基于小波的信息隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏是一种在不影响媒体原有功能和感官效果的情况下在其中加入附加的信息的技术。通常信息隐藏有两方面的功能,一种是以验证为目的,比如用于检测媒体版权和媒体来源的数字水印技术;另外一种就是以隐秘通信为目的的隐写技术。本文针对基于小波域的数字水印技术及隐写检测中的一些重要问题展开研究,主要做了以下几个方面的工作:
     1、系统介绍数字水印及隐写分析的发展现状、基本模型、特征、分类和应用,重点分析了现有典型技术的策略。
     2、基于对比较小波相关系数大小嵌入水印的方法的研究,提出了一种基于降频的数字水印算法,该方法具有较好的不可见性和抗JPEG压缩的能力,且对其他的攻击也具有一定的鲁棒性。
     3、从空间域和小波域提取图像特征值出发,设计了一种针对JPEG图像的图像信息隐藏盲检测算法,该算法可以较可靠的检测出含隐藏信息的图像。
Information hiding refers to the technology of embedding some information to digital media. The embedded information convey addition information and maintaining the sense effect of the media. There are two functions of information hiding. One is to prove validity as it conveys addition information about the carrier for its copyright, ownership, distribution etc. Another, Steganography is to conceal the existence of communication by cover carriers.
     1、The states, basic model, characteristics, classification and applications of the digital watermarking and steganalysis of techniques are introduced.
     2、Presents a new watermarking coded algorithm based on reduced frequency based on algorithm that embed watermarking by compare frequency domain coefficients. It makes watermark better invisible , good robustness to JPEG compression and robust to many attacks.
     3、A image steganalysis method for JPEG pictures is proposed, in which features form spatical and DWT domains are selected to form a classifying model. Experiments show that this method could detect the hidden information efficiently.
引文
[1] HSU Chior-Ting,WU Ja-Ling,Hidden Digital Watermarks in Images, IEEE Trans on Image Processing,1998,8(1),58-62.
    [2] Ettinger J M. Steganalysis and game equilibria. Proceedings of Information Hiding: Second International Workshop. IH'98, 1998. Berlin: Springer-verlag,LNCS,vol. 1525,319-328.
    [3] Johnson N and Jajodia S.Stegnanlysisthe investigation of hidden information. Proceedings of IEEE Information Technology Conference, 1998. 113-116.
    [4] Johnson N and Jajodia S. Steganalysis of images created using current steganography software. Proceedings of Information Hiding: Second International Workshop, IH'98, 1998, Berlin: Springer-verlag, LNCS, vol. 1525,273-289.
    [5] Fridrich J, Goljan M, and Du R. Steganalysis based on JPEG compatibility. Proceedings of Multimedia System and Applications IV, 2001. Berlingham:SPIE,Proc.SPIE,vol.4519,275-280.
    [6] Fridrich J, Goljan M,and Hogea D.Attacking the outguess.Proceedings of ACM MULTIMEDIA'02 Workshop on Multimedia and Secrecy, and Steganalysis,2002.New York,NY:ACM Press:3-6.
    [7] Fridrich J, Goljan M,and Hogea D, etal. Quantitative steganalysis of digital images estimating the secret message length. Multimedia Systems, 2003.9(3):228-302.
    [8] Fridrich J, Goljan M,and Hogea D. Steganalysis of JPEG Images: Breaking the F5 Algorithm. Proceedings of Information Hiding:5th International Workshop(IH 2002), 2003. Berlin: Springer-Verlag, LNCS, vol.2578,310-323.
    [9] Fridrich J, Goljan M,and Hogea D. New methodology for breaking steganography techniques for JPEGs. Proceedings of Security and Watermarking of Multimedia Contents V,2003. Berllingham: SPIE, Proc. SPIE,vol.5020,143-155.
    [10] Westfeld A and Pfitzmann A.Attacks on Steganographic Systems. Proceedings of Information Hiding: Third International Workshop, IH'99,2000.Berlin:Springer-Verlag,LNCS,vol.1768,61-76.
    [11] Bohme R and Westfeld A. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistcs. Proceedings of Compter Sedurity-ESOEICS 2004: 9th European Symposium on Research in Computer Security, 2004. Berlin: Springer-Verlag, LNCS, vol.3193, 125-140.
    [12] Provos N and Honeyman P. Detecting Steganographic Content on the Internet.Proceedings of NDSS'02: Network and Distributed System Security Symposium,2002.Reston,Virginia:Internet Society,1-13.
