视频数字隐写与隐写分析技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏是互联网时代信息安全领域的重要研究内容之一。作为信息隐藏技术的重要分支,数字隐写研究如何将秘密信息以不引起第三方注意的方式隐藏到公开的数字媒体中,并在公共信道中进行传输,亦即隐蔽通信问题。与数字隐写相对抗的技术被称作隐写分析,通过分析来检测被怀疑对象中是否存在隐藏信息。视频是互联网上常见的数字媒体形式,与图像等媒体形式相比,视频由一系列的帧序列组成,具有更大的可用载体空间。视频压缩编码技术和网络流媒体业务的发展,使得视频的应用范围越来越广,如视频点播、视频会议,以及随着家用摄像机的日益普及和各种操作简便的视频编辑软件的应用,人们可以方便的进行视频的录制、剪辑并在网络上发布、交流,从而使得网络上的视频传输越来越常见,因此有必要开展视频数字隐写以及与之相对抗的隐写分析技术的研究。
     本文针对信息安全的技术发展和应用需求,在深入分析视频数据特点的基础上,研究以压缩视频为载体的数字隐写方法以及针对具体隐写方法的隐写分析。本文的工作和取得的研究成果主要包括以下四个方面。
     1.基于运动矢量的压缩视频数字隐写算法研究:针对压缩视频流中存在大量运动矢量数据的特点,提出一种以压缩视频为载体的基于运动矢量的数字隐写算法。该算法在对典型的基于运动矢量的信息嵌入方法进行分析的基础上,按照GOP的顺序,采用冗余嵌入和控制信息嵌入相结合的方法,在帧间编码帧的运动矢量中以冗余嵌入的方式重复嵌入要传输的秘密信息,并在每帧中嵌入索引信息以对抗帧同步攻击,同时将与冗余嵌入有关的信息作为控制信息嵌入到对帧内编码帧进行编码的DCT系数中。实验结果表明,该算法在保持载密视频质量的前提下,能够有效抵抗帧添加、帧删除等帧同步攻击。
     2.基于纠错码的压缩视频数字隐写算法研究:在对MPEG压缩视频数据进行分析的基础上,针对在采用差分编码的系数中嵌入信息后还需进行差值补偿的特点,提出了一种在压缩视频流中不采用差分编码的DCT系数中嵌入信息的数字隐写算法。该算法根据纠错码数字隐写的原理,采用二次嵌入的策略,首先将秘密信息嵌入纠错码码字,然后将得到的载密纠错码码字嵌入到与没有采用差分编码的系数相对应的行程幅度对的幅度值中,并在秘密信息嵌入过程中采用视频流长度控制策略。实验结果表明,该算法在确保一定隐藏容量的前提下,具有较好的视觉不可感知性和统计不可感知性,同时能够使得秘密信息嵌入前后的视频流长度近似保持不变。
     3.针对视频隐写软件MSU StegoVideo的隐藏信息检测与主动攻击方法研究:视频信息隐藏软件MSU StegoVideo采用了一种具有较强鲁棒性的嵌入算法,可以将多种类型的其它文件隐藏到AVI格式视频中,即使对载密视频进行二次压缩,仍能以较高准确率将秘密信息提取出来。在对该软件的隐藏原理进行分析的基础上,在唯载密攻击的条件下,根据嵌入信息后的数据分布特点,提出了基于块效应分布不均匀性和边界不连续性差异的隐藏信息检测方法,以及基于相邻帧帧间共谋的主动攻击方法。实验结果表明,隐藏信息检测方法能够实现对视频中隐藏信息存在性的有效检测,主动攻击方法能够在不影响视频质量的前提下,有效去除利用该软件嵌入的隐藏信息。将两种方法相结合,可以检测并破坏利用MSU StegoVideo实施的隐蔽通信。
     4.基于时空相关性的视频隐写分析方法研究:时间相关性和空间相关性是视频序列的基本属性,针对视频中的扩频隐写算法,将隐写过程建模为加性高斯噪声的叠加过程,分析了噪声叠加对时间相关性和空间相关性的影响,提出了基于时空相关性的隐写分析方法。该方法利用视频序列中各帧的水平、垂直、正对角和反对角四个方向的差分直方图度量隐写对空间相关性的影响,同时利用相邻帧帧间差分的直方图度量隐写对时间相关性的影响,然后根据隐写前后的差分直方图变化,使用从直方图获得的统计参数作为特征向量来辨识隐写前后的时空相关性变化,最后利用SVM对特征向量进行训练和分类,从而达到隐写分析的目的。实验结果表明,该方法对于未压缩视频和压缩视频,均能实现隐藏信息存在性的有效检测,同时空间相关性和时间相关性的有效结合,提高了检测性能。
Information hiding is one of important research subjects in the field of information security. As a main branch of information hiding, steganography has received significant attention from both industry and academia. Steganography is the art of concealing the very existence of communications by embedding the secret information into the open digital media, such as digital image, digital video, and so on. The technique opposed to steganography is called steganalysis, the purpose of which is to expose the presence of secret information. Digital video is one kind of familiar digital media on the Internet. With the development of video compression technique and stream media operation, the application area of video is more and more widely, for example, video on demand and video conference. Moreover, the gradual prevalence of portable video camera and the video edit software, people can easily record, edit and release video on the Internet, which makes the video transmission more frequently. In addition, the characteristics of large data amount, abundant content and complicated statistics for video make it must be an important carrier for steganography. Consequently, it is of great importance to study the technique of video steganography and the opposed technique - video steganalysis.
     Keeping up with the newly developed techniques of steganography and staganalysis, and according to the analysis to video data, this thesis focus on the techniques of video steganography and video steganalysis. The main contributions of this thesis are summarized as follows:
