期刊文献+

基于整体性的隐密分析特征提取和融合方法研究 被引量:4

Research on Holism-Based Feature Extraction and Fusion for Steganalysis
在线阅读 下载PDF
导出
摘要 在Simmons的"囚犯问题"模型和Cachin的安全性理论模型下,如何提取并融合统计特征是隐密分析技术亟待解决的关键问题之一.基于对已有隐密分析技术及其所涉及的图像统计特征的分析,本文将隐密分析技术所涉及的统计特征定义为载体数据固有特征和隐密方法引入特征,并分别讨论了这两类特征的重要性.在阐述隐密分析技术的整体性研究方法的基础上,提出了一种基于整体性思想的特征提取及融合方法,并以研制的图像隐密分析系统(StegDetect)验证了此整体性特征提取及融合方法的有效性. The extraction and fusion of statistical features has been a key problem demanding solving for steganalytic technology in the context of the prisoner's problem presented by Simmons and Cachin' s security theory model. We divide the statistical features into two categories, i. e., inherited features and introduced features, and the importance of these features is further discussed. Furthermore, based on the research of steganalytic methodology and the theory of holism, a fusion strategy of statistical features is proposed, and the availability of the proposed fusion strategy is verified by our image steganalysis system, which is developed using the strategy.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第B12期2443-2446,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.60572111) 国家高技术研究发展计划(863计划)(No.2005AA145010)
关键词 隐密分析 固有特征 引入特征 整体性 特征提取 特征融合 steganalysis inherent feature introduced feature holism feature extraction feature fusion
  • 相关文献

参考文献23

  • 1Simmons G J. The prisoner's problem and the subliminal channel[ A]. Advances in Cryptography: Proceedings of CRYPTO'83 [ C ]. London: Plenum Press, 1983.51 - 67.
  • 2Cachin C. An information-theoretic model for steganography[A] .Information Hiding: Second International Workshop, vol.1525 of Lecture Notes in Computer Science[ C], Portland, Oregon, U. S. A: Springer- Verlag Press, 1998.306 - 318.
  • 3R Chu, X You, X Kong. A DCT-based image steganographic method resisting statistical attacks[ A]. The 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing[ C]. Montreal, Canada: Springer-Verlag Press, 2004. 953 -956.
  • 4Phil Sallee. Model-based steganography [ A ]. International Workshop on Digital Watermarking [ C ]. Seoul, Korea:Springer-Verlag Press ,2003.154 - 167.
  • 5A Wesffeld, A Pfitzmann. Attacks on steganographic systems:Breaking the steganographic utilities EzStego, Jsteg, Stegnos,and S-tools-and some lessons learned[A], The 3rd Information Hiding Workshop, Lecture Notes in Computer Science 1768[ C]. New York: Springer-Verlag Press, 2000.61 - 76.
  • 6J Fridrich, R Du, M Long. Steganalysis of LSB encoding in color image[A]. Proceeding of IEEE International Conference on Multimedia and Expo[ C ]. New York, USA: IEEE Press, 2000,1279- 1282.
  • 7J Fridrich, M Goljan, D Hogea. Steganalysis of JPEG images:Breaking the F5 algodthm[A]. Proceeding of 5th Information Hiding Workshop LNCS vol. 2578 [ C]. New York: Springer Verlag Press,2002.310 - 323.
  • 8J Fridrich,M Goljan, D Hogea. Attacking the OutGuess[A].Proceeding of the ACM Workshop on Multimedia and Security 2002[ C ]. Juan-les-Pins, France: ACM Press, 2002.3 - 6.
  • 9刘畅.针对信息隐藏的数字图像数据特性研究[D].辽宁大连:大连理工大学,2002.
  • 10Hany Farid. Detecting Steganographic Messages in Digital Images[ R]. USA: Dartmouth College, Computer Science, 1999.TR2001-412.

共引文献3

同被引文献30

引证文献4

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部