    [13]齐东旭,邹良承,韩效宵。一类新的置乱变换及其在图像隐藏中的应用.中国科学(E卷),2000,43(3):304-312.
    [14]丁玮,闫伟齐,齐东旭.基于置乱与融合的数字水印隐藏技术及其应用.中国图像图形学报,2000,5(8):64-649.
    [15]李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术.电子学报,2000.28(4):61-63.
    [16]Z.Duric,N.F.Johnson and S.Jajodia.Recovering watermark from images.Technical report:ISE-TR-99-04 in the Center for Secure Information System,George Mason University,Virginia,U.S.A,1999
    [17]Swanson M D,Zhu B,Tewfik A H,Multiresolution scenebased viedo watermarking using perceptual models[J]IEEE Journal on Selected Areas in Communications,1999,16(4):540-550.
    [18]周亚训,徐铁峰.基于二值运算的隐形签名数字水印算法[J].通信学报,2002,2(23),107-112.
    [19]R.G.van Schyndel etal.A digital watermark.Proc of ICIP,1994,vol.2,86-89.
    [20]I.Pitas.A method for signature casting on digital images.Proc of ICIP,1996,vol.3,215-218.
    [21]R.G.Van schyndel,etal."A digital watermark" Proc.of ICIP,1994,Vol.2,86-89
    [22]R.B Wolfgang,E.J.Delp,A watermark for digital images.Proc.Of ICIP,1996,Vol.3,219-222.
    [23]V.Darmstaedter,J.F.Delaigle and J.J.Quisquater etal.Low cost spatial watermarking.Computer&Graphics,1998,vol.22,No.4,417-424
    [24]Nikolaidis N,Pitas I.Copyright Protection of Images Using Robust Digital Signatures[C].IEEE Proceeding on International Conference on Acoustics,Speech,and Signal Processing,Atlanta,IEEE Press,1996:2168-2171
    [25]J.Brassil,S.Low,N.Maxemchuk,Electronic Marking and Identification Techniques to Discourage Document Copying.Proc.Inforcom'94,1994:1278-1287
    [26]Bender.w,Gruh.D.Techniques for Data Hiding.Assachusetts Institute of Technology Media Lab,1998(1):186--190
    [27]J.Brassil,S.Low,N.Maxemchuk,Copyright Protection for The Electronic Distribution of text Document.Proc.IEEE,No.7,July 1999,1181 - 1196
    [28]Raymond B.Wolfgang and Edward H.Delp.A Watermark for Digital Images.Proc.Of IEEE,1996,219-222
    [29]I.J.K.O Ruanaith etal,Phase watermarking of digital images,proc.of ICIP, 1996 Vol.3,239-242
    [30]E.Koch and J.Zhao,Toward robust and hidden image copyright Labeling,Nonlinear Signal Processing Workshop,Thessaloniki,Greece,1995.
    [31]A.C.Bors and l.Pitas,Embedding parametric digital signatures in images,European Conference on Signal Processing,EUSIPC096,Trieste,Italy,1996
    [32]Cox,I J,Kilian J,Leighton F T,etal.Shamoon spread spectrum watermarking for multimedia[J].IEEE Transactions on image procession,1997,6(12):1673 -1687.
    [33]李钢,杨杰.改进的基于离散小波变换的数字水印技术,红外与激光工程,Feb.2003 vol.32 no.1:96-100.
    [34]刘九芬,黄达人,胡军全.数字水印中的双正交小波基,中山大学学报(自然科学版),2002年7月Vol.41 No.4:1-5.
    [35]Deepa Kundur,Dimitrios Hatzinakos.A robust digital image watermarking method using wavelet-based fusion,In Proceedings of the IEEE International Conference on Image Processing,1997,10(1):544-547.
    [36]Liehua Xie,Gonzalo R.Arce.Joint Wavelet Compression and Authentication Watermarking,Proceedings of the IEEE International Conference on Image Processing,ICIP'98:427-431
    [37]Inoue H,Miyazaki A,Yamamoto A,Katsura T.A digital watermark based on the wavelet transform and its robustness on image compression.Image Processing,1998 International Conference,1998,(12):391-395.
    [38]Simmons G J.The histoy of subliminal channels.IEEE Journal on selected Areas in Communications,1998.16(4):452-462
    [39]Markus Kuhn.Announcement:steganography mailing list.Steganography Mailing List.1995-07-03.http://www.cl.cam.ac.uk/users/fapp2/steganography/mailinglist.html
    [40]夏煌,郎荣玲,戴冠中,黄殿中,钱思进,“基于图象的信息隐藏分析技术综述”,计算机工程,2003年5月
    [41]王朔中,张新朋,张开文,数字密写与密写分析,清华大学出版社,2005
    [42]J.Fridrich,D.Soukal,and M.Goljan,Higher-order Statistical Steganalysis of Palette Images,Proceeding of SPIE,Security and watermarking of Multimedia contents,2003.