     1. A steganographic method in compressed video stream based on motion vector. According to the fact that there are abundant motion vectors in video stream, a steganographic method based on motion vector is proposed. On a GOP by GOP basis, the strategy of redundant embedding and control information embedding is utilized to resist frame synchronization attacks. The secret information is embedded into the motion vectors of inter-encoded frames by redundant embedding firstly, then the control information generated during redundant embedding is embedded into the DCT coefficient of intra-encoded frames. Experimental results show the method can keep the quality of stego video, and resist the temporal synchronization attacks as frame inserting and frame dropping.
     2. A steganographic method in compressed video stream based on error-correction code. According to the thorough analysis to MPEG compressed video data, a steganographic method for embedding secret information in DCT coefficients which are not differential encoded is proposed. Utilizing the principle of steganography based on error-correction code, a strategy of two-time embedding is designed to embed secret information. That’s to say, the secret information is firstly embedded into the error-correction codeword, then by modifying the level value of run-level pair corresponding to the DCT coefficient which is not differential encoded, the stego codeword obtained by first time embedding is secondly embedded. Moreover, measures are taken for the purpose of preserving the video stream size. Experimental results show the method has a good visual and statistical imperceptibility, and can keep the nearly invariant size of video stream.
     3. A hidden information detection method and an active attack method for MSU StegoVideo. MSU StegoVideo is an open video steganography software on the Internet, the embedding algorithm of which has a strong robustness. By the experiment of data embedding and extraction, the embedding mechanism is revealed and the distribution characteristic of the embedded data is analyzed. According to the analysis, on the condition of stego-only attack, a hidden information detection method utilizing the asymmetric distribution of block artifacts and the difference of edge discontinuity, and an active method based on inter-frame collusion is proposed. Experimental results show the detection method can accurately find the existence of hidden information, and the active attack can effectively destroy the hidden information on the premise that the video quality is preserved. The two methods can be combined to detect and destroy the covert communication which is executed by MSU StegoVideo.
     4. A video steganalysis method based on spatial-temporal correlation. Temporal correlation and spatial correlation are basic characteristics of video sequence. Aimed at spread-spectrum embedding for video which can resist many attacks such as video compression and noise addition, the data embedding is modeled as the addition of additive Gaussian noise. By analyzing the influence to temporal correlation and spatial correlation of video owing to noise addition, a steganalysis method based on spatial-temporal correlation is proposed. The method uses difference image histogram of four directions to measure the influence of spatial correlation, and temporal correlation is measured by the histogram of frame difference. According to the difference of the histograms after data embedding, the statistical parameters derived from the histograms are used as feature vectors to differentiate the change of spatial and temporal correlation. In the end, the stego video can be discriminated from the cover video by using SVM classifier to train and classify the feature vectors. Experimental results show it is effective to detect the existence of hidden information for both uncompressed video and compressed video. At the same time, it is testified that by the combination of spatial correlation and temporal correlation, the detection performance is improved.
