高阶统计安全的隐写算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
隐写术是信息隐藏研究领域的一个重要分支,主要运用于隐秘通信。隐写将需传输的隐秘信息以尽可能不引起监控者怀疑的方式,嵌入到“无害”的载体信息中,并利用公共传输通道发送给接收方,接收方则从接收到的含密载体中,正确提取出其中隐藏的隐秘信息。相反,隐写分析则作为公共通信的监控者,对各种看似正常的通信行为进行检测和分析,从而发现隐秘通信的存在,甚至进一步提取含密载体中的隐秘信息。隐写和隐写分析技术相互对抗共同发展,均为当前信息安全研究中极为活跃和重要的组成部分,是涉及信息安全、多媒体信号处理以及模式识别等多个学科的交叉课题。隐写的安全性评估以及高安全、低感知失真和高容量的嵌入算法设计是隐写术研究的核心和难点问题。
     本文对于隐写的高阶统计安全性评价、隐写分析算法设计、高阶统计安全隐写算法设计、隐写编码技术的应用等几个关键的理论和技术问题进行了深入研究,主要研究成果如下:
     (1)针对隐写高阶统计安全性的评价问题,提出利用数字图像高阶Markov模型,刻画载体图像空域像素间相关性的方法,比较了几种常用图像扫描方式对该模型建立效果的影响,根据该模型建立了原始图像和载密图像的高阶统计测度,并进一步分析了这一测度与传统ε-secure安全性指标的关系。
     (2)通过分析载体图像空域和DCT系数域的加性和乘性四种扩频隐写算法,对嵌入前后载体像素高阶Markov模型统计分布的影响,利用模型经验矩阵提取载体像素统计分布的特征,运用支持向量机分类器,提出一种针对扩频类隐写的计算规模可调的隐写分析算法。
     (3)利用载体空域像素Markov模型统计测度公式,对LSB匹配嵌入算法进行优化,提出一种二阶统计安全的LSB匹配优化隐写算法;进而针对大规模隐写的情况,分析LSB匹配隐写对载体空域像素Markov模型统计分布的影响,利用动态补偿的方法提出一种二阶统计安全的快速LSB匹配隐写算法。
     (4)将图像高阶Markov模型扩展到载体像素预测误差域,基于Markov统计测度提出在载体像素预测误差域二阶统计安全的优化量化隐写算法;并针对大量隐写的情况,提出二阶统计安全的快速量化补偿隐写算法。
     (5)将载体局部像素复杂度与隐写编码相结合,针对载体各部分的不同特性在一簇隐写编码中选用合适的编码,提出一种基于循环隐写码的自适应图像隐写算法;进而将图像高阶Markov模型和动态补偿的思想,与基于隐写编码的自适应隐写的思路相结合,提出一种兼顾感知失真和统计安全性的自适应隐写算法。
     最后,论文分析了本文研究中还存在的问题,并指出了进一步研究的方向。
Steganography is an important branch of information hiding research, and its main purpose is covert communication. Steganography is to embed secret information which needs to be transmitted into'innocent'cover-object without causing suspicion of monitors, and send the stego-object to the receiver through public transmission channels, and the receiver correctly extract the secret information from the stego-object he received. On the contrary, steganalysis is to analyze vary kinds of'innocent'communication behavior as a communication monitor, and detect the existence of covert communication, even further to extract the secret information being transmitted. Steganography and steganalysis confront each other and co-develop. They are the interdisciplinary subjects of information security, multimedia signal processing, pattern recognition and so on as the very active and important component in the research of information security field. It is the core and difficulty problem to evaluate the security of steganography system and design the embedding algorithms with high-capacity, high-security and low distortion. This dissertation studies deeply the evaluation of high-order statistical security of steganography, the design of steganalysis algorithm, the design of high-order statistical secure steganography algorithm, and the application of cover-codes. The main contributions can be enumerated as follows:
     Firstly, for the evaluation of the high-order statistical security of steganography, a high-order Markov chain model for digital image steganography is proposed in order to characterize the correlative of the spatial adjacent pixels of cover-image. And the effect of several general image scanning methods for the model is compared. Based on the model a high-order statistical measure between the cover-image and stego-image is proposed. Moreover, the relationship of the measure and the traditionalε-secure criterion is analyzed.
     Secondly, the effect of four kinds of additive and multiplicative spread spectrum steganography in the cover-images'spatial and DCT domain on the image high-order Markov chain model is studied. Then a kind of steganalysis algorithm, against the spread spectrum image steganography is proposed which extracts image pixels'statistical features based on the empirical matrix of the high-order Markov chain model and uses support vector machine for classification.
     Thirdly, a LSB match steganography algorithm with second-order statistical security is proposed. It optimizes the embedding algorithm based on the statistical measure of image spatial pixels'Markov chain model. Furthermore, for large numbers of steganography, after analyzing the effect on the statistical distribution of the cover image spatial pixels'Markov chain model causing by LSB match embedding, a fast LSB match steganography algorithm with second-order statistical security is proposed based on the dynamic compensation idea.
     Fourthly, the image high-order Markov chain model is extended to the prediction-error domain of image pixels. In the prediction-error domain of cover image pixels, a second-order statistical secure optimized quantization steganography algorithm which based on the Markov statistical measure is proposed. Moreover, for large numbers of embedding, a fast compensated quantization embedding algorithm which maintains the second-order statistical distribution of the pixel prediction-error of cover-object is proposed.