    [43]Fridrich J,Goljan M,Du R.Steganalysis Based on JPEG Compatibility,SPIE Multimedia Systems and Applications Ⅳ.SPIE Press,Bellingham,Wash.,2001
    [44]Westfeld A,Pfitzmann A.Attacks on Steganographic Systems.In Processing of Information Hiding,Third International Workshop,1999
    [45]Fridrich J,Du R,and Long Meng,Steganalysis of LSB Encoding in Color Images,IEEE International Conference on Multimedia and Expo,New York,USA,2000,1279-1282.
    [46]Fridrich J,Goljan M,Du R.Detecting LSB Steganography in Color and Grayscale Images.Magazine of IEEE Multimedia Special Issue on Security,2001-10/11:22-28
    [47]Liu Shaohui;Yao Hongxun;Gao Wen;Neural Network based Steganalysis in Still Images,2003 International Conference on Multimedia and Expo,Vol.2,6-9July 2003,509 -512.
    [48]J.T.Jackson,G.H.Gunsch,R.L.Claypoole,J.G.Lamont.Bind Steganography Detection using a Computational Immune System Approach:a Proposal,technical report,2002.
    [49]Jessica Fridrich,Miroslav Goljan and Rui Du.Detecting LSB steganography in color and gray-scale images.IEEE Transaction on Multimedia,8(4):22-28,Oct.-Dec.2001.
    [50]Westfeld A and Pfitzmaun A.Attacks on Steganographic Systems.Proceedings of Information Hiding:Third International Workshop,IH'99,2000.Berlin:Springer-Verlag,LNCS,vol.1768,61-76.
    [51]Provos N and Honeyman P.Detecting steganographic Content on the lnternet.Proceedings of NDSS'02:Network and Distributed System Security Symposium,2002.Reston,Virginia:Internet society,1-13.
    [52]Ranz E.Steganography preserviing Statistical properties.Proceedings of Information Hiding:5th International Workshop(IH 2002),2003.Berlin:Springer-Verlag,LNCS,vol.2578,278-294
    [53]Guo-Shiang Lin,and Wen-Nuns Lie,A Study on Detecting Image Hiding by Feature Analysis,2001
    [54]张涛,平西建,基于差分直方图实现LSB信息信息伪装的可靠检测,软件学报,Vol.15.No.1,35-41,2004
    [55]Pickholtz R,Schilling D,Milstein L.Theory of spread-spectrum communications-a tutorial[J].IEEE Transactions on communication,1988,30(5):855 - 884.
    [56]Sweldens W.The lifting scheme:A new philosophy in biorthogonal wavelet constructions[A].Proceedings of SPIE on Wavelet Applications in Signal and Image Processing Ⅲ[C].San Diego:SPIE,1995:68-79.
    [57]Lie W N,Chang L C.Robust and high-quality time-domain audio watermarking subject to psychoacoustic masking[J].The 2001 IEEE International Symposium on Circuits and Systems,ISCAS 2001,Sydney,Australia,149-152.[2007-05-08].
    [58]Lin C Y,Chang S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153 - 168.
    [59]J.S.Pan,X.M.Niu,Z.M.Lu,etal.Digital Watermarking with Gray-Level Watermarks Using Bit Decomposition and Zero trees of DCT Conficients.Processing of the Tenth National Conference on In formation Security,2000,248-254
    [60]Wang H-J,M Su.P-C.Kuo C-C.J.Wavelet-Based digital image watermarking.Optics Express,1998,3(12):491-496
    [61]Farid H.Detecting Hidden Messages Using Higher-order Statistical Models.International Conference on Image Processing,Rochester,NY,2002
    [62]SALLEEP.Model-based methods for steganography and steganalysis.[J].International Journal o f Image and Graphics,2005,5(1):167 189.
    [63]FRIDRICH J.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]// FRIDRICH J.Information Hiding,6th International Workshop.Toronto,Ontario,Canada:Springer-Verlag,2005,3200(LNCS):67-81.
    [64]平玲娣,刘祖根,史烈等,基于易变特征实现隐藏信息的盲检测,浙江大学学报(工学版),Mar.2007,vol.41,No.3,374-379

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700