用户名: 密码: 验证码:
空域图像隐藏信息检测技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络通信技术的迅猛发展与多媒体数据数字化的日益普及,多媒体数据在通信网络中迅速便捷传输的同时,也暴露出越来越重要的安全问题。特别是信息隐藏技术的飞速发展与广泛应用,使得机密信息的传输更加隐蔽。军事机构、政府部门、金融机构等涉及国计民生的重要部门利用隐写技术实现机密文件的安全传输。同时,该技术也容易被恶意的个人与团体用于各种非法目的,信息隐藏技术的滥用会对国家安全、社会稳定、个人隐私等构成潜在威胁。隐藏信息检测技术是对信息隐藏技术的攻击技术,是对抗非法信息传播的一个重要手段,也是衡量隐藏系统安全性的一个重要手段。研究隐藏信息检测技术对维护公共安全、国家安全和社会稳定,保证经济的正常发展具有十分重要的意义。
     由于图像冗余度大,非常适合于做隐蔽载体,以图像为载体的信息隐藏技术成果最丰富、最成熟,应用最广泛,因而,有必要对图像隐藏信息检测技术进行深入研究。本文主要以数字图像为研究对象,研究空域图像隐藏信息检测方法、秘密信息嵌入量估计方法,以及适合于图像隐藏信息检测的特征选择与融合方法。其主要研究成果如下:
     (1)针对现有检测技术提取的特征维数越来越高、冗余特征与计算复杂度也随之增加,从而导致维数灾难并影响分类准确性等问题,提出一种基于多重共线性分析、主成分分析与Savage决策的特征选择与融合方法。首先,通过分析特征间的多重共线性去除冗余特征。然后,判断特征间是否具有近似共线性,通过对具有近似共线性的特征矩阵执行主成分分析并采用Savage决策去除不重要特征最后,为了进一步缩减特征维数,将选择出来的特征融合成一个新的特征集,并从中选择出主要的特征。实验结果表明,该方法能有效的去除冗余特征、节省计算时间、并提高检测性能。
     (2)通过分析空域LSB替换对图像相邻像素统计特性的影响,利用自然图像统计量模型,提出一种基于相邻像素统计特性的LSB隐藏信息检测方法,并从理论上证明了算法的有效性。实验结果表明,该方法可以有效检测LSB随机位置替换隐藏和顺序替换隐藏的秘密信息。同时,利用自然图像统计量模型,提出了种可以准确估计图像中隐藏信息量大小的秘密信息嵌入量估计方法,并从理论上进行了分析。
     (3)针对现有空域LSB匹配的隐藏信息检测对未压缩图像的检测率较低的问题,利用相邻像素差分与像素值相邻的差分统计特性,提出一种基于像素差分统计特性的LSB匹配隐藏信息检测方法。通过对待测试图像进行一次LSB匹配隐写生成载密图像,将隐藏信息前后像素差分的改变率与隐藏信息前的像素差分特征一起作为分类特征,结合SVM进行隐藏信息检测。实验结果表明,这种方法可对压缩和未压缩图像的LSB匹配隐写进行有效分析。此外,进一步的实验结果也表明了第3章中提出的特征选择方法对空域隐藏信息检测同样有效。
     (4)由于现有关于调色板图像的隐藏信息检测方法研究较少,检测难度大。而且,现有检测技术直接应用于调色板图像隐藏信息检测时,检测能力相当有限。针对这些问题,提出一种基于提升整数小波变换的调色板图像隐藏信息检测方法。首先对图像8×8分块做5/3提升小波变换,再利用各分块低频系数与高频系数之间的相关性来计算低频能量与高频能量的平均相关度,并以此来判断调色板图像中有无秘密信息。实验结果表明,该算法能够较好的检测出调色板图像中的隐秘信息。
With the rapid development of network communication technology and the increasing popularity of digital multimedia, multimedia data can be transmitted in a quick and easy manner through the communication networks. However, at the same time, the increasingly important security issues are revealed. Especially, the fast development and wide application of information hiding technology lead to the transmission of confidential information becoming more covert. Military agencies, government departments, financial institutions and other key sectors involved in the people's livelihood take advantage of the data embedding technology to achieve the secure transfer of confidential documents. Meanwhile, this technique can easily be used by malicious individuals and groups for a variety of illegal purposes, thus posing serious threat to the national security, social stability as well as the personal privacy. Information detection technology attempts to break the information hiding technique, and hence, it is not only a mean of combating the illegal information transmission, but also an important measure to assess the security of the information hiding system. Thus, research on the detection of hidden information is significantly important to ensure the public safety, national security, social stability, and the normal economic development.
     As image contains much perceptually irrelevant or redundant information, it is well-suited for serving as "cover". As a result, the information hiding technique that takes an image as the cover has achieved the most prominent achievements, and become the most mature technique with most wide application. It is therefore necessary to conduct in-deep investigation into the image information detection technique. In this paper, we take the digital images as the research object, and the research includes information detection methods for spatial domain images, rate estimation of hidden information, and the feature selection and fusion methods that are suitable to the information detection. The main contributions of this paper are listed as follows.
