期刊文献+

以数字图像为载体的隐写分析研究进展 被引量:77

Recent Advances in Image-Based Steganalysis Research
下载PDF
导出
摘要 隐写和反隐写的对抗是关系到信息安全的重要课题.文中针对常用隐写载体之一即数字图像,回顾反隐写技术的最新进展.根据隐写技术快速发展对反隐写研究提出的挑战,对近几年提出的新方法和新思路进行梳理和归纳,给出系统和扼要的评述,供隐写和反隐写研究者参考.重点围绕三方面展开讨论:对于克服了统计不对称性的LSB匹配嵌入法如何进行有效的检测或嵌入率估计;对于小嵌入率隐写进行分析的研究中有哪些进展;面对层出不穷的隐写新方法,如何实现不针对具体嵌入算法的通用隐写分析.对于反隐写研究的发展趋势和面临的新问题也作了讨论. Battles between steganography and counter-measures has become an important issue in information security. Aimed at a commonly used cover media, i. e., digital image, this article reviews the recent advances on the frontier of anti-steganography research. Regarding the major challenges posed by the rapid developments of steganographic techniques, the authors outline some typical methods and summarize the technological progress in steganalysis to provide useful information to the researchers on both sides of the cyber warfare. Emphases are laid on three challenging problems, which until a few years ago had been hard to tackle. First, combat the LSB matching steganography that avoids the statistic abnormality existing in the early simple LSB replacement method, either re- vealing the existence of secret information in a suspected image or estimating the length of the embed- ded data. Second, detect stego-images that only contain a very small amount of secret data. Third, develop universal detectors or classifiers to carry out steganalysis independent of the steganographic scheme. Some new trends and problems faced by the steganalysts are also discussed.
出处 《计算机学报》 EI CSCD 北大核心 2009年第7期1247-1263,共17页 Chinese Journal of Computers
基金 国家自然科学基金(60502039 60773079) 国家"八六三"高技术研究发展计划项目基金(2007AA01Z477)资助~~
关键词 隐写 隐写分析 LSB匹配 隐写嵌入率 通用隐写分析 steganography steganalysis LSB matching embedding rate universal steganalysis
  • 相关文献

参考文献7

二级参考文献79

  • 1郭艳卿,何德全,尤新刚,孔祥维.信息隐藏的层次安全性[J].中山大学学报(自然科学版),2004,43(A02):105-108. 被引量:4
  • 2[2]吴秋新,纽心忻等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2002.
  • 3[4]Johnson Neil F,Jajodia Sushil.Steganalysis:the investigation of hidden information,Information Technology Conference,1998.IEEE,1-3 Sep 1998,pp:113 -116.
  • 4[6]Cachin C.An Information-theoretic Model for Steganography,Lecture Notes on Computer Science,Springer-Verlag,New York,1998,1525:306-318.
  • 5[7]Johnson Neil F,Muric Zoran,Jajodia Sushil.Information Hiding:Steganography and Watermarking-Attacks and Countermeasures.Kluwer Academic Publishers,Feb.2001.
  • 6[8]Anderson R J,Petitcolas F A P.On the limit of steganography,IEEE Journal of Selected Areas in Communications,Special Issue On Copyright and Privacy Protection,16(4):474-478,1998.
  • 7[9]Chandramouli R,Memon N.Analysis of LSB based Image Steganography Techniques",Proceedings of ICIP 2001,Thessaloniki,Greece,October 7-10,2001.
  • 8[10]Johnson N F,Jajodia S.Steganalysis of Images Created Using Current Steganography Software,Lecture Notes in Computer Science,Springer-Verlag,Berlin,1998,1525:273-289.
  • 9[11]Johnson N F,Jajodia S.Steganography:Seeing the unseen,IEEE Computer,February 1998:26-34.
  • 10[12]Westfeld A,Pfitzmann A.Attacks on Steganography Systems,Lecture Notes in Computer Science,Spriger-Verlag,Berlin,2000,1768:61-75.

共引文献42

同被引文献562

引证文献77

二级引证文献183

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部