登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
以数字图像为载体的隐写分析研究进展
  • 摘要

    隐写和反隐写的对抗是关系到信息安全的重要课题.文中针对常用隐写载体之一即数字图像,回顾反隐写技术的最新进展.根据隐写技术快速发展对反隐写研究提出的挑战,对近几年提出的新方法和新思路进行梳理和归纳.给出系统和扼要的评述,供隐写和反隐写研究者参考.重点围绕三方面展开讨论:对于克服了统计不对称性的LSB匹配嵌入法如何进行有效的检测或嵌入率估计;对于小嵌入率隐写进行分析的研究中有哪些进展;面对层出不穷的隐写新方法,如何实现不针对具体嵌入算法的通用隐写分析.对于反隐写研究的发展趋势和面临的新问题也作了讨论.

  • 作者

    王朔中  张新鹏  张卫明  WANG Shuo-Zhong  ZHANG Xin-Peng  ZHANG Wei-Ming 

  • 作者单位

    上海大学通信与信息工程学院,上海,200072/上海大学通信与信息工程学院,上海,200072;信息工程大学信息工程学院,郑州,450002

  • 刊期

    2009年7期 ISTIC EI PKU

  • 关键词

    隐写  隐写分析  LSB匹配  隐写嵌入率  通用隐写分析 

参考文献
  • [1] 张卫明,李世取,刘九芬. 对空域图像LSB隐写术的提取攻击. 计算机学报, 2007,9
  • [2] 张新鹏,王朔中. 对空域BPCS密写的统计分析. 计算机辅助设计与图形学学报, 2005,7
  • [3] Mielikainen J.. LSB matching revisited. IEEE signal processing letters, 2006,5
  • [4] Detection of LSB Steganography via Sample Pair Analysis. IEEE Transactions on Signal Processing: A publication of the IEEE Signal Processing Society, 2003,7
  • [5] Zhang W.;Zhang X.;Wang S.. A Double Layered “Plus-Minus One” Data Embedding Scheme. IEEE signal processing letters, 2007,11
  • [6] Avcibas I.;Memon N.;Sankur B.. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 2003,2
  • [7] Shalin Trivedi;R. Chandramouli. Secret Key Estimation in Sequential Steganography. IEEE Transactions on Signal Processing: A publication of the IEEE Signal Processing Society, 2005,2
  • [8] Willems F.M.J.;van Dijk M.. Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory, 2005,3
  • [9] Ker A.D.. Steganalysis of LSB matching in grayscale images. IEEE signal processing letters, 2005,6
  • [10] Tao Zhang;Xijian Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing: The Official Publication of the European Association for Signal Processing (EURASIP), 2003,10
  • [11] Ismail Avcibas;Bulent Sankur;Khalid Sayood. Statistical evaluation of image quality measures. Journal of electronic imaging, 2002,2
  • [12] 张卫明,刘九芬,李世取. LSB隐写术的密钥恢复方法. 中山大学学报(自然科学版), 2005,3
  • [13] 梁小萍,何军辉,李健乾,黄继武. 隐写分析--原理、现状与展望. 中山大学学报(自然科学版), 2004,6
  • [14] Xinpeng Zhang;Shuozhong Wang. Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE communications letters, 2006,11
  • [15] Zhang X;Zhang W;Wang S. Efficient double-layered steganographic embedding. Electronics Letters, 2007,8
  • [16] Jessica Fridrich;Petr Lisonek. Grid Colorings in Steganography. IEEE Transactions on Information Theory, 2007,4
  • [17] Sorina Dumitrescu;Xiaolin Wu. A New Framework of LSB Steganalysis of Digital Media. IEEE Transactions on Signal Processing: A publication of the IEEE Signal Processing Society, 2005,10
  • [18] Lisa M. Marvel;Charles G. Boncelet Jr.;Charles T. Retter. Spread Spectrum Image Steganography. IEEE Transactions on Image Processing, 1999,8
  • [19] Ker A. D.. A Capacity Result for Batch Steganography. IEEE signal processing letters, 2007,8
  • [20] 刘歆,牛少彰. 信息隐藏的检测算法研究综述. 北京电子科技学院学报, 2005,4
  • [21] 郭艳卿,何德全,尤新刚,孔祥维,王波. 基于整体性的隐密分析特征提取和融合方法研究. 电子学报, 2006,z1
  • [22] JohnsonN F;Jajodia S. Exploring steganography:Seeing the unseen. IEEE Transactions on Computers, 1998,02
  • [23] Kharrazi M;Sencar H T;Memon N. Image steganography:Concepts and practice. Institute for Mathematical Sciences,National University of Singapore,Singapore, 2004
  • [24] Westfeld A;Pfitzmann A. Attacks on steganographic systems. Berlin:springer-verlag, 1999