     (1) The previous images detection methods usually suffer from the disadvantage that redundant features and the computational complexity increase with the increase of the dimension of the extracted features, and moreover, the high dimension of the features likely results in the dimensional disaster and affects the classification accuracy and other issues as well. In order to address this problem, we propose a feature selection method based on multicollinearity analysis, PCA (Principal Component Analysis) and Savage decision-making. Firstly, we analyze the multicollinearity among features to eliminate redundant features. Next, we implement the linear transform based on PCA and use the Savage decision-making to eliminate insignificant features. Finally, for the further reduce of features, we fuse the selected features, followed by selecting the principal features from the fused features to form a new feature set. The experimental results show that our method can reduce the redundant features, save the computational time, and make the detection more reliable.
     (2) By analyzing the impact of LSB replacing to the adjacent pixels of images statistical properties, a detection method based on statistical characteristics of adjacent pixels is proposed using the natural images statistic model. This method is theoretically proved to be effective. The experimental results show that this method is able to detect the random LSB replacing and sequential LSB replacing stegnography effectively. Meanwhile, by using the natural images statistic model, we introduce a detection scheme that is capable of accurately estimating the size of hidden secret message and also present the theoretical analysis.
     (3) In order to cope with the low detection result problem of LSB matching steganalysis for the uncompressed images, a new steganalytic method, which exploits the difference statistics of neighboring pixels, is proposed to detect the presence of spatial LSB matching stegnography. Stego images are generated through performing LSB matching operation to the test images. We take the changing rate of the pixels difference before and after the LSB matching stegnography together with the pixels difference before LSB matching stegnography as features, and the SVM is adopted to construct classifier. Experimental results demonstrate that the proposed method is efficient to detect the LSB matching steganography for both the compressed and uncompressed images. In addition, the experimental results have further demonstrated that the feature selection method proposed in chapter 3 is also effective to the detection of hidden information in the spatial domain.
     (4) Based on the problems that, for example, only a few steganalysis methods for palette images are available in current literature, the hidden information is hard to detect, and the existing detection techniques applied to the palette images directly is limited, a novel lifting integer Wavelet Transform based steganalysis algorithm is proposed to detect the hidden information in palette images. Firstly, we divide the image into non-overlapping 8x8 blocks and perform 5/3 IWT (Integer Wavelet Transform) based on lifting scheme to each block. Then, the average correlation is used to determine whether or not the secret message exists in palette images according to the correlation between the low frequency coefficients and high frequency coefficients. Experimental results show that the algorithm is able to better detect the hidden information in the palette images.
引文
[1]中国互联网络信息中心.第24次中国互联网络发展状况统计报告.http://www.edu.cn/xin_xi_zi_xun_1625/20090723/t20090723_393338.shtml, 2009-7-16
    [2]中国互联网络信息中心.第1次中国互联网络发展状况统计报告.http://www.cnnic.cn/download/2003/10/13/93603.pdf,1997-10-13
    [3]D.McCullaqh. Secrete messages come in wars, In Wired News,2001
    [4]G. Berg, I. Davidson, M.Y. Duan, et al. Searching for hidden messages:automatic detection of steganography:automatic detection of steganography. In:Proc of the 10th ACM International Conference on Knowledge Discovery and Data Mining, Seattle, WA, USA,2004,545-550
    [5]杨义先,钮心忻.数字水印理论与技术.北京:高等教育出版社,2006
    [6]S-Tools. http://www.jjtc.com/Security/stegtools.htm,2006-8-29
    [7]D. Kahn. The history of steganography. In:Proc of Information Hiding'96, Cambridge, UK,1996,183-206
    [8]F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information Hiding-A Survey. In: Proc of the IEEE,1999,87(7):1062-1078。
    [9]杨义先,钮心忻.多媒体信息伪装综论.通信学报,2002,23(5):32-38
    [10]P. Moulin, J. A. O'Sullivan. Information-theoretic analysis of information hiding. IEEE Transaction on Information Theory,2003,49(3):563-593
    [11]罗纲.文本隐藏信息检测技术研究:[湖南大学博士学位论文].长沙:湖南大学,2008