     Finally, a self-adaptive algorithm for image steganography which reasonably uses a cluster of cyclic cover codes based on the local pixels complexity of cover image is proposed. Furthermore, a self-adaptive image steganography algorithm which takes account of the perceptual distortion and second-order statistical security is proposed. The algorithm combines the dynamic compensation method based on image high-order Markov chain model with the self-adaptive method based on cover codes.
     At last, the deficiencies in the dissertation are summarized, and some open issues in information hiding as well as the future work are presented.
引文
1. Bauer E L,吴世忠,宋晓龙,李守鹏译,密码编码和密码分析:原理与方法2001,北京:机械工业出版社.
    2. Moulin P, Koetter R, Data-hiding codes. Proceedings of the IEEE,2005.93(12):p.2083-2126.
    3.张春田,苏育挺,管晓康,多媒体数字水印技术通信学报,2000.21(9):p.46-52.
    4. Petitcolas F A P, Anderson R J, Kuhn M G, Information hiding—a survey. Proceedings of the IEEE, 1999.87(7):p.1062-1078.
    5. Lu C S, Liao H Y, Multipurpose watermarking for image authentication and protection. IEEE Transaction on Image Processing,2001.10(10):p.1579-1592.
    6. Queluz M P, Content-based integrity protection of digital images. Proceedings of SPIE:Security and Watermarking of Multimedia Contents I,1999.3657:p.85-93.
    7. Queluz M P, Spatial watermark for image content authenticaion. Journal of Electron Imaging,2002. 2002(11):p.275-285.
    8.董刚,张良,张春田,一种半脆弱性数字图象水印算法.通信学报,2003.24(1):p.33-39.
    9. Johnson N F, Duric Z, Jajodia S, Information Hiding:Steganography and Watermarking-----Attacks and Countermeasures.2001, Boston, MA:Kluwer.
    10. Veen M V D, Lemma A N, Kalker T, Electronic cotent delivery and forensic watermarking. Multimedia Systems,2005.11(2):p.174-184.
    11. Boneh D, Shaw J, Collusion-secure fingerprinting for digital data. IEEE Transaction on Information Theory,1998.44(5):p.1897-1905.
    12. Liu K J R, Trappe W, Wang Z J, et al., Multimedia Fingerprinting Forensics for Traitor Tracing.2005, Hindawi Publishing Corporation:New York.
    13. Wang Z, Wu G, Sheikh H R, et al., Quality-aware images. IEEE Transaction on Image Processing,2006. 15(6):p.1680-1689.
    14. Holliman M, Yeung M M, Watermarking for automatic quality monitoring. Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV,2002.4675:p.458-469.
    15. Kalker T, Depovere G, Haitsma J, et al., A video watermarking system for broadcast monitoring. Proceedings of SPIE:Security and Watermarking of Multimedia Contents,1999.3657:p.103-112.
    16. Lu C S, Multimedia Security:Steganography and Digital Watermarking Techniques for protoction of Intellectural Property.2004, Hershey, PA:Idea Group, Inc.
    17.王朔中,张新鹏,张开文,数字密写和密写分析——互联网时代的信息战技术2005,北京:清华大学出版社.
    18. Kelley J, Terrorist Instructions Hidden Online, in USA Today.2001.
    19. Provos N, Honeyman P, Detecting Steganographic Content on the Internet, in Proceedings of Network and Distributed System Security Symposium.2002:San Diego, CA.
    20. McCullaqh D, Secrete Messages Come in Wars, in Wired News.2001.
    21. Prasad R V, Crack the Code. The Hindustan Times,2001.
    22. Carvin A, When a Picture Is Worth a Thousand Secrets:The Debate over Online Steganography. The Digital Beat,2001.
    23. Lau S, An Analysis of Terrorist Groups'Potential Use of Electronic Steganography.2001.
    24. Kovacich G L, What InfoSec Professionals Should Know about Information Warfare Tactics by Terrorists. Computers& Security.2002.21(1-2).
    25. Simmons G J, The prisoners'problem and the subliminal channel. Proceedings of Advance in Cryptology 1983:p.51-67.
    26. Cox I J, Kalker T, Pakura G, et al., Information transmission and steganography. Lecture Notes in Computer Science:International Workshop of Digital Watermarking,2005.3710:p.15-29.
    27. Cachin C, An information-theoretic model for steganography. Information and Computation,2004. 192(1):p.41-56.
    28. Chandramouli R, Kharrazi M, Memon N D, Image steganography and steganalysis:Concepts and practice, in Lecture Notes in Computer Scence:IWDW2003.2003. p.35-49.
    29. Ker A D, Batch Steganography and the Threshold Game, in Proceedings of SPIE:Security and Watermarking of Multimedia Contents.2007, SPIE. p.650504-1-13.
    30. Zhang F, Pan Z G, Cao K, et al, The upper and lower bounds of the information-hiding capacity of digital images. Information Sciences,2008(178):p.2950-2959.
    31. Shikata J, Matsumoto T, Uncoditionally secure steganogrpahy against active attacks. IEEE Transactions on Information Theory,2009.54(6):p.2690-2715.
