视频隐蔽通信与内容安全的若干问题
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
由于信息隐藏技术能够在一定程度上解决传统密码学在某些应用领域中的不足,因而其被视为信息安全研究领域的新鲜血液,成为数字化信息时代有效应对信息安全挑战、维护网络信息安全的主要手段之一。现有信息隐藏研究的载体对象主要以静态图像为主,对视频信息隐藏技术的研究目前尚未完全展开。但是随着流媒体技术的发展,数字音、视频资源正逐步取代文字和静止图像成为网络信息的主流,视频信息隐藏技术日渐成为研究热点之一。本文主要围绕下列问题开展研究:
     1、基于共谋策略的视频空域隐写分析:针对视频序列中存在的局部运动严重干扰隐写分析精度的问题,提出了一种基于帧间共谋策略的视频隐写分析框架。该框架将秘密信息和局部运动建模为双模噪声,首先基于视频帧间分块相关度量的策略提取特征,通过分类方法判别出可疑视频帧,然后将可疑帧提取为静态图像,应用相对更加成熟的图像隐写分析算法实施进一步的检测,以期最终获得较高的检测精度。
     2、压缩视频VLC码字中的实时信息隐写:针对视频压缩域中现有隐写算法的隐写容量受编码格式限制的问题,提出了一种基于视频VLC码对映射的实时隐写算法。该算法在保证载体视频码率不变的前提下提高了秘密信息的嵌入容量,信息的嵌入和提取操作完全在VLC码字中进行,不需要对载体视频进行全部或部分的解压和重压缩,从而能够满足实时性要求。
     3、基于优化算法的压缩视频安全隐写:针对视频隐写算法设计中因忽略视频时域特性而导致安全性下降的问题,对安全视频隐写的算法设计准则进行了初步探讨,基于全局优化策略给出了兼顾时域、空域特性的压缩视频安全隐写框架,能够依据实际的应用需求调整目标函数,以确定适当的信息嵌入方案。
     4、基于内容特征的压缩视频分层认证:针对压缩视频内容真实性认证问题,提出了一个基于压缩视频内容特征的分层认证方案。该方案结合视频帧间和帧内的内容特征可对其内容真实性进行不同层次的认证。方案所选取的内容特征具有半脆弱的特性,即对于恶意操作较为敏感,而对正常的处理操作比较鲁棒,基于特征的半脆弱特性可以区分针对视频所进行的正常处理操作和恶意内容篡改。认证方案中,首先以较小的计算量快速检测恶意篡改是否发生,当发现恶意篡改后,能够根据需要进一步确定视频被篡改的具体位置。
     5、基于数字指纹的盗版追踪:针对数字视频等多媒体产品发行中经常遭遇的盗版问题,给出了一类基于抗共谋攻击数字指纹的盗版追踪、取证方案。在方案中给出了基于可信第三方的数字视频作品分发协议,该协议的设计兼顾了视频作品网络发布的实用性和安全性;在方案中的指纹编码方面,通过构造性证明方法证明了一定共谋尺度下完全抵抗各类共谋攻击的数字指纹编码方案的存在性;同时给出了基于严格正交指纹编码的抗平均共谋指纹编码方案以及当平均共谋发生时能够准确发现共谋参与者的树形追踪算法。
     最后,对全文做了总结,并对下一步的研究工作进行了展望。
As a remedy for the traditional cryptography technology, information hiding plays a more and more important role in the information security research, and becomes the main countermeasure to the network information security threats in the digitalize age. In its infant times, information hiding algorithms are designed with the still image cover commonly. However, with the rapid development of stream media technology, digital audio and video resources are taking the place of text and image to be the dominant information format in present networks. Therefore, video information hiding technology becomes the hotspot of information technology research. The main works of this thesis are as the following:
     1. Collusion-based video space domain steganalysis: the existence of local motion will disturb the detecting precision of present video steganalysis algorithms. An interframe collusion based video steganalysis framework is proposed for higher hiding message detection exactness. The video steganalysis process is divided into two steps. In the first step, local motion and message embedded in video is treated as a bimodal noise. Suspicious video frames will be recognized by decision module employing features extracted with inter-frame correlation. In the second step, suspicious frames will be analyzed critically by the present powerful image steganalysis schemes.