    [12]I. J. Cox, T. Kalker, G. Pakura, et al. Information transmission and steganography. In:Proc of Digital Watermarking,4th International Workshop, IWDW 2005, Siena, Italy,2005,15-29
    [13]R. Goel, M. Garuba, C. Liu, et al. The security threat posed by steganographic content on the internet. In:Proc of the International Conference on Information Technology, Las Vegas, NV, USA,2007,794-798
    [14]R. J. Anderson, F. A. P. Petitcolas. On the Limits of Steganography. IEEE Journal of Selected Areas in Communications,1998,16(4):474-481
    [15]孙圣和,陆哲明.数字水印处理技术.电子学报,2000,28(8):85-90
    [16]陈明奇,钮心忻,杨义先.数字水印的研究进展和应用.通信学报,2001, 22(5):71-79
    [17]史其存,李忠源.多媒体信息隐含技术在未来军事通信中的应用.军事通信技术,2001,22(1):40-44
    [18]钮心忻,杨义先.信息隐藏与检测算法的特性分析.电子学报,2002,30(7):952-955
    [19]陈亮,张雄伟.基于语音参数模型的语音隐藏算法.计算机学报,2003,26(8):974-981
    [20]程卫东,黄继武,刘红梅.一种基于3D-DCT的彩色图像信息隐藏算法.自动化学报,2003,29(2):258-267
    [21]张开文,张新鹏,王朔中.图像及音频信号中隐蔽嵌入信息存在性的统计检验.电子与信息学报,2003,25(7):871-876
    [22]夏煜,郎荣玲,曹卫兵,等.基于图像的信息隐藏检测算法和实现技术研究综述.计算机研究与发展,2004,41(4):728-736
    [23]朱仲杰,蒋刚毅,郁梅.MPEG-2压缩域的视频数字水印新算法.电子学报,2004,32(1):21-24
    [24]梁小萍,何军辉,黄继武.隐写分析—原理、现状与展望.中山大学学报,2004,43(6):93-96
    [25]李春花,凌贺飞,卢正鼎.基于支持向量机的自适应图像水印技术.计算机研究与发展,2007,44(8):1399-1405
    [26]杨义先,钮心忻.多媒体信息伪装综论.通信学报,2002,23(5):32-38
    [27]王朔中,张新鹏,张开文.数字密写和密写分析.北京:清华大学出版社,2005
    [28]黄达人,刘九芬,黄继武.小波变换域图像水印隐藏对策和算法.软件学报,2002,13(7):1290-1297
    [29]罗永,成礼智,徐志宏.基于带参数整数小波变换可见数字水印.软件学报,2003,15(2):238-249
    [30]肖俊,王颖.基于多级离散余弦变换的鲁棒数字水印算法.计算机学报,2009,32(5):1055-1061
    [31]K. Jack. Terror groups hide behind web encryption: http://www.usatoday.com/tech/news/2001-02-05-binladen.htm,2001-2-5
    [32]N. Provos, P. Honeyman. Detecting steganographic content on the internet: http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf,2007-10-28
    [33]J. A. Bloom, R. Alonso. Smart search steganalysis. In:Proc of Security and Watermarking of Multimedia Contents V, Santa Clara, CA, United states,2003, 167-172
    [34]G. J. Simmons. The prisoners'problem and the subliminal channel, In:Proc of the CRYPTO'83,1984,51-67
    [35]S. Katzenbeisser, F. A. P. Petitcolas.信息隐藏技术——隐写术与数字水印.第1版.北京:人民邮电出版社,2001
    [36]F. petitcolas, R. Anderson, M. Kuhn. Infornation hiding—a survey. In:Proc of the IEEE,1999,1062-1078
    [37]F. T. Alturki, R. M. Nersereau. Secure image transform domain technique for steganographic applications. In:Proc of SPIE, Security and Watermarking of Multimedia Contents Ⅲ,2001,300-308
    [38]G. Miroslav. Lossless data embedding methods for digital images and detection of steganography. In State University of New York. vol. PhD Dissertation: Binghamton University,2001
    [39]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.第1版.北京:科学出版社,2004
    [40]F. Hartung, M. Kutter. Multimedia watermarking techniques. In:Proc of the IEEE, 1999,1079-1107
    [41]张涛,平西建.针对一类信息伪装算法的隐藏信息检测.通信学报,2002,23(5):123-129
    [42]张涛,平西建.基于差分直方图实现L S B信息伪装的可靠检测.软件学报,2004,15(1):151-158
    [43]S. T. An Implementation of key-based digital signal steganography. In:Proc. Information Hiding Workshop,2001,13-26
    [44]M. Jarno. LSB matching revisited. IEEE Signal Processing Letters,2006, 13(5):285-287
    [45]A. D. Ker. Improved detection of LSB steganography in grayscale images. In: Proc of 6th International Workshop on Information Hiding, Toronto, CANADA, 2004,97-115
    [46]Gifshuffle. http://www.darkside.com.au/gifshuffle/,2006-8-29
    [47]EzStego. http://www.stego.com,2006-8-29
    [48]A. Westfeld. F5 a steganographic algorithm:High capacity despite better steganalysis. In:Proc of the 4th International Workshop on Information Hiding Pittsburgh, PA, USA,2001,289-302
    [49]龚奇芳.图像隐写分析的评测:[硕士学位论文].广州:中山大学,2008
    [50]贵琦,柏森,孙静.基于统计特征和SVM的JPEG图像掩密分析.计算机工程,2008,34(8):141-143
    [51]P. Sallee. Model-based steganography. In:Proc of Internatinal Workshop on Digital Watermarking,2004,154-167
    [52]P. Sallee. Model-based methods for steganography and steganalysis. International Journal of Image and Graphics,2005,5(1):168-189
    [53]S. Hetzl, P. Mutzel. A graph-theoretic approach to steganography. Lecture Notes in Computer Science,2005,3766:119-128
    [54]N. F. Johnson, S. Jajodia. Steganalysis:the investigation of hidden information. In:Proc of 1998 IEEE Information Technology Conference on Information Environment for the Future, Syracuse, Ny, USA,1998,113-116
    [55]翟卫东,吕述望,刘振华.互联网图像隐写检测方法研究.通信技术,2003,11(143):109-113
    [56]陈铭.隐写与隐写分析算法及实践研究:[北京邮电大学博士学位论文].北京:北京邮电大学信息工程学院,2008,19-31
    [57]A. Westfeld, A. Pfitzmann. Attacks on steganographic systems. In:International Workshop on Information Hiding, Dresden, Germany,1999,61-76
    [58]J. Fridrich, M. Goljan. Practical steganalysis of digital images-state of the art. In: Proc of SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California,2002,1-13