    32. Cheddad A, Condell J, Curran K, Paul M C, Digital image steganography:Survey and analysis of current methods. Signal Processing,2010(90):p.727-752.
    33.王朔中,张新鹏,张卫明,以数字图像为载体的臆写分析研究进展计算机学报,2009.32(7):p.1247-1263.
    34. Zollner J, Federrath H, Klimant H, et al., Modeling the security of steganographic systems. Lecture Notes in Computer Science:Information Hiding Workshop,1998.1525:p.345-355.
    35. Pevny T, Fridrich J, Benchmarking for steganography. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2008.5284:p. 251-267.
    36. Sallee P, Model-Based Steganography, in Digital Watermarking,2nd International Workshop, IWDW 2003, of Lecture Notes in Computer Science, I.J.C. T. Kalker, Y. M. Ro, Editor.2004, Springer-Verlag: Seoul, Korea. p.154-167.
    37. Sallee P, Model-based methods for steganography and steganalysis. International Journal of Image Graphics,2005.5(1):p.167-190.
    38. Wang Y, Moulin P, Steganalysis of block-structured stegotext, in Proceedings of the SPIE-The International Society for Optical Engineering.2004, SPIE:San Jose, USA. p.477-488.
    39. Chandramouli R, Memon N D, Steganography Capacity:A steganalysis perspective,. Proceedings of SPIE:Security and Watermarking of Multimedia Contents Ⅴ,2003.5020:p.173-177.
    40.陈月,王育民,基于图像模型的掩密安全性定义.哈尔滨工业大学学报,2006.38(sup.):p.901-904.
    41. Ambalavanan A, Chandramouli R, A Bayesian image steganalysis approach to estimate the embedded secret message length, in Proc. ACM Multimedia Security Workshop.2005:New York, USA. p.33-38.
    42.刘光杰,戴跃伟,孙金生,等,基于Chernoff信息的隐写系统的统计安全性.哈尔滨工业大学学报,2006.38(supp):p.780-783.
    43. Sullivan K, Madhow U, Chandrasekaran S, et al, Steganalysis for Markov cover data with applications to images. IEEE Transaction on Information Forensics and Security,2006.1(2):p.275-287.
    44.郭艳卿,何德全,尤新刚,孔祥维,信息隐藏德层次安全性.中山大学学报(自然科学版),2004.43(s2):p.105-108.
    45.林代茂,胡岚,郭云彪,周琳娜,广义信息隐藏技术的安全问题.中山大学学报(自然科学版),2004. 43:p.14-16.
    46.林代茂,胡岚,郭云彪,周琳娜,广义信息隐藏技术的机理与模型.北京邮电大学学报,2005.28(1):p.1-5.
    47. Katzenbeisser S, Petitcolas F A P, Defining security in steganographic systems. Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV,2002.4675:p.50-56.
    48. Hopper N J, Langford J, Ahn L V,, Provably secure steganography(Extended Abstract). Lecture Notes in Computer Science:Annual International Cryptology Conference on Advances in Cryptology 2002. 2442:p.77-92.
    49.刘春庆,李忠新,王执铨,隐秘通信系统的对策论模型通信学报,2004.25(5):p.160-165.
    50.刘光杰,戴跃伟,赵玉鑫,等,臆写对抗的博弈论建模.南京理工大学学报(自然科学版),2008.32(2):p.199-204.
    51. Luo X Y, Wang D S, Wang P, A review on blind detection for image steganography. Signal Processing, 2008.88(9):p.2138-2157.
    52. Girod B, Digital Images and Human Vision.1993, Cambridge, MA:MIT Press.
    53. Eskicioglu A M, Fisher P S, Image quality measures and their performance. IEEE Transaction on Communication,1995.43(12):p.2959-2965.
    54. Eckert M P, Bradley A P, Perceptual quality metrics applied to still image compression. Signal Processing,1998(70):p.177-200.
    55. Winkler S, A perceptual distortion metric for digital color video. Proceedings of SPIE:Human Vision and Electronic Imaging Conference,1999.3644:p.175-184.
    56. Wang Z, Bovik A C, Lu L, Why is image quality assessment so difficult. Proceedings of International Conference on Acoustics, Speech, and Signal Processing,2002.4:p.3313-3316.
    57. Mannos J L, Sakrison D J, The effects of a visual fidelity criterion on the encoding of images. IEEE Transaction on Information Theory 1974. IT-4:p.525-536.
    58. Pappas T N, Safranek R J, Perceptual criteria for image quality evaluation, in Handbook of Image and Video Processing.2000, Academic:New York.
    59. Wang Z, Sheikh H R, Bovik A C, Objective video quality assessment, in Handbook of Video Databases: Design and Application.2003, CRC Press:Boca Raton.
    60. Winkler S, Issue in vision modeling for perceputal video quality assessment. Signal Processing,1999. 78(2):p.231-252.
    61. Waston A B, DCT quantization matrices visually optimized for individual images. Proceedings of SPIE, 1993.1913.
    62. Waston A B, Hu J, McGowan III J F, DVQ:a digital video quality metric based on human vision. Journal of Electron Imaging,2001.10(1):p.20-29.
    63. Waston A B, Yang G J, Solomon J A, et al, Visibility of wavelet quantization noise. IEEE Transaction on Image Processing,1997.6:p.1164-1175.