     2. Compressed video real time steganography in the VLC codes: When embedding message in the compressed video, the message capacity will be limited by the compress coding standard. A real time video staganography algorithm based on VLC code pairs mapping is proposed. With the less change of compressed video code rate, the capacity of message will be increased by using the proposed algorithm. Moreover, the embedding and extracting operation are wholely performed in the VLC codes, with no need for full or even partial decompression for the real time requirement.
     3. Optimal strategy on compressed video secure steganogrphy: Present frame by frame approaches to video steganography will bring a serious security pitfall. Temporal dimension is a crucial point in video and it should be taken into account to design efficient algorithms. With the highlight of perceptual shaping research, an optimal strategy on compressed video secure steganography is proposed. With the optimal strategy, an appropriate message embedding scheme is determined in a closed-loop manner with a cost function for minimization, to enhance the antisteganalysis capability and image quality after data embedding.
     4. Content feature based compressed video hierarchical authentication: For the compressed video authentication, a content feature based hierarchical authentication scheme is proposed. The scheme combined the inter-frame and intra-frame features to ensure the authenticity of video content with two different level. Features selected have semi-fragile property, with which can distinguish malicious attacks such as erasure, insertion and replacement from video processing. The proposed scheme can detect the existence of malicious attacks with a light computer payload and further locate the corrupt areas.
     5. Anti-collusion digital fingerprint based traitor tracing: How to defense collusive attack is one of the key problems of copyright protection of digital contents. An anti-collusion fingerprint based traitor tracing scheme is proposed. The tracing protocol is based on the trusted third party, which concerns on both security and practicality. The existence of complete anti-collusion fingerprint scheme is proved in a construct manner. The fingerprint coding scheme and corresponding tracing protocol are proposed by using an orthogonal sequence to construct the fingerprint bits. Under the average collusion attack, by the fingerprint algorithm, the owner can trace the traitors quite efficiently.
     At last, the research work in this thesis is summarized and potential research topics in future are discussed.
引文
[1]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用[M].北京:科学出版社, 2004.
    [2] Gwena?l D., Dugelay J. L. A guide tour of video watermarking [J]. Signal Processing: Image Communication, 18 (2003):263-282.
    [3] Langelaar G. C., Lagendijk R. L. Optimal Differential Energy Watermarking of DCT Encoded Images and Video [J]. IEEE Transactions on Image Processing, 2001, 10(1): 148-158.
    [4] Lee H. H., Chae J. J. and Choi J. U. Real-time video watermarking technique [C], Proceedings of SPIE - The International Society for Optical Engineering, v4675 [A], 2002: 503-511.
    [5] Sun J., Liu J. Data hiding with video independent components [J], Electronics Letters, 2004, v 40(14): 858-859.
    [6] Darmstaedter V., Delaigle J. F. and D. Nicholson D. et al. Block based watermarking technique for MPEG2 signals: Optimization and validation on real digital TV distribution links [C], Lecture Notes in Computer Science1425 [A], 1998, 190-198.
    [7] Lee H. H., Chae J. J. and Kim J. W.Real-time video watermarking technique based on both spatial and frequency domain [C], Proceedings of the IASTED International Conference Signal and Image Processing [A], 2001: 69-73.
    [8] Zhang J., Huang, Y. J. and Wang Hui. A video watermarking algorithm using fast wavelet [C], Proceedings of the International Conference on Wavelet Analysis and Its Applications [A], 2003, v1: 78-84.
    [9]赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印[J].中国科学: E辑. 2006, 36(2):137-152.
    [10] Serdean C. V., Ambroze M. A. and Tomlinson M. et al. DWT-based high-capacity blind video watermarking, invariant to geometrical attacks [C]. IEE Proceedings: Vision Image and Signal Processing [A], 2003, 50(1):51-58.
    [11] Serdean C. V., Ambroze M. A. and Tomlinson M. et al. Adding robustness to geometrical attacks to a wavelet based, blind video watermarking system [C], Proceedings of the IEEE International Conference on Multimedia and Expo 2002, Proceeding GS [A], 2002, 557-560.
    [12] Aweke L., Michiel V. and Mehmet C. A New Modulation based Watermarking Technique for Video [C]. Security, Steganography, and Watermarking of Multimedia Contents VIII [A], 2006, SPIE Vol. 6072,
    [13] Sun J., Liu J. A novel blind video watermarking scheme based on independent dynamic component [J]. Multidim Syst Sig Process (2006), 7:59-74.