    [59]周继军,王颖,钮心忻.图像信息隐藏检测.计算机系统应用,2005,14(5):47-50
    [60]N. F. Johnson, S. Jajodia. Steganalysis of images created using current steganography software. In:Proc of the 2nd International Workshop on Information Hiding, Portland, Oregon,1998,273-289
    [61]王国新,平西建,张涛,等.空域LSB信息伪装及其隐写分析.计算机工程,2008,34(1):173-189
    [62]汝学民,庄越挺,吴飞.基于隐写工具的自相关特性进行音频隐写分析.通信学报,2006,27(4):101-106
    [63]李智.图像数据中的隐秘信息检测技术研究:[四川大学博士学位论文].成都:四川大学应用数学系,2004,45-46
    [64]J. Fridrich, M. Goljan, R. Du. Detecting LSB steganography in color and gray-scale images. In:Proc of ACM, Multimedia and Security Workshop, Ottawa, Canada,2001,22-28
    [65]J. Fridrich, M. Goljan, R. Du. Reliable detection of LSB steganography in color and grayscale Images. In:Proc of ACM Workshop on Multimedia and Security, Ottawa, Canada,2001,27-30
    [66]X. Y. Luo, B. Liu, F. L. Liu. Detecting LSB steganography based on dynamic masks. In:Proc of the 5th International Conference on Intelligent Systems Design and Applications, Wroclaw, POLAND,2005,251-255
    [67]S. Dumitrescu, X. L. Wu, Z. Wang. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing,2003,51(7):1995-2007
    [68]P. Lu, X. Luo, Q. Tang, et al. An improved sample pairs method for detection of LSB embedding. In:Proc of the 6th International Workshop, Toronto, Canada, 2004,116-127
    [69]X. Y. Luo, Q. X. Wang, C. F. Yang, et al. Detection of LTSB steganography based on quartic equation In:Proc of the 8th International Conference on Advanced Communication Technology, Phoenix Pk, SOUTH KOREA,2006, U1199-U1204
    [70]A. D. Ker. A general framework for structural steganalysis of LSB replacement. In:Proc of the 7th International Workshop on Information Hiding, Barcelona, SPAIN,2005,296-311
    [71]A. D. Ker. Fourth-order structural steganalysis and analysis of cover assumptions. In:Proc of the Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅷ, San Jose, CA,2006,7203-7203
    [72]R. Bohme, A. D. Ker. A two-factor error model for quantitative steganalysis. In: Proc of Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅷ, San Jose, CA,2006,25-38
    [73]A. D. Ker. Derivation of error distribution in least squares steganalysis. IEEE Transactions on Information Forensics and Security,2007,2(2):140-148
    [74]A. D. Ker. Optimally weighted least-squares steganalysis. In:Proc of the 9th Conference on Security, Steganigraphy, and Watermarking of Multimedia Contents IX,Proceedings of the SPIE,, San Jose, CA,2007,601-616
    [75]T. Zhang, X. Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing,2003,83(10):2085-2093
    [76]杨春芳,罗向阳,倪大平,等.DIH方法的改进及与SPA和RS方法的比较分析.In:第六届全国信息隐藏暨多媒体信息安全学术研讨会(CIHW2006),哈尔滨,2006,825-829
    [77]J. Fridrich, R. Du, M. Long. Steganalysis of LSB encoding in color images. In: Proc of International Conference on Multimedia and Exp, New York, NY, USA, 2000,1279-1282
    [78]X. P. Zhang, S. Z. Wang, K. W. Zhang. Steganography with least histogram abnormality. In:Proc of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, St Petersburg, Russia,2003,395-406
    [79]Z. Li, A. F. Sui, Y. X. Yang. A LSB steganography detection algorithm. In:Proc of the 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Beijing, Peoples R China,2003,2780-2783
    [80]X. W. Kong, T. Zhang, X. G. You, et al. A new steganalysis approach based on both complexity estimate and statistical filter In:Proc of the 3rd IEEE Pacific Rim Conference on Multimedia (PCM 2002), Hsinchu, Taiwan,2002,434-441
    [81]H. C. Dou, H. B. Zhang, S. H. Zhan. Independent component analysis applied to steganalysis. In:Proc of the 7th International Conference on Signal Processing, Beijing, PEOPLES R CHINA,2004,2498-2501
    [82]夏熠,郎荣玲,戴冠中,等.基于数字图像LSB嵌入的检测算法.计算机工程,2004,30(4):10-11
    [83]O. Dabeer, K. Sullivan, U. Madhow, et al. Detection of hiding in the least signigicant bit. IEEE Transaction On Signal Processing,2004,52(10):3046-3058
    [84]翟卫东,吕述望,刘振华.基于广义高斯分布的彩色图像空域隐写检测算法.通信学报,2004,25(2):33-42
    [85]X. Y Yu, T. N. Tan, Y H. Wang. Extended optimization method of LSB steganalysis. In:Proc of IEEE International Conference on Image Processing (ICIP 2005), Genoa, ITALY,2005,1661-1664
    [86]T. Zhang, Y. Zhang, X. J. Ping, et al. Detection of LSB steganography based on image smoothness. In:Proc of IEEE International Conference on Multimedia and Expo (ICME 2006), Toronto, CANADA,2006,1377-1380
    [87]张涛,平西建,徐长勇.于图像平滑度的空域LSB嵌入的检测算法.算机辅助设计与图形学学报,2006,18(101):1607-1612
    [88]K. Kawaguchi, R. O. Eason. Principle and application of BPCS steganography. In: Proc of SPIE,Multimedia Systems and Applications, Boston,1998,464-472