引文
[1] Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding - A survey [J]. Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, 1999, 87(7): 1062-1078.
    [2] Katzenbeisser S, Petitcolas F A P编,吴秋新,钮心忻,杨义先等译.信息隐藏技术——隐写术与数字水印[M].北京:人民邮电出版社, 2001.
    [3] Department of Computer and Information Science, National Chiao Tung University. Steganography [EB/OL]. http://debut.cis.nctu.edu.tw/Research/Steganography/steganogra phy .htm
    [4]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社, 2004.
    [5] Kahn D. The Codebreakers-The story of secret writing [M]. New York: Scribner, 1996.
    [6] Brassil J T, Low S, Maxemchuk N F, et al. Electronic marking and identification techniques to discourage document copying [J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1495-1504.
    [7] Pfitzmann B. Information hiding erminology - Results of an informal plenary meeting and additional proposals [C]. Proceedings of 1st Information Hiding Workshop, LNCS 1174, Springer-Verlag, 1996: 347-350.
    [8]尤新刚,周琳娜,郭云彪.信息隐藏学科的主要分支及术语[C].全国信息隐藏学术研讨会论文集,西安:西安电子科技大学出版社, 2001: 43-50.
    [9] Kurak C, McHugh J. A cautionary note on image downgrading [C]. Proceedings of 8th IEEE Annual Computer Security Applications Conference, 1992: 153-159.
    [10] StegoDos– Black Wolf’s Picture Encoder v0.90B [EB/OL]. ftp://ftp.csua.berkeley.edu/pu b/cypherpunks/steganography/stegodos.zip
    [11] Brown A. S-Tools for Windows [EB/OL]. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/ code/s-tools4.zip, 1996.
    [12] Simmons G J. The prisoners’problem and the subliminal channel [C]. Proceedings of CRYPTO’83-Advances in Cryptology, 1984: 51-67.
    [13] Goljan M. Lossless Data embedding methods for digital images and detection of steganography [D]. PhD Thesis, Binghamton University, State University of New York, 2001
    [14] Cachin C. An information-theoretic model for steganography [C]. Proceedings of 2nd Information Hiding Workshop, LNCS 1525, Springer-Verlag, 1998: 306-318.
    [15] Johnson N F, Jajodia S. Steganalysis of images created using current steganography software [C]. Proceedings of 2nd Information Hiding Workshop, LNCS 1525, Springer-Verlag, 1998: 273-289.
    [16]王朔中,张新鹏,张开文.数字密写与密写分析[M].北京:清华大学出版社, 2005.
    [17]梁小萍,何军辉,李健乾等.隐写分析——原理、现状与展望[J].中山大学学报, 2004, 43(6): 63-69.
    [18] Aura T. Invisible communication [R]. EET 1995, Helsinki University of Technology, Finland, Nov. 1995. http://deadlock.hut.fi/ste/ste_html.html
    [19] Sharp T. An implementation of key-based digital signal steganography [C]. Proceeding of 4th Information Hiding Workshop, LNCS 2137, Springer-Verlag, 2001: 13-26.
    [20] Kawaguchi E, Eason R O. Principle and application of BPCS-Steganography [C]. Proceedings of SPIE, Multimedia Systems and Applications, Vol. 3528, 1998: 464-473.
    [21] Wu D C, Tsai W H. A steganographic method for images by pixel-value differencing [J]. Pattern Recognition Letters, 2003, 24(9-10): 1613-1626.
    [22] Marvel L M, Boncelet C G, Retter C T. Spread spectrum image steganography [J]. IEEE Transaction on Image Processing, 1999, 8(8): 1075-1083.