    [14] Wang Y., Pearmain A. Blind MPEG-2 video watermarking in DCT domain robust againstscaling [C]. IEE Proc.Vis. Image Signal Process [A], 2006, 153(5):581-588.
    [15] Wang Y. L., Parmain A. Geometric Attacks: A Set of Approaches in DCT Domain [J]. IEEE Transactions on Image Processing, 2006, 15(6):1536-1543.
    [16] Kong W. H., Yang B, and Wu D.et al. SVD Based Blind Video Watermarking Algorithm [C]. Proceedings of the First International Conference on Innovative Computing, Information and Control [A], 2006.
    [17]张立和,伍宏涛,胡昌利.基于三维Gabor变换的视频水印算法[J].软件学报. 2004, 15(8):1252-1258.
    [18]刘琚,孙建德. ICA和镜头分割结合的盲视频水印方案[J].中国科学:E辑. 2005, 35(12):1266-127.
    [19]霍菲菲,高新波.基于三维小波变换的视频水印嵌入与盲提取算法[J].电子与信息学报, 2007, 29(2):447-450.
    [20] Lu C. S., Chen J. R. and Fan K. C. Real-time frame-dependent video watermarking in VLC domain [J]. Signal Processing: Image Communication, 2005, v. 20(7): 624-642.
    [21] Setyawan I., Lagendijk R. L. Low bitrate video watermarking using temporally extended diferential energy watermarking (DEW) algorithm [C]. Proceedings of the Security and Watermarking of Multimedia Contents III [A], 2001, 4314:73-84.
    [22] Ling H. F., Lu Z. D. and Zou F. H. New real-time watermarking algorithm for compressed video in VLC domain [C], Proceedings of the 2004 International Conference on Image Processing [A], 2004, v. 4: 2171-2174.
    [23] Kang K. P., Choi Y. H. and Choi T. S. Real-time Video Watermarking for MPEG Streams [C], Proceedings of SPIE - The International Society for Optical Engineering, Applications of Digital Image Processing XXVI [A], 2003, v5203: 691-702.
    [24] Pranata S., Wahadaniah V. and Guan Y. L. et al. Improved bit rate control for real-time MPEG watermarking [J], EURASIP Journal on Applied Signal Processing, 2004, v .14: 2132-41.
    [25] Lu C. S., Chen J. R. and Liao H. Y. M. et al. Real-time MPEG2 video watermarking in the VLC domain, Proceedings of the 16th International Conference on Pattern Recognition, International Conference on Pattern Recognition, 2002, v. II: 552-555.
    [26] Liu H. M., Shao F. L. and Huang J. W. et al. A MPEG-2 video watermarking algorithm with compensation in bit stream, Digital Rights Management: Technologies, Issues Challenges and Systems, 2006, v.3919: 123-134.
    [27] Maneli N., Russell M. M. A Framework for Robust Watermarking of H.264-Encoded Video with Controllable Detection Performance [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1):14-23.
    [28] Ye D., Zou C. and Dai Y. et al. A new adaptive watermarking for real-time MPEG videos [J]. Applied Mathematics and Computation 185 (2007) 907-918.
    [29] Zhang J., Anthony T. S. and Qiu G. Robust Video Watermarking of H.264/AVC [J]. IEEETransactions on Circuits and systems-II: Express Briefs, 2007, 54(2):205-209.
    [30]王丽君,姚鸿勋,刘绍辉,高文.压缩域自适应映射能量视频水印算法[J],计算机学报, 2005, 28(11):1843-1852.
    [31] Wong P., Memon N. Secret and public key authentication waternmrking schemes that resist vector quantization attack [C]. In: Proc of SPIE: Security and Watermarking of Multimedia Contents II [A], 2000, 4l7-427
    [32] Du R., Fridrich J. Lossless authentication of MPEG-2 video [C]. In: IEEE International Conference on Image Processing [A], vol II. Rochester, NY, 893-896.
    [33] Bijan M., Stard R. Content authentication and tamper detection in digital video [C]. IEEE International Conference on Image Processing [A]. Vol covcr, 2000. 458-461.
    [34] Tzeng C., Tsaiw H. A new technique for authentication of image video for multimedia applications [J]. Signal Processing, 2001, 66(3):337-341.