    [89]M. Niimi, R. O. Eason, H. Noda, et al. An improvement in the security of BPCS steganography In:Proc of the 3th International Workshop on Practice and Theory in Public Key Cryptography PKC2000,2000,35-43
    [90]M. Niimi, R. O. Eason, H. Noda, et al. Intensity histogram steganalysis in BPCS-steganography. In:Proc of Security and Watermarking of Multimedia Contents Ⅲ Conference, San Jose, Ca,2001,555-564
    [91]张新鹏,王朔中.对空域BPCS密写的统计分析.计算机辅助设计与图形学学报,2005,18(7):1625-1629
    [92]J. Lopez-Hernandez, R. Martinez-Noriega, M. Nakano-Miyatake, et al. Detection of BPCS-steganography using SMWCF steganalysis and SVM. In:Proc of the 2008 International Symposium on Information Theory and its Applications, Piscataway, NJ, USA,2008,1-5
    [93]A. Westfeld. Detecting Low Embedding Rates. In:Proc of the 5th International Workshop on Information Hiding 2002,324-339
    [94]A. D. Ker. Resampling and the detection of LSB matching in colour bitmaps. In: Proc of Conference on Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA,2005,1-15
    [95]J. J. Harmsen, W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In:Proc of the 5th Conference on Security and Watermarking of Multimedia Contents, Santa Clara, Ca,2003,131-142
    [96]A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters,2005,12(6):441-444
    [97]J. J. Harmsen, K. D. Bowers, W. A. Pearlman. Fast additive noise steganalysis. In: Proc of the 6th Conference on Watermarking of Multimedia Contents, San Jose, CA,2004,489-495
    [98]X. Y. Yu, N. Babaguchi. Run length based steganalysis for LSB matching steganography. In:Proc of the IEEE International Conference on Multimedia and Expo, Hannover, GERMANY,2008,353-356
    [99]P. W. Wong, H. Chen, Z. J. Tang. On steganalysis of plus-minus one embedding of continuous tone images. In:Proc of the Conference on Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, 2005,643-652
    [100]J. Zhang, I. J. Cox, G. Doerr. Steganalysis for LSB matching in images with high-frequency noise.2007 IEEE Ninth Workshop on Multimedia Signal Processing,2007,385-388
    [101]J. Fridrich, D. Soukal, M. Goljan. Maximum likelihood estimation of length of secret message embedded using ±K steganography in spatial domain. In:Proc of SPIE-IS and T Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA,2005,595-606
    [102]T. Holotyak, J. Fridrich, S. Voloshynovskiy. Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In:Proc of the 9th International Conference on Communications and Multimedia Security, Salzburg, AUSTRIA,2005,273-284
    [103]M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications. In:Proc of Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅷ, San Jose, CA,2006,7201-7201
    [104]Y. Q. Shi, G. R. Xuan, D. K. Zou, et al. Image using wavelet decomposition, prediction-error Image, and neural network. In:Proc of IEEE ICME, Piscataway, NJ,2005,269-272
    [105]Z. G. Liu, L. D. Ping, J. Chen, et al. Steganalysis based on differential statistics. In:Proc of the 5th International Conference on Cryptology and Network Security, Suzhou, PEOPLES R CHINA,2006,224-240
    [106]Q. Z. Liu, A. H. Sung, Z. X. Chen, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition,2008,41:56-66
    [107]T. Holotyak, J. Fridrich, D. Soukal. Stochastic approach to secret message length estimation in ±K embedding Steganpgraphy. In:Proc of Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California,USA,2005,673-684
    [108]Q. Z. Liu, A. H. Sung, X. Jianyun, et al. Image complexity and feature extraction for steganalysis of LSB matching steganography. In:Proc of the 18th International Conference on Pattern Recognition, Los Alamitos, CA, USA,2006, 267-270
    [109]Q. Z. Liu, A. H. Sung, J. Y. Xu. Resampling operations as features for detecting LSB replacement and LSB matching in color images. In:Proc of Multimedia Content Representation, Classification and Security,2006,249-256
    [110]Q. Z. Liu, A. H. Sung, Z. X. Chen, et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognition,2008,41(1):56-66
    [111]Q. Z. Liu, A. H. Sung, B. Ribeiro, et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences,2008,178(1):21-36
    [112]J. Fridrich. A new steganographic method for palette-based images. In:Proc of IS & T PICS, Savannah, Georgia,1999,285-289
    [113]J. Fridrich, R. Du. Secure steganographic methods for palette images. In:Proc of the 3rd International Workshop on Information Hiding, Dresden, Germany, 2000,47-60
    [114]C. C. Chang, Y. H. Chen, Y. C. Chou, Reversible data embedding technique for palette images using de-clustering. In:Proc of the International Workshop on Multimedia Content Analysis and Mining, Weihai, PEOPLES R CHINA,2007, 130-139
    [115]Gif-It-Up. http://www.cs.cf.ac.uk/User/L.Nelson,2006-8-29