    [23] Fridrich J, Goljan M. Digital image steganography using stochastic modulation [C]. Proceeding of SPIE, Security and Watermarking of Multimedia Contents, Vol. 5020, 2003: 191-202.
    [24] Korejwa J. Jsteg shell 2.0. [EB/OL].:http://www.tiac.net/users/korejwa/steg.htm
    [25] Westfeld A. F5 - A steganographic algorithm: high capacity despite better steganalysis [C]. Proceeding of 4th Information Hiding Workshop, LNCS 2137, Springer-Verlag, 2001: 289-302.
    [26] Sallee P. Model-based steganography [C]. Proceedings of Internatinal Workshop on Digital Watermarking, LNCS 2939, Springer-Verlag, 2004: 154-167.
    [27] Bloom J A, Cox I J, Kalker T, et al. Copy protection for DVD video [J]. Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, 1999, 87(7): 1267-1276.
    [28] Wang Y, Pearmain A. Blind MPEG-2 video watermarking robust against scaling [C]. Proceedings of International Conference on Image Processing, 2004: 2159-2162.
    [29] Simitopoulos D, Tsaftaris S A, Boulgouris N V, et al. Fast MPEG watermarking for copyright protection [C]. Proceedings of International Conference on Electronics, Circuits and Systems, 2002: 1027-1030.
    [30]张春田,苏育挺,管晓康.多媒体数字水印技术[J].通信学报, 2000, 21(9): 46-52.
    [31]霍菲菲,高新波.基于三维小波变换的视频水印嵌入与盲提取算法[J].电子与信息学报, 2007, 29(2): 447-450.
    [32]楼偶俊,王相海,王钲旋.抗几何攻击的量化鲁棒视频水印技术研究[J].计算机研究与发展, 2007, 44(7): 1211-1218.
    [33] Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transcations on Image Processing, 1997, 6(12): 1673-1687.
    [34] Hartung F, Girod B. Watermarking of uncompressed and compressed video [J]. Signal Processing, 1998, 66(3): 283-301.
    [35]梁华庆,王磊,双凯,等.一种在原始视频帧中嵌人的鲁棒的数字水印[J].电子与信息学报, 2003, 25(9): 1281-1284.
    [36] MSU Graphics & Media Lab (Video Group). MSU StegoVideo-Unique tool for hiding information in video [EB/OL]. http://compression.ru/video/stego_video/index_en.html
    [37] Marvel L M, Boncelet C G, Retter C T. Spread spectrum image steganography [J]. IEEE Transactions on Image Processing, 1999, 8(8): 1075-1083.
    [38] Swanson M D, Zhu B, Tewfik A H. Data hiding for video-in-video [C]. Proceedings of International Conference on Image Processing, 1997: 676-679.
    [39] Chae J J, Manjunath B S. Data hiding in video [C]. Proceedings of International Conference on Image Processing, 1999: 311-315.
    [40] Deguillaume F, Csurka G, Pun T, etc. Robust 3D DFT video watermarking [C]. Proceedings of SPIE, Security and Watermarking of Multimedia Contents, Vol. 3657, 1999: 113-124.
    [41] Abdulaziz N, Pang K K. Wavelet transform and channel coding for data hiding in video [C]. Proceedings of International Conference on Info-tech and Info-net, 2001: 791-796.
    [42]霍菲菲,高新波.基于三维小波变换的视频水印嵌入与盲提取算法[J].电子与信息学报, 2007, 29(2): 447-450.
    [43]彭川,蒋天发.一种基于三维小波变换的视频水印算法[J].武汉大学学报(工学版), 2007, 40(6): 135-138.
    [44] Liu H, Chen N, Huang J, et a1. A robust DWT-based video watermarking algorithm [C]. Proceedings of International Symposium on Circuits and Systems, 2002: 631-634.
    [45]刘红梅,黄继武,肖自美.一种小波变换域的自适应视频水印算法[J].电子学报, 2001, 29(12): 1656-1660.
    [46] Merchant S N, Harchandani A, Dua S, et al. Watermarking of video data using integer-to-integer discrete wavelet transform [C]. Proceedings of TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region, 2003: 939-943.
