期刊文献+

信息隐藏的检测算法研究综述 被引量:2

Review of Steganalysis
在线阅读 下载PDF
导出
摘要 信息隐藏技术是信息安全领域的一个重要分支。信息隐藏分析技术是信息隐藏技术的攻击技术,它通过一定的检测方法发现隐藏于载体的嵌入信息并使之失效,目的是破坏隐匿的通信系统。本文依照检测手段把检测方法进行了分类,并对目前几种主要的信息隐藏检测算法进行了详细的介绍。 Information hiding is an important branch of information security. Steganalysis is the art of detecting the message's existence by detecting methods or destroying the steganographic cover in order to blockade the secret communication. In this paper, method of information hiding detection is classified by detecting means, and some detecting algorithms are introduced with theoretical analyses in details.
作者 刘歆 牛少彰
出处 《北京电子科技学院学报》 2005年第4期90-94,共5页 Journal of Beijing Electronic Science And Technology Institute
基金 北京电子科技学院信息安全与保密重点实验室资助
关键词 信息隐藏 检测算法 information hiding detecting algorithm
  • 相关文献

参考文献24

  • 1[2]吴秋新,纽心忻等译.信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2002.
  • 2[4]Johnson Neil F,Jajodia Sushil.Steganalysis:the investigation of hidden information,Information Technology Conference,1998.IEEE,1-3 Sep 1998,pp:113 -116.
  • 3钮心忻,杨义先.信息隐藏与检测算法的特性分析[J].电子学报,2002,30(7):952-955. 被引量:9
  • 4[6]Cachin C.An Information-theoretic Model for Steganography,Lecture Notes on Computer Science,Springer-Verlag,New York,1998,1525:306-318.
  • 5[7]Johnson Neil F,Muric Zoran,Jajodia Sushil.Information Hiding:Steganography and Watermarking-Attacks and Countermeasures.Kluwer Academic Publishers,Feb.2001.
  • 6[8]Anderson R J,Petitcolas F A P.On the limit of steganography,IEEE Journal of Selected Areas in Communications,Special Issue On Copyright and Privacy Protection,16(4):474-478,1998.
  • 7[9]Chandramouli R,Memon N.Analysis of LSB based Image Steganography Techniques",Proceedings of ICIP 2001,Thessaloniki,Greece,October 7-10,2001.
  • 8[10]Johnson N F,Jajodia S.Steganalysis of Images Created Using Current Steganography Software,Lecture Notes in Computer Science,Springer-Verlag,Berlin,1998,1525:273-289.
  • 9[11]Johnson N F,Jajodia S.Steganography:Seeing the unseen,IEEE Computer,February 1998:26-34.
  • 10[12]Westfeld A,Pfitzmann A.Attacks on Steganography Systems,Lecture Notes in Computer Science,Spriger-Verlag,Berlin,2000,1768:61-75.

二级参考文献9

  • 1[7]F Hartung,M Kutter.Multimedia watermarking techniques [J].Proceedings of the IEEE,July,1999,87(7):1079-1107.
  • 2[8]S M Kay.Fundamentals of Statistical Signal Processing:Estimation Theory [M].New Jersey:PTR Prentice Hall,1993.
  • 3[9]Xinxin Niu,P C Ching,Y T Chan.Wavelet based approach for joint time delay and Doppler stretch measurements [J].IEEE Trans.on Aerospace and Electronic Systems,1999,35(3):1111-1119.
  • 4[1]I J Cox,J Kilian,F T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia [J].IEEE Trans.on Image Processing,1997,IP-6(12):1673-1687.
  • 5[2]N F Johnson,S Jajodia.Exploring steganography:seeing the unseen [J].Computer,1998,31(2):26-34.
  • 6[3]W Bender,D Gruhl,N Morimoto,A Lu.Techniques for data hiding [J].IBM System Journal,1996,35(3-4):313-336.
  • 7[4]M D Swanson,B Zhu,A H Tewfik,L Boney.Robust audio watermarking using perceptual masking [J].Signal Processing,1998,66:337-355.
  • 8钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报,2000,23(1):21-27. 被引量:129
  • 9陈明奇,钮心忻,杨义先.基于小波变换及矢量量化的隐像术[J].计算机研究与发展,2001,38(2):199-203. 被引量:12

共引文献8

同被引文献8

引证文献2

二级引证文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部