    [116]Hide and Seek. http://www.rugeley.demon.co.uk/security/hdsk50.zip
    [117]M. Y. Wu, Y. K. Ho, J. H. Lee. An iterative method of palette-based image steganography. Pattern Recognition Letters,2004,25(3):301-309
    [118]G. Brisbane, R. Safavi-Naini, P. Ogunbona. High-capacity steganography using a shared colour palette. In:Proc of IEEE Vision, Image and Signal Processing, 2005,787-792
    [119]X. P. Zhang, S. Z. Wang. Analysis of parity assignment steganography in palette images. In:Proc of 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Melbourne, AUSTRALIA, 2005,1025-1031
    [120]J. Fridrich, G. Miroslav, D. Soukal. Higher-order statistical steganalysis of palette images. In:Proc of the 5th Conference on Security and Watermarking of Multimedia Contents, Santa Clara, Ca,2003,178-190
    [121]丁玮,孔祥维,尤新刚,等.GIF图像掩密算法的统计安全性比较.中山大学学报,2004,43(S2):152-155
    [122]吴明巧.数字图像信息隐写与隐写分析技术研究:[国防科学技术大学博士学位论文]长沙:国防科学技术大学计算机院,2007
    [123]J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In:Proc of the 6th International Workshop on Information Hiding, Toronto, CANADA,2004,67-81
    [124]J. Fridrich, M. Goljan, D. Soukal. Perturbed quantization steganography with wet paper codes. In:Proc of ACM Multimedia Security Workshop, Magdeburg, Germany,2004,4-15
    [125]N. Provos, P. Honeyman. Detecting steganographic content on the internet. In: Proc of Network and Distributed System Security Symposium San Diego,2001, 1-13
    [126]J. Fridrich, M. Goljan, D. Hogea. Steganalysis of JPEG images:Breaking the F5 algorithm. In:Proc of the 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands,2002,310-323
    [127]J. Fridrich, M. Goljan, D. Hogea. New methodology for breaking steganographic techniques for JPEGs. In:Proc of the 5th Conference on Security and Watermarking of Multimedia Contents V, Santa Clara, Ca,2003, 143-155
    [128]J. J. Harmsen, W. A. Pearlman. Kernel Fisher discriminant for steganalysis of JPEG hiding methods. In:Proc of the 6th Conference on Watermarking of Multimedia Contents VISan Jose, CA,2004,13-22
    [129]J. Fridrich, M. Goljan, R. Du, et al. Attacking the OutGuess. In:Proc of ACM Workshop on Multimedia and Security, France,2002,3-6
    [130]Y. Q. Shi, C. H. Chen, W. Chen, et al. Effect of recompression on attacking JPEG steganographic schemes- An experimental study. In:Proc of IEEE International Symposium on Circuits and Systems, New Orleans, LA,2007, 1265-1268
    [131]G R. Xuan, X. Cui, Y. Q. Shi, et al. JPEG steganalysis based on classwise non-principal components analysis and multi-directional Markov model. In: Proc of IEEE International Conference on Multimedia and Expo, Beijing, PEOPLES R CHINA,2007,903-906
    [132]G Gul., A.E. Dirik I.Avcibas. Steganalytic features for JPEG compression-based perturbed quantization. IEEE Signal Processing Letters,2007,14(3):205-208
    [133]J. Fridrich, M. Goljan, R. Du. Steganalysis based on JPEG compatibility. In: Proc of Multimedia Systems and Applications Iv, Denver, CO, United States, 2001,275-280
    [134]Y. Wang, P. Moulin. Steganalysis of block-DCT image steganography. In:Proc of the 12th IEEE Workshop on Statistical Signal Processing, St Louis, MO, 2003,339-342
    [135]J. Barbier, T. Filiol, K. Mayoura. Universal JPEG steganalysis in the compressed frequency domain. In:Proc of the 5th International Workshop on Digital Watermarking, Cheju Isl, SOUTH KOREA,2006,253-267
    [136]J. Barbier, E. Filiol, K. Mayoura. New features for specific JPEG steganalysis. In:Proc of World Academy of Science,Engineering and Technology, Venice, ITALY,2006,72-77
    [137]H. Feistel. Cryptography and computer privacy. Scientific American,1973, 228(5):15-23
    [138]H. Cai, S. S. Agaian. JPEG steganalysis using color correlation and training on clean images only. In:Proc of 2008 International Conference on Machine Learning and Cybernetics, Kunming, China,2008,3710-3713
    [139]C. H. Chen, Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. In:Proc of IEEE International Symposium on Circuits and Systems, Seattle, WA,2008,3029-3032
    [140]Q. Gui, S. Bai, J. Sun. JPEG images steganalysis based on statistic characteristic and SVM. Computer Engineering,2008,34(8):141-143
    [141]Y. G. Hou, Z. F. Lu, X. J. Ping, et al. Steganalysis for F5 based on multi-characters. Journal of Information Engineering University,2008, 9(3):314-318
    [142]C. K. Leng, J. Pieprzyk. Features-pooling blind JPEG image steganalysis. In: Proc of Digital Image Computing:Techniques and Applications,2008,96-103
    [143]C. K. Leng, J. Pieprzyk. JPEG image steganalysis improvement via image-to-image variation minimization. In:Proc of International Conference on Advanced Computer Theory and Engineering, Phuket, THAILAND,2008, 223-227