    64. Bradley A P, A wavelet visible difference predictor. IEEE Transaction on Image Processing,1999.5:p. 717-730.
    65. Lai Y K, Kuo C C J, A Harr wavelet approach to compressed image quality measurement. Journal of Vision Communication and Image representation,2000.11:p.17-40.
    66. Wang Z, Bovik A C, Sheikh H R, et al., Image quality assessment:From error visibility to structural similarity. IEEE Transaction on Image Processing,2004.13(4):p.600-612.
    67. Wang Z, Bovik A C, A universal image quanlity index. IEEE Signal Processing Letters,2002.9:p. 81-84.
    68. Kong X W, Chu R F, Ba X H, et al., A perception evaluation scheme for steganography. Lecture Notes in Computer Science:Intelligent Data Engineering and Automated Learning 2003.2690:p.426-430.
    69. Trivedi S, Chandramouli R, Active Steganalysis of Sequential Steganography, in Proceedings of SPIE: Security and Watermarking of Multimedia Contents.2003, SPIE. p.123-130.
    70. Trivedi S, Chandramouli R, Secret key estimation in sequential steganography. IEEE Transaction on Signal Processing,2005.53(2):p.746-757.
    71. Westfeld A, Pfitzmann A, Attacks on steganographic systems. Lecture Notes In Computer Science: Information Hiding Workshop 1999.1768:p.61-76.
    72. Machado R. EiStego. Available from:http://www.stego.com/.
    73. Bender W, Gruhl D, Morimoto N, et al., Techniques for data hiding. IBM System Journal,1996.35(3/4): p.313-336.
    74. Sharp T, An implementation of key-based digital signal steganography, in Proceedings of the Information Hiding Workshop.2001:Pittsburgh, PA, USA. p.13-26.
    75. Provos N. OutGuess.2004; Available from:www.outguess.org.
    76. Westfeld A, F5—a steganographic algorithm. Lecture Notes in Computer Science:Information Hiding Workshop,2001.2137:p.289-302.
    77. Hsu C T, Wu J L, Hidden Digital Watermarks in Images. IEEE Trans, on Image Processing,1999(8):p. 58-68.
    78. Fridrich J, Goljan M, Du R, Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia,2001(special issue on Security):p.22-28.
    79. Fridrich J, Goljan M, Practical Steganalysis of Digital Images-State of the Art, in Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE.2002, SPIE:San Jose, USA. p.1-13.
    80. Fridrich J, Goljan M, Hogea D, Steganalysis of JPEG images:breaking the F5 algorithm. Lecture Notes in Computer Science:Information Hiding Workshop,2002.
    81. Fridrich J, Goljan M, Hogea D, et al., Quantitative steganalysis of digital images:esitmating the secret message length. ACM Multimedia System Journal:Special Issue on Multimedia Security,2003.19(3): p.288-302.
    82. Fridrich J, Goljan M, Hogea D, New methodology for breaking steganographic techniques for JPEGs. Proceedings of SPIE:Security and Watermarking of Multimedia Contents V,2003.
    83.张新鹏,王朔中,张开文,基于统计特性的LSB密写分析应用科学学报,2004.22(1):p.16-19.
    84.张新鹏,王朔中,对OPA密写的检测和增强安全性的调色板图像密写方案.电子学报,2004.32(10):p.1702-1705.
    85. Zhang X P, Wang S Z, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition Letters,2004.25:p.331-339.
    86. Kawaguchi E, Eason R O, Principle and Application of BPCS-Steganography, in Proceedings of SPIE: Multimedia Systems and Applications.1998, SPIE. p.464-472.
    87.张新鹏,王朔中,对空域BPCS密写的统计分析.计算机辅助设计与图形学学报,2005.17(7):p.1625-1329.
    88. Dumitrescu S, Wu X L, Wang Z, Detection of LSB steganography via smaple pair analysis. IEEE Transactions on Signal Processing,2003.51(7):p.1995-2007.
    89. Harmsen J, Bowers K, Pearlman W, Fast additive noise steganalysis, in Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI.2004, SPIE. p.489-495.
    90. Ker A D, Steganalysis of LSB Matching in Grayscale Images. IEEE SIGNAL PROCESSING LETTERS,2005.12(6):p.441-444.
    91. Ker A D, Resampling and the detection of LSB matching in color bitmaps, in Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII.2005. p.1-15.
    92. Ker A D, A general framework for the structural steganalysis ofLSB replacement, in Proceedings of the 7th Information Hiding Workshop.2005. p.296-311.
    93. Ker A D, Improved detection of LSB steganography in grayscale images, in Proceedings of the 6th Information Hiding Workshop.2004. p.97-115.
    94. Ker A D, Fourth-order structural steganalysis and analysis of covert assumptions. Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents VIII,2006.6072:p.25-38.
    95. Bohme R, Ker A D, A two-factor error model for quantitative steganalysis, in Proceedings of the SPIE, Security, Steganography, and Watermarking of of Multimedia Contents VIII.2006, SPIE. p.59-74.
    96. Ker A D, Derivation of error distribution in least squares steganalysis. IEEE Transactions on Information Forensics and Security,2007.2(2):p.140-148.
    97. Ker A D, Optimally weighted least-squares steganalysis, in Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX.2007, SPIE. p.601-616.
