Steganography and Watermarking of Multimedia Contents IX[C]. San Jose USA: SPIE Press,2007.3 - 4.
  • 10Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis [ J ]. IEEE Trans. on Information Forensics and Security, 2007,2( 1 ) : 31 - 45.

共引文献1

同被引文献11

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部