期刊文献+

基于四叉树分割的JPEG隐写分析 被引量:4

JPEG Steganalysis Using Quad-tree Based Segmentation
在线阅读 下载PDF
导出
摘要 当前主要的隐写分析方法都是对整幅图像进行特征提取,而忽略了图像的内容差异。该文提出一种基于四叉树分割的JPEG隐写分析方法,该方法根据图像块的纹理复杂度进行图像分割,对具有相同统计特性的子图像分别进行隐写检测特征的提取,并构造相应的分类器,通过加权融合得到最终的检测结果。实验结果表明该方法具有良好的性能,尤其是在训练与测试图像的统计特性具有较大差异时,该算法的检测准确率提高更加明显。 The traditional image steganalysis methods are based on the features extracted from the whole image, while ignoring the differences of the image content. A new JPEG steganalysis algorithm using quad-treebased segmentation is proposed. First, the given images are segmented to sub-images according to the texture complexity. Then, then steganalysis features of each sort of sub-images with the same or close texture complexity are extracted separately to build a classifier. Finally, the steganalysis results of the whole image are obtained by weighted fusing of all the sub-image categories. Experimental results demonstrate that the proposed algorithm exhibits excellent performance and significantly improves the detection accuracy.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第3期631-638,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61272490)资助课题
关键词 信息隐藏 JPEG隐写分析 图像分割 四叉树 纹理复杂度 Information hiding JPEG steganalysis Image segmentation Quad-tree Texture complexity
  • 相关文献

参考文献20

  • 1Latham A. JP hide&seek [OL]. http:// linux01, gwdg. de/ alatham/stego.html, 2011.
  • 2Westfeld A. F5 a steganographic algorithmiC] Proceedings of Information Hiding Workshop, PittsbUrgh2001: 289-302.
  • 3Sallee P. Model-based steganography[C]. Proceedings of Digital Watermarking Workshop, Seoul, Korea, 2003: 154 167.
  • 4Fridrich J, Goljan M, and Soukal D. Perturbed quantizationsteganography[J]. A CM Multimedia Security Journal, 2005, 11(2): 98-107.
  • 5Zhang R, Sachnev V, Botnan M, et al.. An efficient embedder for BCH coding for steganography[J]. IEEE Transactions on Information Theory, 2012, 58(12): 7272-7279.
  • 6Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]. Proceedings of Information Hiding Workshop, Toronto, Canada, 2004: 67-81.
  • 7Shi Y, Chen C, and Chen W. A Markov process based approach to effective attacking JPEG steganography[C]. Proceedings of Information Hiding Workshop, Old Town Alexandria, 2006: 249-264.
  • 8Liu Q, Sung A, Qiao M, et al.. Neighboring joint density-based JPEG steganalysis[J]. ACM Transactions on Intelligent Systems and Technology, 2011, DOI:10.1145/ 1899412.1899420.
  • 9Pevny T and Fridrich J. Merging Markov and DCT features for multi-Class JPEG steganalysis[C]. Proceedings of Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, 2007: 1-13.
  • 10Kodovsk2 J, Eridrich J, and Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432 444.

同被引文献46

  • 1胡昊然,钱萌.基于特征码的Imagehide与JPEGX图像隐藏信息检测以及提取[J].科技广场,2007(1):125-127. 被引量:2
  • 2张维克,孔祥维,尤新刚.安全鲁棒的图像感知哈希技术[J].东南大学学报(自然科学版),2007,37(A01):188-192. 被引量:18
  • 3Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[ J]. IEEE Trails on Information Foren- sics and Security,2010,5(2) :201-214.
  • 4Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganog- raphy using syndrome-trellis codes [ J]. I EEE Trans on Information Forensics and Security,2011,6(3) :920-935.
  • 5Pevny T, Filler T, Bas P. Using high-dimensional image models to per- form highly undetectable steganography [ C ]//Proc of International Workshop on Information Hiding. Berlin : Springer,2010 : 161-177.
  • 6Holub V, Fridrich J. Designing steganographic distortion using direc- tional filters[J]. IEEE Workshop on Information Forensics & Se- curity,2012,2 (4):234-239.
  • 7Holub V, Fridrich J. Digital image steganography using universal dis- tortion[ C]//Proc of the 1st ACM Workshop on Information Hiding and Multimedia Security. New York : ACM Press, 2013 : 59- 68.
  • 8Denemark T,Fridrich J, Holub V. Further study on the security of S- UNIWARD [ C ]//Proe of SPIE, Electronic Imaging, Media Water- marking, Security, and Forensics. 2014.
  • 9Li B, Wang M, Huang J. A new cost function for spatial image steg- anography [ C ]//Proc of IEEE International Conference on Image Pro- cessing. 2014:27-30.
  • 10Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Trans on Information Forensics and Security,2012,7 (3) :868-882.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部