    98. Zhang T, Ping X J, A new approach to reliable dtection ofLSB steganography in natural images. Signal Processing,2003.83(10):p.2085-2093.
    99. Dabeer O, Sullivan K, Madhow U, et al., Detection of hiding in the least significant bit. IEEE Trans. Signal Processing, Supplement on Secure Media 1,2004.52(10):p.3046-3058.
    100.夏煜,郎荣玲,戴冠中,黄殿中,钱思进,基于数字图像嵌入的检测算法.计算机工程,2004.30(4):p.11-13.
    101.刘文芬,管伟,曹佳,张卫明,基于污染数据分析实现LSB秘密消息的检测计算机研究与发展,2006.43(6):p.1058-1064.
    102. Marvel L M, Boncelet C G, Retter C T, Spread spectrum image steganography. IEEE Transaction on Image Processing,1999.8(8):p.1075-1073.
    103. Harmsen J, Pearlman W, Steganalysis of additive-noise modelable information hiding, in Proceedings of the SPIE, Security Watermarking Multimedia Contents.2003, SPIE. p.131-142.
    104. Chandramouli R, Subbalakshmi K P, Active steganalysis of spread spectrum image steganography, in Proceedings of the 2003 IEEE International Symposium on Circuits and Systems.2003, IEEE:Bangkok, Thailand, p.830-833.
    105. Ji R R, Yao H X, Liu S H, et al, A new steganalysis method for adaptive spread spectrum steganography, in Proceedings-2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2006, IEEE:Pasadena, USA.
    106. Sullivan K, Madhow U, Chandrasekaran S, et al, Steganalysis of spread spectrum data hiding exploiting cover memory, in Proceedings of SPIE-The International Society for Optical Engineering.2005, SPIE: San Jose, CA, USA. p.38-46.
    107. He J H, Huang J W, Steganalysis of stochastic modulation steganography Science in China Series F-Information Sciences,2006.49(3):p.273-285.
    108. Fridrich J, Goljan M, Digital image steganography using stochastic modulation, in Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents V.2003, SPIE:Santa Clara, Cuba. p.191-202.
    109.周继军,杨著,钮心忻,杨义先,文本信息隐藏检测算法研究通信学报,2004.25(12):p.97-101.
    110.郭云彪,张春田,尤新刚,二值图像信息隐藏分析.天津大学学报,2005.38(12):p.1088-1090.
    111. Liu S H, Yao H X, GAO W, Steganalysis techniques based on wavelet texture analysis and neural network. Proceedings of World Congress on Intelligent Control and Automation,2004:p.4066-4069.
    112.刘绍辉,姚鸿勋,高文,姜峰,针对小波域量化隐藏方法的图像检测技术研究通信学报,2004.25(7):p.71-77.
    113.于小亿,谭铁牛,王蕴红,基于模型的信息隐藏检测研究.中山大学学报,2004.43(s2):p.185-189.
    114. Farid H, Detecting hidden message using higher-order statistical models. Proceedings of IEEE International Conference on Images Processing,2002.2:p.905-908.
    115. Ozer H, Avicibas I, Sankur B, et al., Steganalysis of audio based on audio quality metrics. Proceedings of SPIE:Security and Watermarking of Multimedia Contents V,2003.5020:p.55-66.
    116. Liu S H, Yao H X, Gao W, Neural network based steganalysis in still images. Proceedings of International Conference on Multimedia& Expo,2003:p.509-512.
    117. Chandramouli R, Framework for active steganalysis. ACM Multimedia System Journal:Special Issue on Multimedia Security,2003.9(3):p.301-311.
    118.张卫明,刘九芬,李世取,LSB隐写术的密钥恢复方法中山大学学报,2005.44(3):p.29-33.
    119. Zhang W M, Li S Q, Cao J, Information-theoretic analysis for the difficulty of extracting hidden information. Wuhan University Journal of Natural Science,2005.10(1):p.315-318.
    120. Fridrich J, Goljan M, Soukal D, Searching for the Stego-Key. Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents VI,2004.5306:p.70-82.
    121. Fridrich J, Goljan M, Soukal D, et al., Forensic Steganalysis:Determining the Stego Key in Spatial Domain Steganography Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents VII,2005.5681:p.631-642.
    122. Luo X Y, Liu B, Liu F L, A dynamic compensation LSB steganography resisting RS steganalysis. Proceedings of the IEEE SoutheastCon,2006:p.244-249.
    123. Fridrich J, Goljan M, Du R, Steganalysis based on JPEG compatibility. Proceedings of SPIE: Multimedia Systems and Applications IV,2001.4518:p.275-280.
    124. Westfeld A, Detecting low embedding rates. Lecture Notes in Computer Science:Information Hiding Workshop,2002.2578:p.324-339.
    125. Lyu S, Farid H, Steganalysis using higher-order image statistics. IEEE Transaction on Information Forensics and Security,2006.1(1):p.111-119.
    126. Lyu S, Farid H, Steganalysis using color wavelet statistics and one-class support vector machines, in Proc. IST/SPIE 16th Annu. Symp. Electronic Imaging Science Technology.2004, SPIE:San Jose, CA, USA. p.35-45.
    127. Tzschoppe R, Bauml R, Huber J B, et al., Steganographic system based on higher-order statistics, in Proceedings of SPIE:Security and Watermarking of Multimedia Contents V.2003, SPIE. p.156-166.