    [47] Wu M, Liu B. Data hiding in image and video: Part I-Fundamental issues and solutions [J]. IEEE Transactions on Image Processing, 2003, 12(6): 685-695.
    [48] Wu M, Yu H, Liu B. Data hiding in image and video: Part II-Designs and applications [J]. IEEE Transactions on Image Processing, 2003, 12(6): 696-705.
    [49] Wu M, Yu H. Video access control via multi-level data hiding [C]. Proceedings of International Conference on Multimedia & Expo, 2000: 381-384.
    [50]苏育挺.数字视频水印技术研究[D].天津大学博士学位论文, 2001年1月.
    [51] Chung T, Hong M, Oh Y, et al. Digital watermarking for copyright protection of MPEG2 compressed video [J]. IEEE Transactions on Consumer Electronics, 1998, 44(3): 895-901.
    [52] Hsu C T, Wu, J L. DCT-based watermarking for video [J]. IEEE Transactions on Consumer Electronics, 1998, 44(1): 206-216.
    [53] Koch E, Jian Z. Towards robust and hidden image copyright labeling [C]. Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, 1995: 452-455.
    [54] Dittmann J, Stabenau M, Steinmetz R. Robust MPEG video watermarking technologies [C]. Proceedings of ACM International Conference on Multimedia, 1998: 71-80.
    [55] Liu Z, Liang H, Niu X, et al. A robust video watermarking in motion vectors [C]. Proceedings of International Conference on Signal Processing, 2004: III-2358-2361.
    [56] Linnartz J P M G., Talstra J C. MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video [EB/OL]. http://diva.eecs.berkeley.edu/Iinnartz/pty.html
    [57] Hartung F, Girod B. Digital watermarking of MPEG-2 coded video in the bit stream domain [C]. Porceedings of International Conference on Acoustics, Speech and Signal Processing, 1997: 2621- 2624.
    [58] Arena S, Caramma M, Lancini R. Data hiding in the bit stream domain for MPEG-2 coded video sequences exploiting space and frequency masking [C]. Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2000: 1987-1990.
    [59] Caccia G, Lancini R. Data hiding in MPEG2 bit stream domain [C]. Proceedings of International Conference on Trends in Communications, 2001: 363-364.
    [60] Simitopoulos D, Tsaftaris S A, Boulgouris N V, et a1.Compressed-domain video watermarking of MPEG streams [C]. Proceedings of International Conference on Multimedia and Expo, 2002: 569-572.
    [61]田源,王以孝,程义民,陆红琳.一种基于视频的彩色图像隐藏方法[J].计算机工程与应用, 2004, 40(9): 65-66,173.
    [62]郭志川,程义民,王以孝,等.一种基于视频的无损信息隐藏方法[J].中国科学院研究生院学报, 2006, 23(2): 165-173.
    [63]叶登攀,戴跃伟,王执铨.一种无损的压缩视频/图像信息隐藏方法[EB/OL]. http://www.paper.edu.cn.
    [64] Wu G, Zhuang Y, Wu F, et al. Self-adaptive MPEG video watermarking based on block perceptual features [C]. Proceedings of 3rd International Conference on Machine Learning and Cybernetics, 2004: 3871-3876.
    [65] Biswas S, Das S R, Petriu E M. An adaptive compressed MPEG-2 video watermarking scheme [J]. IEEE Transactions on Instrumentation and Measurement, 2005, 54(5): 1853-1861.
    [66] Jordan F, Kuter M, Ebrahimi T. Proposal of a watermarking technique for hiding/ retrieving data in compressed and decompressed video [R]. Technical Report M2281, ISO/IEC Document, JTCI/SC29/WG11, Stockholm: MPEG-4 Meeting, 1997.
    [67] Zhang J, Maitre H, Li J, et al. Embedding watermark in MPEG video sequence [C]. Proceedings of 4th Workshop on Multimedia Signal Processing, 2001: 535-540.
    [68]梅文博,张云帆.一种基于运动矢量的MPEG2视频数字水印的改进算法[J].北京理工大学学报, 2004, 24(8): 723-726.
    [69]朱仲杰,蒋刚毅,郁梅,等.基于运动矢量的视频图象数字水印算法[J].电路与系统学报, 2002, 7(3): 58-61.
