登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
基于相对熵的直方图差异与JPEG隐写的定量分析
  • 摘要

    针对图像隐写分析中常用的直方图特征,给出了一类基于相对熵的直方图差异计算方法,并提出了一种基于相对熵的JPEG隐写的定量分析方法.首先根据两假设检验中的最优检验——似然比检验,分析了相对熵在衡量2个直方图间的距离时的优越性,并给出了2种基于相对熵的直方图差异计算方法.然后,以新的直方图差异特征为基础,训练支持向量回归分析器,以估计隐写对DCT系数的更改比率.针对JSteg和改进的F5隐写的实验结果表明:与其他的直方图差异特征相比,根据所提出的基于相对熵的直方图差异特征所训练的定量隐写分析器具有更高的估计精度和稳定性.

  • 作者

    杨春芳  刘粉林  罗向阳  Yang Chunfang  Liu Fenlin  Luo Xiangyang 

  • 作者单位

    解放军信息工程大学信息工程学院 郑州 450002

  • 刊期

    2011年8期 ISTIC EI PKU

  • 关键词

    隐写  JPEG  隐写分析  定量隐写分析  直方图  相对熵  支持向量回归 

参考文献
  • [1] 孔祥维,李玲玲,尤新刚. 基于多特征支持向量回归的F5定量隐密分析研究. 计算机研究与发展, 2009,z1
  • [2] PHIL SALLEE. MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS. International Journal of Image and Graphics, 2005,1
  • [3] Fridrich J;Goljan M;Soukal D. Perturbed quantization steganography. Multimedia systems, 2005,2
  • [4] Fridrich J;Golijan M. Practical steganalysis of digital images-state of the art. Bellingham:WA:SPIE, 2002
  • [5] Luo X;Wang D;Wang P. A review on blind detection for image steganography. Signal Processing, 2008,07
  • [6] Zhang T;Ping X. A fast and effective steganalytic technique against Jsteg-like algorithms. New York:ACM, 2003
  • [7] B(o)hme R. Weighted stego-image steganalysis for JPEG covers. Beilin:Springer-Verlag, 2008
  • [8] Fridrich J;Goljan M. On estimation of secret message length in LSB steganography in spatial domain. Bellingham:WA:SPIE, 2004
  • [9] Pevny T;Fridrich J;Ker A D. From blind to quantitative steganalysis. Bellingham:WA:SPIE, 2009
  • [10] Guo Y;Kong X;You X. Universal methodology for developing quantitative steganalysis. Chinese Journal of Electronics, 2009,03
  • [11] Fridrich J;Goljan M;Soukal D. Forensic steganalysis:Determining the stego key in spatial domain steganography. Bellingham:WA:SPIE, 2005
  • [12] Fridrich J;Goljan M;Hogea D. Steganalysis of JPEG images:Breaking the F5 algorithm. Beilin:Springer-Verlag, 2002
  • [13] Fridrich J;Goljan M;Hogea D. Attacking the outguess. New York:ACM, 2002
  • [14] Fridrich J;Goljan M;Soukal D. Searching for the stego key. Bellingham:WA:SPIE, 2004
  • [15] Fridrich J;Goljan M;Hogea D. Quantitative steganalysis of digital images:estimating the secret message length. ACM Multimedia Systems Journal:Special Issue on Multimedia Security, 2003,03
  • [16] Westfeld A;Pfitzmann A. Attacks on steganographic systems. Beilin:Springer-Verlag, 1999
  • [17] Provos N. Defending against statistical steganalysis. Berkeley,CA:USENIX, 2001
  • [18] Westfeld A. High capacity despite better steganalysis (FS-a steganographic algorithm). Beilin:Springer-Verlag, 2001
  • [19] B(o)hme R;Ker A D. A two-factor error model for quantitative steganalysis. Bellingham:WA:SPIE, 2006
  • [20] Cover T M;Thomas J A. Elements of Information Theory. Hoboken,NJ:John Wiley & Sons,Inc, 1991
  • [21] Pevny T;Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. WA:SPIE, 2007
  • [22] Fridrich J;Pevny T,Kodovsky. Statistically undetectable JPEG steganography: Dead ends,challenges,and opportunities. New York:ACM, 2007
查看更多︾
相似文献 查看更多>>
18.208.159.25