    128. Jackson J T, Directorate M, Gunsch G H, et al, Detecting novel steganography with an anomaly-based strategy. Journal of Electronic Imageing,2004.13(4):p.860-870
    129. McBride B T, Peterson G L, Gustafson S C, A new blind method for detecting novel steganography. Digital Investigation,2005.2(1):p.50-70.
    130. Holotyak T, Fridrich J, Voloshynovskiy S, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security.2005. p.273-284.
    131. Goljan M, Fridrich J, Holotyak T, New blind steganalysis and its implications. Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents VIII,2006.6072.
    132. Pevny T, Fridrich J, Multi-class blind steganalysis for JPEG images. Proceddings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents VIII,2006.6072.
    133. Knapik T, Lo E, Marsh J A, Application of genetic algorithm to steganalysis. Proceedings of SPIE:Modeling and Simulation for Military Applications,2006.6228.
    134. Xuan G R, Shi Y Q, Gao J, et al., Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions Lecture Notes in Computer Science:International Workshop on Digital Watermarking,2005.3727:p.262-277.
    135.黄聪,宣国荣,高建炯,施云庆,基于模式识别的多类隐写分析计算机工程与应用,2006(27):p.43-45.
    136. Wang Y, Moulin P, Statistical modelling and steganalysis of DFT-based image steganography. Proceedings of SPIE:Securiry, Steganography, and Watermarking of Multimedia Contents VIII,2006. 6072.
    137.黄聪,宣国荣,高建炯,施云庆,基于DCT域共生矩阵的JPEG图像隐写分析计算机应用,2006.26(12):p.2863-2865.
    138. Avicibas I, Memon N, Sankur B, Steganalysis using image quality metrics. IEEE Transactions on Image Processing,2003.12(2):p.221-229.
    139.张开文,张新鹏,王朔中,图像及音频信号中隐蔽嵌入信息存在性的统计检验.电子与信息学报,2003.25(7):p.872-878.
    140.宋华,尤新刚,戴一奇,基于SVM的JPEG图像隐密分析研究计算机工程,2006.32(10):p.6-8.
    141. Dong J, Tan T N, Blind Image Steganalysis Based on Run-Length Histogram Analysis.
    142. Lie W, Lin G, A feature2 based classification technique for blind image steganalysis. IEEE Transactions on Multimedia,2005.7(6):p.1007-1020.
    143. Chang C C, Tseng H W, A steganographic method for digital images using side match. Pattern Recognition,2004.25(12):p.1431-1437.
    144. Wu D C, Tsai W H, A steganographic method for images by pixel-value differencing. Pattern Recognition Letters,2003.24(9-10):p.1613-1626.
    145. Ming C, Wu N I, A high quality steganographic method with pixelvalue differencing and modulus function. Journal of Systems and Software,2008.81(1):p.150-158.
    146. Wang R Z, Lin C F, Lin J C, Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition,2001.34(3):p.671-683.
    147. Chang C C, Hsiao J Y, Chan C S, Finding optiaml least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition,2003.36(7):p.1583-1595
    148. Lee Y K, Chen L H, High capacity image steganographic model. IEE Proceddings of Visual Image Signal Processing,2000.147(3):p.288-294.
    149. Zhong H, Jiao L C, Liu F, New least-significant-bit-based steganographic model. Optical Engeering, 2003.42(7):p.2082-2091.
    150. Wang R Z, Lin C F, Lin J C, Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters,2002.35(25):p.2069-2070.
    151. Zhang X P, Wang S Z, Steganography using multiple-base notational system and human vision sensitivity. IEEE SIgnal Processing Letters,2005.12(1):p.67-70.
    152. Liu G J, Wang J W, Lian S Q et al, Data hiding in neural network prediction! errors. Lecture Notes in Computer Scence:ISNN2006,2006(3973):p.273-278.
    153.戴跃伟,刘光杰,叶曙光,基于Hilbert填充曲线的自适应隐写电子学报,2008.37(12A):p.77-80.
    154. Liu G J, Dai Y W, Wang J W, et al, Image hiding by non-uniform generalized LSB substitution and dynamic programming, in Proceedings of IEEE International Workshop on Multimedia Signal Processing.2005, IEEE. p.469-472.
    155. Liu G J, Lian S G, Dai Y W, et al, Perceptual steganography based on adaptive quantization embedder, in Proceedings of IEEE International Conference on Computational Intelligence and Secruity.2007, IEEE. p.644-647.
    156. Park Y R, Kang H H, Shin S U, et al, A steganographic scheme in digital images using information of neighboring pixels. Lecture Notes in Computer Scence:ICNC2005,2005(3612):p.962-967.
    157. Yang C Y, Lin J C, Image hiding by base-oriented algorithm. Optical Engeering,2006.45(11):p. 1170071-117001 10.
    158. Moulin P, Briassouli A, A sotochatic QIM algorithm for robust, undetectable image watermarking. Proceedings of International Conference on Image Processing,2004.2:p.1173-1176.
    159. Yuan Q, Yao H X, Gao W, et al., Blind-watermarking method based on DWT middle frequency pair. Proceedings of IEEE International Conference on Multimedi& Expo,2002.2:p.473-476.
    160. Chang C C, Chen T S, Chung L Z, A steganographic method based upon JPEG and quantization table modification. Information Science,2002.141(1):p.123-138.