    [70]朱仲杰,蒋刚毅,郁梅,等. MPEG-2压缩域的视频数字水印新算法[J].电子学报, 2004, 32(1): 21-24.
    [71] Dai Y, Zhang L, Yang Y. Digital watermarking applied to MPEG-2 coded video sequences exploiting motion vector [J]. The Journal of China Universities of Posts and Telecommunications, 2004, 11(2): 35-39.
    [72]张桂东,茅耀斌,王执铨.一种基于运动矢量的视频水印方案[J].中山大学学报(自然科学版), 2004, 43(Sup.2): 117-119.
    [73]张立和,杨成,孔祥维.基于运动矢量统计的同步视频水印算法[J].光电子?激光, 2007, 18(2): 236-240.
    [74] Zhao Z, Yu N, Li X. A novel video watermarking scheme in compression domain based on fast motion estimation [C]. Proceedings of International Conference on Communication Technology, 2003: 1878-1882.
    [75] Ueno Y. A digital video watermarking method by associating with the motion estimation [C]. Proceedings of International Conference on Signal Processing, 2004: 2576-2579.
    [76] Bodo Y, Laurent N, Dugelay J L. Watermarking video, hierarchical embedding in motion vectors [C]. Proceedings of International Conference on Image Processing, 2003: II-739-742.
    [77] Yoshiura H, Echizen I, Anazai K, et al. Improved video watermarking for MPEG encoders using motion analysis [C]. Proceedings of International Conference on Consumer Electronics, 2002: 14-15.
    [78] Langelaar G C, Setyawan I , Lagendijk R L. Watermarking digital image and video data [J]. IEEE Signal Processing Magazine, Sep. 2000: 20-46.
    [79] Mobasseri B G, Marcinak M P. Watermarking of MPEG-2 video in compressed domain using VLC mapping [C]. Proceedings of ACM Workshop on Multimedia and Security, 2005: 91-94.
    [80] Liu B, Liu F, Lu B, et al. Real-time steganography in compressed video [C]. Proceedings of International Conference Multimedia Content Representation, Classification and Security, LNCS 4105, Springer- Verlag, 2006: 43-48.
    [81] Lu C S, Chen J R, Fan K C. Real-time frame-dependent video watermarking in VLC domain [J]. Signal Processing: Image Communication, 2005, 20(7): 624-642.
    [82]孙怡峰,刘粉林,王国栋,等.一种基于MPEG2视频编码的隐写算法[J].东南大学学报(自然科学版), 2007, 37(Sup I): 177-181.
    [83] Ling H, Lu Z, Zou F. New real-time watermarking algorithm for compressed video in VLC domain [C]. Proceedings of International Conference on Image Processing, 2004: 2171-2174.
    [84] Cross D, Mobasseri B G. Watermarking for self-authentication of compressed video [C]. Proceedings of International Conference on Image Processing, 2002: II-913-916.
    [85] Barni M, Bartolini F, Checcacci N. Watermarking of MPEG-4 video objects [J]. IEEE Transactions on Multimedia, 2005, 7(1): 23-32.
    [86]戴侃斐,黄文勇,陈真勇,等.基于生命游戏置乱的MPEG-4运动矢量水印算法[J].中山大学学报(自然科学版), 2004, 43(Sup.2): 192- 95.
    [87] Guo J, Shi P. Object-based watermarking schme robust to object manipulations [J]. Electronics Letters, 2002, 38(25): 1656-1657.
    [88] Fu Y, Shen R, Shen L. An object based robust video watermarking scheme [C]. Proceedings of International Conference on Systems, Man and Cybernetics, 2005.
    [89]黄文勇,唐龙.一种抗几何变换攻击的MPEG-4视频对象水印方案[J].小型微型计算机系统, 2005, 26(5): 803-806.
    [90] Noda H, Furuta T, Niimi M, et al. Application of BPCS steganography to wavelet compressed video [C]. Proceedings of International Conference on Image Processing, 2004: 2147-2150.
    [91]王国新. LSB匹配隐写分析和隐藏信息盲检测技术研究[D].郑州:信息工程大学, 2007.