    [35] Queh M. P. Authentication of digital images and video: genetic models and a new contribution [J]. Signal Processing: Image Communication. 2001, 16(5):461-475.
    [36] Thiemert S., Sahbi H. and Steinebach M. Using entropy for image and video authentication watermarks [C]. Proceedings of Security and Watermarking of Multimedia Contents VIII, SPIE 6072 [A]. 2006, 108-110.
    [37] Sun Q., He D. and Tian Q. A secure and robust authentication scheme for video transcoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1232-1244.
    [38] Dai Y., Thiemert S. and steinebach M. Feature-based watermarking scheme for MPEG-I/II video authentication [C]. Proceedings of Security and Watermarking of Multimedia Contents VI, SPIE 5306 [A]. 2004, 325-335.
    [39] Daniel C., Bijan M. Watermarking for self-authentication of compressed video [C]. IEEE International Conference on Image Processing [A], 2002, vol II. Rochester, NY, 913-916.
    [40]施化吉,翁正岭,李星毅.基于MPEG I/II视频内容认证的半脆弱水印方案[J].计算机工程. 2006, 32(14): 160-162.
    [41]雷红雨,戴跃伟,王执铨.一种可定位攻击区域的高容量MPEG视频认证方案[J].南京理工大学学报(自然科学版). 2008, 32(1): 55-59.
    [42]叶登攀,尚月贇.基于多特征的MPEG视频认证方案[J].通信学报. 2008, 29(2): 59-65.
    [43] He D., Sun Q. and Tian Q. A semi-fragile object based video authentication system [C]. IEEE ISCAS [A]. 2003. III 814-817.
    [44] He D., Sun Q. and Tian Q. A robust object-based video authentication system [C]. International conference on information on Circuits and Systems [A], 2002, v2 452-455.
    [45] Sun Q., He D., Zhang Z. A secure and robust approach to scalable video authentication [C]. In Proceedings of IEEE International Conference on Multimedia and Expo [A]. 2003, 209-212.
    [46] He D., Sun Q. and Tian Q. An Object based watermarking solution for MPEG-4 videoauthentication [C]. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing [A]. 2003, III 537-540.
    [47] Thiemert S., Sahbi H. and Steinebach M. Applying interest operators in semi-fragile video watermarking [C]. In Proceedings of Security and Watermarking of Multimedia Contents VII, SPIE 5681 [A]. 2005, 381-390.353-362.
    [48] Wang J. W, Lian S. G. and Ren Z. et al. Semi-Fragile Watermarking Authentication with Local and Global Watermarks [C]. Proce of the Artificial Intelligence Applications and Innovations [A], 2006, 681-688.
    [49] Bijan G. M., Yatish N. R. Authentication of H.264 streams by direct watermarking of CAVLC blocks [C]. Proceedings SPIE Conference Security, Steganography, and Watermarking of Multimedia Contents VIII [A], San Jose, CA, January 28-February 2, 2007
    [50] Pfitzmann B., Waidner M. Asymmetric fingerprinting for larger collusions [C]. Proc of the 4th ACM Conference on Computer and Communications Security [A]. 1997, 151-160.
    [51] Domingo F. J. Anonymous fingerprinting based on committed oblivious transfer [C]. Lecture Notes in Computer Science 1560 [A]. Springer-Verlag, 1999, 43-52.
    [52] Memon N., Wong P. W. A buyer-seller watermarking protocol [C]. IEEE Signal Processing Society 1998 Workshop on Multimedia Signal Processing [A]. 1998, 291-296.
    [53] Tomsich P., Katzenbeisser S. Copyright protection protocols for multimedia distribution based on trusted hardware [C]. Proc of Protocols for Multimedia Systems 2000 [A], 249-256.
    [54] Domingo F. J., Herrera J. J. Efficient smart card based anonymous fingerprinting [C]. Lecture Notes in Computer Science 1820 [A], Springer-Verlag, 1998, 221-228.
    [55] Camenisch J. Efficient anonymous fingerprinting with group signatures [C]. Lecture Notes in Computer Science 1976 [A]. Springer-Verlag, 2000, 415-428.
    [56] Safavi Naini R., Wang Y. Anonymous traceability schemes with unconditional security [C]. Lecture Notes in Computer Science 1977 [A], Springer-Verlag, 2000, 250-261.