    [144]B. Li, F. J. Huang, S. Q. Tan, et al. Effect of different coding patterns on compressed frequency domain based universal JPEG steganalysis. In:Proc of Digital Watermarking, Proceedings, Guangzhou, China,2008,143-157
    [145]Q. Z. Liu, A. H. Sung, B. M. Ribeiro, et al. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. In:Proc of International Joint Conference on Neural Networks, Hong Kong, PEOPLES R CHINA,2008,3352-3357
    [146]Z. Khan, A. B. Mansoor. Steganalysis of JPEG images with joint transform features. In:Proc of Advances in Image and Video Technology, Proceedings, Tokyo, Japan,2009,965-975
    [147]T. Pevny, J. Fridrich. Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. In:Proc of SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA,2008,81911-81913
    [148]S. H. Liu, H. X. Yao, W. Gao. Steganalysis techniques based on wavelet texture analysis. Journal of Fudan University (Natural Science),2004,43(5):910-913
    [149]S. H. Liu, H. X. Yao, W. Gao. Steganalysis based on wavelet texture analysis and neural network. In:Proc of the 5th World Congress on Intelligent Control and Automation, Hangzhou, P.R.China,2004,1-5
    [150]S. H. Liu, L. X. Yao, W. Gao. Steganalysis of data hiding techniques in wavelet domain. In:Proc of International Conference on Information Technology Coding and Computing, Las Vegas, NV,2004,751-754
    [151]刘绍辉,姚鸿勋,高文,等.针对小波域量化隐藏方法的图像监测技术研究.通信学报,2004,25(7):71-77
    [152]I. Avcibas, N. Memon, B. Sankur. Steganalysis based on image quality metrics. In:Proc of the 4th IEEE Workshop on Multimedia Signal Processing, Cannes, France,2001,517-522
    [153]I. Avcibas, N. Memon, B. Sankur. Image steganalysis with binary similarity measures. In:Proc of IEEE International Conference on Image Processing, Rochester, Ny,2002,645-648
    [154]I. Avcibas, N. Memon, B. Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing,2003,12(2):221-229
    [155]H. Farid. Detecting hidden messages using higher-order statistical models. In: Proc of IEEE International Conference on Image Processing, Rochester, Ny, 2002,905-908
    [156]S. Lyu, H. Farid. Detecting hidden messages using higher-order statistics and support vector machines. In:Proc of the 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands,2002,340-354
    [157]S. Lyu, H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In:Proc of the 6th Conference on Watermarking of Multimedia Contents VI, San Jose, CA,2004,35-45
    [158]W. N. Lie, G. S. Lin. A feature-based classification technique for blind image steganalysis. IEEE Transactions on Multimedia,2005,7(6):1007-1020
    [159]G. S. Lin, W. N. lie. Study on detecting image hiding by feature analysis. In: Proc of IEEE International Symposium on Circuits and Systems,ISCAS-2001, Sydney,Australia,2001
    [160]Y. Q. Shi, G. R. Xuan, C. Y. Yang, et al. Effective steganalysis based on statistical moments of wavelet characteristic function. In:Proc of International Conference on Information Technology-Coding and Computing, Las Vegas, NV,2005,768-773
    [161]Y. Q. Shi, G. R. Xuan, D. K. Zou, et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In:Proc of IEEE International Conference on Multimedia and Expo (ICME), Amsterdam, NETHERLANDS,2005,269-272
    [162]钱思进,王凝,王衍波, 等.基于多分辨率小波分解—BP神经网络的图像隐藏分析技术.哈尔滨工业大学学报,2006,38(S1)
    [163]T. Pevny, J. Fridrich. Multi-class blind steganalysis for JPEG images. In:Proc of Security, Steganography and Watermarking of Multimedia Contents VIII, San Jose, CA,2006,0720-0720
    [164]M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications. In:Proc of Security, Steganography, and Watermarking of Multimedia Contents VIII,2006,6072:7201-7201
    [165]S. Lyu, H. Farid. Steganalysis using higher-order image statistics IEEE Transaction Information Forensics Security,2006,1(1):111-119
    [166]R. Chandramouli. A mathematical framework for active steganalysis. Multimedia Systems,2003,9(3):303-311
    [167]S. Trivedi, R. Chandramouli. Active steganalysis of sequential steganography. In:Proc of Security and Watermarking of Multimedia Contents V,2003, 5020:123-130
    [168]张利平,张汉灵.一种主动隐写分析算法.哈尔滨工业大学学报,2006,38(S):806-808
    [169]张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法.中山大学学报,2005,44(3):29-33
    [170]肖和立,张卫明,刘九芬.一种隐密消息的提取方法.计算机工程与应用,2005,41(15):34-37
    [171]H. Wang, S. Wang. Cyber warfare:Steganography vs. steganalysis. Communications of the ACM,2004,47(10):76-82
    [172]夏煜,朗荣玲,戴冠中,等.基于图像的信息隐藏分析技术综述.计算机工程,2003,29(7):1-3
    [173]朗荣玲,夏煜,郅艳,等.几类典型隐写分析算法的分析与评价.中国图象图形学报,2004,9(2):249-256
    [174]杨成,杨义先.基于随机性统计特征的隐密分析研究.计算机工程与应用,2005,41(9):4-8
    [175]刘鸿霞,夏春和.图像隐写分析现状研究.计算机工程与设计,2006,27(1):21-25.