    [92] Westfeld A, Pfitzmann A. Attacks on steganographic systems [C]. Proceedings of 3rd Information Hiding Workshop, LNCS 1768, Springer-Verlag, 1999: 61-75.
    [93] Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images [J]. Magazine of IEEE Multimedia. October-December Issue, 2001: 22-28.
    [94] Dumitrescu S, Wu X, Wang Z. Detection of LSB steganography via sample pair analysis [C]. Proceedings of 5th Information Hiding Workshop, LNCS 2578, Springer-Verlag, 2003: 355-372.
    [95] Lu P, Luo X, Tang Q, et al. An improved sample pairs method for detection of LSB embedding [C]. Proceedings of 6th Information Hiding Workshop, LNCS 3200, Springer-Verlag, 2004: 116-127.
    [96] Ker A D. A general framework for structural steganalysis of LSB replacement [C]. Proceedings of 7th Information Hiding Workshop, LNCS 3727, Springer-Verlag, 2005: 296-311.
    [97] Ker A D. A fusion of maximum likelihood and structural steganalysis [C]. Proceedings of 9th Information Hiding Workshop, LNCS 4567, Springer-Verlag, 2007: 204-209.
    [98] Zhang T, Ping X. Reliable detection of LSB steganography based on the difference image histogram [C]. Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2003: II-545-548.
    [99]张涛,平西建.基于差分直方图实现LSB数字隐写的可靠检测[J].软件学报, 2004, 15(1): 151-158.
    [100]张新鹏,王朔中,张开文.基于统计特性的LSB密写分析[J].应用科学学报, 2004, 22(1): 16-19.
    [101]管伟,张卫明,刘文芬.基于污染数据分析的隐写分析方法[J].中山大学学报(自然科学版), 2004, 43(Sup.2): 62-65,70.
    [102] Harmsen J, Pearlman W A. Steganalysis of additive noise modelable information hiding [C]. Proceeding of SPIE, Security and Watermarking of Multimedia Contents, Vol. 5020, 2003: 131-142.
    [103] Ker A D. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal ProcessingLetters, 2005, 12(6): 441-444.
    [104] Lyu S, Farid H. Steganalysis using higher-order image statistics [J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1): 111-119.
    [105] Huang F, Li B, Huang J. Attacking LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels [C]. Proceedings of International Conference on Image Processing, 2007: I-401-404.
    [106] Westfeld A. Dtecting low embedding rates [C]. Proceedings of 5th Information Hiding Workshop, LNCS 2578, Springer-Verlag, 2003: 324-339.
    [107] Marvel L, Henz B, Boncelet C. A performance study of±1 steganalysis employing a realistic operating scenario [C]. Proceedings of Military Communications Conference, 2007: 1-7.
    [108]张新鹏,王朔中.对空域BPCS密写的统计分析[J].计算机辅助设计与图形学学报, 2005, 17(7): 1625-1629.
    [109] Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: Breaking the F5 algorithm [C]. Proceedings of 5th Information Hiding Workshop, LNCS 2578, Springer-Verlag, 2002: 310-323.
    [110] Fridrich J, Goljan M, Hogea D. Attacking the OutGuess [C]. Proceedings of ACM Workshop on Multimedia and Security, 2002.
    [111] Fridrich J, Goljan M, Hogea D. New methodology for breaking steganographic techniques for JPEGs [C]. Proceeding of SPIE, Security, Steganograhpy, and Watermarking of Multimedia Contents, Vol. 5020, 2003: 143-155.
    [112] Budhia U, Kundur D. Video steganalysis using collusion sensitivity [C]. Proceedings of SPIE: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, Vol. 5403, 2004: 210-221.
    [113] Budhia U, Kundur D, Zourntos T. Digital video steganalysis exploiting statistical visibility in the temporal domain [J]. IEEE Transactions on Information Forensics and Security, 2006, 1(4): 502-516.
    [114] Pankajakshan V, Doerr G., Bora P K. Assessing motion coherency in video watermarking [C]. Proceedings of ACM Multimedia and Security Workshop, 2006: 114-119.