    [57] Boneh D, Shaw J. Collusion-Secure Fingerprinting for Digital Data [J]. IEEE Transactions on Information Theory, 1998, 44:1897-1905.
    [58] Yacobi Y. Improved Boneh-Shaw Content Fingerprinting [C]. Lecture Notes in Computer Science 2020 [A], Springer-Verlag, 2001, 378-391.
    [59] Domingc F. J., Herrera J. J. Short Collusion Secure Fingerprints Based on Dual Binary Hamming Codes [J]. Electron Letter, 2000, 36:1697-1699.
    [60] Sebe F., Domingrr F. J. Collusion Secure and Cost-Effeetive Detection of Unlawful Multimedia Redistribution [J]. IEEE Transactions Systems, Man, and Cybernetics Part C: Applications and Reviews, 2003, 33:382-389.
    [61] Dittmann J., Behr A. and Stabenau M, et al. Combining Digita1 Watermarks and Collusion Secure Fingerprints for Digital Images [C]. SPIE Conf Security and Watermarking ofMultimedia Contents [A], Callfornia, 1999.
    [62] Trappe W., Wu M. and Wang Z. J. et al. Anti Collusion Fingerprinting for Multimdia [J]. IEEE Transactions on Signal Processing, 2003, 51:1069-1087.
    [63] Wang Z. J., Wu M. and Trappe W. et a1. Group-oriented Fingerprinting for Multimedia Forensics [J]. EURASIP Journal on Applied Sigrtal Processing, 2004, 14:2142-2162.
    [64] Kirovski D., Malvar H. and Yaeobi Y. A Dual Watermark Finger-printing Systerm [J]. IEEE Transactions on Multimedia. 2004, 59-73.
    [65] He S., Wu M. Adaptive Detection for Group-Based Multimedia Fingerprinting [J]. IEEE Signal Processing Letters, 2007, 14(12):964-967.
    [66] Su K., Kundur D. and Hatzinakos D. Spatially Localized Image-Dependent Watermarking for Statistieal Invisibility and Collusion Resistane [J]. IEEE Transactions on Multimedia, 2005, 7: 52-66.
    [67] Su K., Kundur D. and Hatzinakos D. Statistical Invisibility for Collusion-Resistant Digital Video Watermarking [J]. IEEE Transactions on Multimedia, 2005, 7:43-51.
    [68] Gwena?l D., Dugelay J. L. Security Pitfalls of Frammhy Frame Approaches to Video Watermarking [J]. IEEE Transactions on Signal Processing, 2004, 52:2955-2964.
    [69] Westfeld A., Wolf G. Steganography in a video conferencing system [C]. David Aucsmith (Ed.): Information Hiding 1998 [A], Lecture Notes in Computer Science 1525, 1998, 32-47.
    [70] Hartung F., Girod B. Watermarking of uncompressed and compressed video. Signal Processing [J], Special Issue on Copyright Protection and Access Control for Multimedia Services, 1998, 66 (3): 283-301.
    [71] Liu H. M., Chen N., Huang J. W. A robust DWT-based video watermarking algorithm [C]. In: IEEE International Symposium on Circuits and Systems [A]. Scottsdale, Arizona, 2002, 631-634.
    [72] Dai Y. J., Zhang L. H. and Yang Y. X. A New Method of MPEG Video Watermarking Technology [C]. International Conference on Communication Technology Proceedings (ICCT2003) [A], April 9-11, 2003, 2:1845-1847.
    [73] Langelaar G. C., Setyawan I. and Lagendijk R. L. Watermarking Digital Image and Video Data [J]. IEEE Signal Processing Magazine, 2000, 17(5):20-46.
    [74] Cinalli D., Mobasseri B. G. and O’Connor C. Metadata Embedding in Compressed UAV Video [C]. Intelligent Ship Symposium [A], Philadelphia, May, 2003,12-14
    [75] Ling H. F., Lu Z. D. and Zou F. H. New real-time watermarking algorithm for compressed video in VLC domain [C]. Proceedings of the International Conference on Image Processing [A] 2004.
    [76]凌贺飞,卢正鼎,邹复好.基于MPEG的实时视频水印技术[J].小型微型计算机系统, 2005, 26(12):2181-2185.