    [176]王朔中,张新鹏, 张卫明.以数字图像为载体的隐写分析研究进展.计算机学报,2009,32(7):1247-1263
    [177]Y. Miche, B. Roue, A. Lendasse, et al. A feature selection methodology for steganalysis. In:Proc of International Workshop on Multimedia Content Representation, Classification and Security, Istanbul, TURKEY,2006,49-56
    [178]T. Pevny, J. Fridrich. Towards multi-class blind steganalyzer for JPEG Images. In:Proc of Int. Workshop on Digital Watermarking, Siena, Italy,2005,39-53
    [179]T. Pevny, J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In:Proc of the 9th Conference on Security, Steganigraphy, and Watermarking of Multimedia Contents, San Jose, CA,2007,50503-50503
    [180]I. Avcibas, N. Memon, B. Sankur. Steganalysis of watermarking techniques using image quality metrics. In:Proc of Security and Watermarking of Multimedia Contents Iii,2001,4314:523-531
    [181]I. Avcibas, M. Kharrazi, N. Memon, et al. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing,2005, 2005(17):2749-2757
    [182]R. Tzschoppe, R. Bauml, J. B. Huber, et al. Steganographic system based on higher-order statistics. In:Proc of the 5th Conference on Security and Watermarking of Multimedia Contents, Santa Clara, Ca,2003,156-166
    [183]C. H. Chen, Y. Q. Shi, W. Chen, et al. Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function. In:Proc of IEEE International Conference on Image Processing, Atlanta, GA,2006, 105-108
    [184]Y. Wang, P. Moulin. Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on Information Forensics and Security,2007, 2(1):31-45
    [185]R. Du, P. Hart, D. Stork. Pattern Classification.2nd ed. New York Wiley: Wiley-Interscience,2001
    [186]D. Gujarati, Basic Econometrics.4th ed. New York:McGraw-Hill Colledge, 2004
    [187]R. Gray, Probability, Random Processes, and Ergodic Properties,2nd ed. New York:Springer,2001
    [188]S. Axler, Linear Algebra Done Right.2nd ed. New York:Springer,1997
    [189]J. Cumming, D. Wooff. Dimension reduction via principal variables. Computational Statistics & Data Analysis,2007,52(1):550-565
    [190]J. Lattin, J. Carroll, P. Green, Analyzing multivariate data.6th ed. Pacific Grove:Duxbury,2002.
    [191]H. Liu, H. Motoda. Feature selection for knowledge discovery and data mining. Boston:Kluwer Academic,1998
    [192]NRCS. http://photogallery.nrcs.usda.gov,2007-9-29
    [193]UCID. http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html,2007-4-20
    [194]F5. http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html,2006-8-29
    [195]OutGuess. http://www.outguess.org,2006-8-29
    [196]Steghide. http://steghide.sourceforge.net,2006-8-29
    [197]C. Comes, V. Vapnik. Support vector networks. Machine Learning,1995, 20(3):273-297
    [198]L. B. Chen. http://svmligh.joachims.org,2006-5-9
    [199]A. Skodras, C. Christopoulos, T. Ebrahimi. The JPEG 2000 still image compression standard. IEEE Signal Processing Magazine,2001,18(5):36-58
    [200]A. Paul, Watters, F. Martin, H. S. Stripf. Visual steganalysis of LSB-encoded natural images. In:Proc of the 3rd International Conference on Information Technology and Applications, Sydney, AUSTRALIA,2005,746-751
    [201]A. D. Ker. Quantitative evaluation of pairs and RS steganalysis. USA,2004, 83-97
    [202]A. D. Ker. Improved detection of LSB steganography in grayscale images. Information Hiding,2004,3200:97-115
    [203]J. J. Harmsen, W. A. Pearlman. Steganalysis of additive noise modelable information hiding. Security and Watermarking of Multimedia Contents V, 2003,5020:131-142
    [204]F. J. Huang, B. Li, J. W. Huang, Attack LSB matching steganography by counting alteration rate of tbe number of neighbourhood gray levels, In:IEEE International Conference on Image Processing, San Antonio, TX,2007, 401-404.
    [205]FreeFOTO. www.freefoto.coml,2006-3-29
    [206]P. Moulin, J. A. O'Sullivan. Information-theoretic analysis of information hiding. IEEE Transaction on Information Theory,2003,49(3):563-593
    [207]S-Tools. http://idea.sec.dsi.uimi.it/pub/security/crypt/code/s-tools4.zip,2006-8-29
    [208]F. G. Images provided courtesy of J. C. Sprott, http://sprott.physics.wisc.edu/fractals.htm/,2006-4-28

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700