  • [25] Provos N. Defending against statistical steganalysis. Washington,D.C.,USA, 2001
  • [26] Fridrich J;Goljan M;De R. Attacking the OutGuess. Juan-les-Pins,France, 2002
  • [27] Fridrich J;Goljan M;Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001,04
  • [28] Fridrich J;Goljan M. Practical steganalysis of digital images-State of the art. 2002
  • [29] Chandramouli R. A mathematical framework for active steganalysis. Multimedia Systems, 2003,03
  • [30] Kawaguchi K;Eason R O. Principle and application of BPCS steganography. Boston, 1998
  • [31] Wu M;Ho Y;Lee J. An iterative method of palette-based image steganography. Pattern Recognition Letters, 2004
  • [32] Brisbane G;Safavi-Naini R;Oqunbona P. High-capacity steganography using a shared colour palette. IEE Proceedings-Vision,Image and Signal Processing, 2006
  • [33] Fridrich J;Rui D. Secure steganographic methods for palette images. 2000
  • [34] Zhang X;Wang S. Analysis of parity assignment steganography in palette images. Springer-Verlag, 2005
  • [35] Fridrich J;Goljan M;Soukal D. Higher-order statistical steganalysis of palette images. Santa Clara,CA,USA, 2003
  • [36] Fridrich J;Goljan M;Du R. Steganalysis based on JPEG compatibility. Denver,CO,USA, 2001
  • [37] Westfeld A. F5-A steganographic algorithm. 2001
  • [38] Fridrich J;Goljan M;Hogea D. Steganalysis of JPEG image:Breaking the F5 algorithm. Noordwijkerhout,Netherlands, 2002
  • [39] Ker A D. Resampling and the detection of LSB matching in color bitmaps. 2005
  • [40] Sharp T. An implementation of key-based digital signal steganngraphy. Pittsburgh,PA,USA, 2001
  • [41] Trivedi S;Chandramouli R. Active steganalysis of sequential steganography. 2003
  • [42] Westfeld A. Detecting low embedding rates. 2002
  • [43] Lu P;Luo X;Tang Q;Shen L. An improved sample pairs method for detection of LSB embedding. 2004
  • [44] Ker A D. A general framework for the structural steganalysis of LSB replacement. 2005
  • [45] Ker A D. Improved detection of LSB steganography in grayscale images. 2004
  • [46] Ker A D. Fourth-order structural steganalysis and analysis of cover assumptions. 2006
  • [47] Bohme R;Ker A D. A two-factor error model for quantitative steganalysis. 2006
  • [48] Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. 2005
  • [49] Pevnu T;Fridrich J. Towards multi-class blind steganalyzer for JPEG images. 2005
  • [50] Provos N;Honeyman P. Hide and seek:An introduction to steganography. IEEE Security and Privacy Magazine, 2003,03
  • [51] Farid H;Siwei L. Detecting hidden messages using higherorder statistics and support vector machines. 2003
  • [52] Holotyak T;Fridrich J;Voloshynovskiy S. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. 2005
  • [53] Goljan M;Fridrieh J;Holotyak T. New blind steganalysis and its implications. 2006
  • [54] Lyu S;Farid H. Steganalysis using color wavelet statistics and one-class support vector machines. San Jose,CA, 2004
  • [55] Lyu S;Farid H. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 2006,01
  • [56] Wang Y;Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on Information Forensics and Security, 2007,01
  • [57] Xuan G;Shi Y;Gap J. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. 2005
  • [58] Harmsen J;Pearlman W. Steganalysis of additive-noise modelable information hiding. 2003