    161. Tseng H W, Chang C C, Steganography using JPEG-compressed images. Proceedings of International Conference on Computer and Information Technology,2004:p.12-17.
    162. Sehgal A, Jagmohan A, High capacity data embedding in the wavelet domain. Proceedings of International Confernce on Image Processing,2001.3(979-982).
    163.张荣跃,倪江群,黄继武,基于小波域HMM模型的稳健多比特图像水印算法.软件学报,2006.16(7):p.1323-1332.
    164. Tolba M F, Ghonemy MAS, Khalifa A S, High capcity image steganography using wavelet-based fusion. Proceedings of International Symposium on Computers and Communications,2004.1:p. 430-435.
    165. Su P C, Jay-Kuo C C, Steganography in JPEG2000 compressed images. IEEE Transaction on Consumer Electronics,2003.49(4):p.824-832.
    166.张新鹏,王朔中,张开文,抗统计分析的LSB密写方案.中国图像图形学报,2003.8A(9):p.1054-1059.
    167. Liu N, Amin P, Subbalakshmi K P, Secure quantization based data embedding. Proceedings of IEEE Multimedia Signal Processing,2005:p.509-512.
    168.陈宇,曲芳,陈钟,抗统计分析的随机LSB密写方案,in第七届全国信息隐藏暨多媒体信息安全学术大会会议论文集.2007:南京.p.6-11.
    169.张涛,平西建,空域LSB信息伪装的隐写分析及其对策.通信学报,2003.24(12):p.156-163.
    170. Chu R F, You X G, Kong X W, et al, A DCT-based image steganographic method resisting statistical attacks, in Proceedings of International conference on Acoustics, Speech, and Signal Processing.2004. p.953-956.
    171. Solanki K, Sarkar A, Manjunath B S, YASS:Yet another steganographic scheme that resists blind steganalysis, in Information Hiding,9th International Workshop, to appear in Lecture Notes in Computer Science, T. Furon, Editor.2007, Springer-Verlag:Saint Malo, France, p.16-31.
    172. Sarkar A, Solanki K, Manjunath B S, Further study on YASS:steganogrpahy based on randomized embedding to resist blind steganalysis, in Proceedings of SPIE:Security and Watermarking of Multimedia Contents.2008, SPIE. p.6819171-11.
    173. Luo W Q, Huang F J, Huang J W, A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications,2010:p. DOI:10.1007/s 11042-009-0440-3.
    174. Eggers J J, Bauml R, Girod B, A Communications approach to image steganography. Proceedings of SPIE:Security and Watermarking of Multimedia Contents IV,2002.4675:p.26-37.
    175. Zhang X P, Wang S Z, Zhang K W, Steganography with least histogram abnormality. Lecture Notes in Computer Science:International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security,2003.2776:p.395-406.
    176.张雷,平西建,张涛,一种统计特性保持的图像信息伪装算法.计算机辅助设计与图形学学报,2005.17(1):p.99-104.
    177. Luo X Y, Hu Z Y, Yang C, et al., A secure LSB steganography system defeating sample pair analysis based on chaos system and dynamic compensation. Proceedings of International Conference on Advanced Communication Technology,2006.2:p.1014-1019.
    178. Liu G J, Lian S G, Ren Z, et al, Image steganography based on quantization-embedders combination, in Multimedia and Expo,2007 IEEE International Conference.2007. p.1115-1118.
    179. Lu Y F, Li X L, Yang B, A ±1-based steganography by minimizing the distortion of first order statistics, in Proceedings of Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2009. p.60-64.
    180. Chen Z H, Liu W Y, Improved LSB matcing steganography with histogram characters reserved, in Proceedings of SPIE:Information Optics and Photonics Technologies.2007, SPIE. p.6837X_1-8.
    181. Amin P K, Liu N, Subbalakshmi K P, Statistically secure digital image data hiding. Proceedings of IEEE Multimedia Signal Processing,2005:p.497-500.
    182. Sullivan K, Solanki K, Manjunath B S, Determining Achievable Rates for Secure, Zero Divergence, Steganography, in Image Processing,2006 IEEE International Conference.2006, IEEE. p.121-124.
    183. Sarkar A, S.K., Madhow U, et al., Secure Steganography:Statistical Restoration of the Second Order Dependencies for Improved Security, in Acoustics, Speech and Signal Processing,2007. IEEE International Conference.2007. p.277-280.
    184.张石树,汤光明,一种保持频域高阶统计特征不变的隐写算法.计算机工程,2008.34(17):p.149-153.
    185. Galand F, Kabatiansky G, Information hiding by coverings, in Proceedings of IEEE Information Theory Workshop.2003, IEEE. p.151-154.
    186. Zhang W M, Li S Q, A coding problem in steganography. Designs, Codes and Cryptography,2008(46): p.67-81.
    187. Crandall R. Some notes on steganography. Posted on Steganography Mailing List 1998; Available from:http://os.inf.tu-dresden.de/-westfeld/crandall.pdf.
    188. Dijk M, Willems F, Embedding Information in Grayscale Images, in Proc.22nd Symp. Inform. Theory in the Benelux.2001:Enschede, The Netherlands, p.147-154.