    [115] Pankajakshan V, Ho A T S. Improving video steganalysis using temporal correlation [C]. Proceedings of Intelligent Information Hiding and Multimedia Signal Processing, 2007: 287-290.
    [116] Jainsky J S, Kundur D, Halverson D R. Towards digital video steganalysis using asymptotic memoryless detection [C]. Proceedings of ACM Multimedia and Security Workshop, 2007: 161-167.
    [117] Zhang C, Su Y, Zhang C. Video steganalysis based on aliasing detection [J]. Electronics letters, 2008, 44(13): 801-803.
    [118]苏育挺,王莉莉,张春田.一种新型视频信息隐藏分析算法[J].东南大学学报(自然科学版), 2007, 37(Sup I):164-167.
    [119] Farid H, Lyu S. Detecting hidden messages using higher-order statistics and support vector machines [C]. Proceedings of 5th Information Hiding Workshop, LNCS 2578, Springer-Verlag, 2002: 340-354.
    [120] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [C]. Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006: 1-13.
    [121] Avcibas I, Memon N, Sankur B. Steganalysis using image quality metrics [J]. IEEE Transactions on Image Processing, 2003, 12(2): 221-229.
    [122] Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1): 31-45.
    [123]陈丹,张键红,王育民.基于主成分分析和RBF网络的泛盲掩密分析方案.中山大学学报(自然科学版), 2004, 43(Sup.2): 66-70.
    [124]张旭东,卢国栋,冯健.图像编码基础和小波压缩技术——原理、算法和标准[M].北京:清华大学出版社, 2004.
    [125] ISO/IEC 13818-2:1996(E). Information technology - Generic coding of moving pictures and associated audio information: video [S], International Standard, 1996.
    [126] Albanesi M G., Guerrini F. Authentication and recovery of digital images using error correcting codes [C]. Proceedings of ACM Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, 2002: 23-26.
    [127]孔令军,肖扬.基于LDPC码的数字图像水印算法研究[J].信号处理, 2007, 23(4): 634-636.
    [128]霍智勇.基于LDPC码的数字图像水印技术研究与利用[J].南京邮电大学学报(自然科学版), 2006, 26(6): 77-81,85.
    [129]王伟祥,刘玉君,李文雄.利用LDPC码实现信道编码信息隐藏技术[J].信息工程大学学报, 2006, 7(1): 49-50,53.
    [130]王天宇,刘玉君,唐冬明,等.基于RS码的有扰信道信息隐藏技术的研究[J].信息工程大学学报, 2004, 5(3): 85-88.
    [131] Crandall R. Some notes on steganography [EB/OL]. http://os.inf.tu-dresden.de /~westfeld/crandall.pdf
    [132]刘翠卿.纠错码信息隐藏的理论与应用研究[D].郑州:信息工程大学, 2007.
    [133]刘翠卿,平西建,王云鹤,等.基于完备码监督矩阵的图像LSB信息隐藏方法[J].哈尔滨工业大学学报, 2006, 38(sup): 795-799.
    [134] Provos N, Honeyman P. Detecting steganographic content on the Internet [R]. CITI Technical Report 01-11.
    [135] Trappe W, Wu M, Wang Z J, et al. Anti-collusion fingerprinting for multimedia [J]. IEEE Transactions on Signal Processing, 2003, 51(4): 1069-1087.
    [136] http://trace.eas.asu.edu/yuv/index.html
    [137] http://www.cipr.rpi.edu/resource/sequences/
    [138] http://wftp3.itu.int/av-arch/video-site/sequences/
    [139]刘祖根,平玲娣,史烈,等.基于主元特征的隐写分析算法[J].浙江大学学报(工学版), 2007, 41(12): 1991-1996.
    [140]吴明巧,朱中梁,金士尧.基于拉普拉斯模型的序列隐写密钥估计[J].计算机工程与科学, 2008, 30(2): 9-14.
    [141] Chih-Chung Chang and Chih-Jen Lin. LIBSVM : a library for support vector machines [CP]. 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
    [142] http://www-mobile.ecs.soton.ac.uk/peter/links/work.html
    [143] http://www.i3s.unice.fr/%7Egarciav/goodies.php

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700