  • [59] Harmsen J;Bowers K;Pearhnan W. Fast additive noise steganalysis. 2004
  • [60] Wong P W;Chen H;Tang Z. On steganalysis of plus-minus one embedding of continuous tone image. 2005
  • [61] Lie W;Lin G. A feature-based classification technique for blind image steganalysis. IEEE Transactions on Multimedia, 2005,06
  • [62] Vetterli M. A theory of multirate filter hanks. IEEE Transactions on Acoustic,Speech,and Signal Processing, 1987,03
  • [63] Avcibas I;Memon N;Sankur B. Steganalysis of watermarking techniques using image quality metrics. 2001
  • [64] Feistel H. Cryptography and computer privacy. Scientific American, 1973,05
  • [65] Lyu S;Farid H. Detecting hidden messages using higher-order statistics and support vector machines. 2002
  • [66] Farid H. Detecting hidden messages using higher-order statistical models. New York,USA, 2002
  • [67] Farid H. Detecting steganographie message in digital images[Dartmouth,NH:Technical Report TR2001-412]. 2001
  • [68] Wang H;Wang S. Cyber warfare:Steganography vs steganalysis. Communications of the ACM, 2004,10
  • [69] Barbier J;Filiol E;Mayoura K. New features for specific JPEG steganalysis. 2006
  • [70] Ker A D. Optimally weighted least-squares steganalysis. 2007
  • [71] Ker A D. Derivation of error distribution in least squares steganalysis. IEEE Transactions on Information Forensics and Security, 2007,02
  • [72] Baliga A;Kilian J;Iftode L. A web based covert file system. San Diego,California, 2007
  • [73] Pevny T;Fridrich J. Determining the stego algorithm for JPEG images. Special Issue of IEE Proceedings-Information Security, 2006,03
  • [74] . http://photogallery.nrcs.usda.gov
  • [75] Winstein K. Lexical steganography through adaptive modulation of the word choice hash,2000 Intel Science Talent Search Top Ten Winners. http://alumni,imsa.edu/~keithw/tlex/lsteg.pdf
  • [76] Rocha A;Goldenstein S. Progressive randomization for steganalysis. 2006
  • [77] Dittmann J;Hesse D;Hillert R. Steganography and steganalysis in voice-over-IP scenarios. 2005
  • [78] Kratzer C;Dittmann J;Vogel T;Hillert R. Design and evaluation of steganography for voice-over-IP. Kos,Greece, 2006
  • [79] Kessler G C. An overview of steganography for the computer forensics examiner. FBI Forensic Science Communications, 2004,03
  • [80] Maurer U. A universal statistical test for random bit generators. Journal of Cryptology, 1992
  • [81] Fridrich J;Goljan M. On estimation of secret message length in LSB steganography in spatial domain. San Jose,CA, 2004
  • [82] Ker A D. Batch steganography and pooled steganalysis. 2006
  • [83] Fridrich J;Goljan M;Soukal D. searching for the stego key. 2004
  • [84] Fridrich J;Goljan M;Soukal D;Holotyak T S. Forensic steganalysis:Determining the stego key in spatial domain steganography. San Jose,CA, 2005
  • [85] Chandramouli R;Subbalakshmi K P. Current trends in steganalysis:A critical survey. Kunming,China, 2004
  • [86] Ozer H;Avcibas I;Sankur B. Steganalysis of audio based on audio quality mctrics. 2003
  • [87] Ozer H;Sankur B;Memon N;Avcibas I. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Processing, 2006
  • [88] Taskiran C M;Topkara U;Topkara M. Attacks on lexical natural language steganography systems. 2006
查看更多︾
相似文献 查看更多>>
3.85.245.126