    189. Bierbrauer J, Fridrich J, Constructing good covering codes for applications in steganography. LNCS Transaction on Data Hiding Multimedia Security,2008.4902:p.1-22.
    190. Fridrich J, Soukal D, Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security,2006.1(3):p.390-395.
    191. Fridrich J, Goljan M, Lisonek P, et al., Writing on wet paper. IEEE Transaction on Signal Processing, 2005.53(10):p.3923-3935.
    192. Fridrich J, Filler T, Practical methods for minimizing embedding impact in steganography, in Proceedings of SPIE:Security, Steganography, and Watermarking of Multimedia Contents.2007, SPIE. p.2-13.
    193. Schonfeld D, Winkler A, Embedding with syndrome coding based on BCH codes, in Procedinds of ACM8th Workshop on Multimedia andSecurity.2006. p.214-223.
    194. Munuera C, Steganography and error-correcting codes. Signal Processing,2007(87):p.1528-1533.
    195. Zhang X P, Wang S Z, Generalized Running Coding with Prime Base for Efficient Steganographic Embedding. Journal of Applied Sciences-Electronics and Information Engineering,2009.27(1):p. 51-55.
    196. Zhang W M, Wang S Z, Zhang X P, Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE COMMUNICATIONS LETTERS,2007.11(8):p.680-682.
    197.张新鹏,王朔中,基于稀疏表示的密写编码电子学报,2007.35(10):p.1892~1896.
    198. Willems F, Dijk M, Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory,2005.51(3):p.1209-1214.
    199. Zhang X P, Wang S Z, Efficient steganographic embedding by exploiting modification direction. IEEE Communication Letters,2006.10(11):p.781-783.
    200. Fridrich J, Lisonek P, Grid Coloring in Steganography. IEEE Transactions on Information Theory,2007. 53(4):p.1547-1549.
    201. Mielikainen J, LSB matching revisited. IEEE Signal Processing Letters,2006.13(5):p.285-287.
    202.刘九芬,李玉辉,陈嘉勇等,基于三元Golay隐写码的快速隐写算法计算机工程,2008.34(24):p.149~151.
    203. Zhang W M, Zhang X P, Wang S Z, A double layered "plus-minus one" data embedding scheme. IEEE Signal Processing Letters,2007.14(11):p.848-851.
    204. Zhang X P, Zhang W M, Wang S Z, Efficient double-layered steganographic embedding. IET Electronic Letters,2007.43(8):p.482-483.
    205. Zhang W M, Zhang X P, Wang S Z, Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).2008, Springer-Verlag: Santa Barbara, CA, USA. p.60-71.
    206. Fridrich J, Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Inf. Forensics Security,2009.4(1):p.151-154.
    207. Zhang W M, Wang X, Generalization of the ZZW Embedding Construction for Steganography. IEEE Trans. Inf. Forensics Security,2009.4(3):p.564-569.
    208. Bishop Y M, Fienberg S E, Holland P W, Discrete Multivariate Analysis:Theory and Practice.2007, New York, USA:Springer-Verlag.267-270.
    209. Hogan M T, Hurley N J, Silvestre G C M, et al., ML detection of steganography, in Proc. SPIE Symp.EIS&T.2005, SPIE:San Jose, USA. p.16-27.
    210. University of Southern California. USC-SIPI Image Database.1981; Available from: http://sipi.usc.edu/services/database/index.html.
    211. Schaefer G, Stich M. UCID-An Uncompressed Colour Image Database.2004; Available from: http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html.
    212. Cox I J, Kilian J, Leighton T, et al., Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing,1997.6(12):p.1673-1687.
    213. Liu G J, Wang J W, Dai Y W, Wang Z Q, On sequence synchronization analysis against chaos based spread spectrum image steganography. Lecture Notes in Computer Science,2005.3612:p.976-979.
    214.刘光杰,戴跃伟,王金伟,王执铨,随机调制隐写中的噪声同步分析控制与决策,2006.21(5):p.572-575.579.
    215. Li C R, Zeng W, Ai H J, et al., Steganalysis of Spread Spectrum Hiding Based on DWT and GMM, in Proceedings-International Conference on Networks Security, Wireless Communications and Trusted Computing 2009.2009:Wuhan, China, p.240-243.
    216. Pevny T, Fridrich J, Toward multi-class blind steganalyzer for JPEG images, in Lecture Notes Comput. Set:Proc. Int. Workshop Digital Watermarking.2005, Springer-Verlag. p.39-53.
    217. Lie W, Chang L, Data Hiding In Images with Adaptive Numbers of Least Significant Bits Based on the Human Visual System, in Proc. IEEE Int. Conf. Images Processing.1999, IEEE:Kobe, Japan, p. 286-290.
    218. Hartung F, K.M. Multimedia Watermarking Techniques, in Proc. IEEE.1999.
    219. Petitcolas F A P, Anderson R J, Evaluation of Copyright Marking Systems, in Proc. IEEE Multimedia Systems.1999, IEEE:Florence, Italy, p.574-579.
    220. Liu G J, Zhang Z, Dai Y W, Wang Z Q, GA-based LSB matching hold second-order statistics, in Proceedings of International Conference on Multimedia Information Networking and Security.2009. p. 510-513.
    221. Yu Y H, Chang C C, Hu Y C, Hiding secret data in images via predictive coding. Pattern Recognition, 2005.38(5):p.691-705

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700