    [77] Bijan M., Marcinak M. Watermarking of MPEG-2 Video in Compressed Domain Using VLC Mapping [A]. ACM Multimedia and Security Workshop 2005 [C], New York, NY,August 2005. 91-94.
    [78] Sarkar A., Madhow U. and Chandrasekaran S. et.al. Adaptive MPEG-2 Video Data Hiding Scheme [A]. Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents IX [C], Jan. 2007.
    [79] Budhia U., Kundur D. and Zourntos T. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain [J]. IEEE Transactions on Information Forensics and security, 2006, 1(4):502-516.
    [80] Jainsky J. S., Kundur D. and Halverson D. R. Towards Digital Video Steganalysis using Asymptotic Memoryless Detection [A]. Proceedings of the Mulitmedia and Security 07 [C], 2007, Dallas, Texas, USA.
    [81] Zhang C., Su Y.and Zhang C. Video steganalysis based on aliasing detection. Electronics Letters [J], 2008, 44(13): 801-803
    [82] Provos N., Honeyman P. Detecting Steganographic Content on the Internet [A]. Proceedings of the Internet Society Network and Distributed System Security Symposium. San Diego [C], 2002: 209-221.
    [83] Fridrich J., Goljan M. Practical Steganalysis of Digital Images-State of the Art [A]. Proceedings of the SPIE: Security and Watermarking of Multimedia Contents IV [C]. 2002: 1-13.
    [84] Dumitrescu S., Wu X. L. and Wang Z. Detection of LSB Steganography via Sample Pair Analysis [J]. IEEE Transactions on Signal Processing, 2003, 51(7): 1995-2007.
    [85]张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测[J].软件学报, 2004, 15(1):151-158.
    [86] Ker A. Steganalysis of Embedding in Two Least-Significant Bits [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(1):46-54.
    [87] Luo X. Y., Wang D. S. and Wang P. et al. A Review on Blind Detection for Image Steganography [J]. Signal Processing, (2008):2138-2157.
    [88] Avcibas I., Memon N.and Sankur B. Steganalysis Using Image Quality Metrics [J]. IEEE Transactions on Image processing. 2003, 12(2):221-229.
    [89] Budhia U., Kundur D. and Zourntos T. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain [J]. IEEE Transactions on Information Forensics and security, 2006, 1(4):502-516.
    [90] Lyu S., Farid H. Steganalysis Using Higher-order Image Statistics [J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):111-119.
    [91] Harmsen J., Pearlman W. Steganalysis of Additive Noise Modelable Information Hiding [A]. Proceedings of the SPIE: Security, Steganography, and Watermarking of Multimedia Contents V [C]. 2003, 5020:131-142.
    [92] Xuan G. R., Shi Y. Q. and Gao J. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions [A]. Proceedings of 7thInternational Information Hiding Workshop [C]. Barcelona Spain: Lecture Notes in Computer Science 3727, 2005, 262-277.
    [93] Wang Y., Moulin P. Opitmized Feature Extraction for Learning-based Image Steganalysis [J]. IEEE Transaction on Information Forensics Security. 2007, 2(1): 31-45.
    [94] Chen X. C., Wang Y. H. and Tan T. N. et al. Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix [A]. Proceeding of 18th International Conference on Pattern Recognition [C]. 2006, 3: 1107-1110.
    [95] Fu D. D., Shi Y. Q. and Zou D. K. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain [A]. Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing [C]. Victoria, BC, 2006: 310-313.
    [96] Chen C., Shi Y. Q. and Chen W et al. Statistical Moments Based Universal Steganaly-sis Using Jpeg 2-D array and 2-D Characteristic Function [A]. Proceedings of the International Conference on Image Processing [C]. 2006: 105-108.
    [97] Doerr G., Dugelay J. L. Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking. [J] IEEE Transactions on Signal Processing, Supplement on Secure Media, 2004, 52(10):2955-2964.
    [98]山拜·达拉拜,黄玉划.几类非高斯噪声模型的转换研究[J].电子学报, 2004, 32(7): 1090-1093.
    [99] Goljan M., Fridrich J. and Holotyak T. New Blind Steganalysis and Its Implications [A]. Proceedings of the SPIE: Security and Watermarking of Multimedia Contents [C]. 2006: 1-13.
    [100] Farid H. Detecting Hidden Messages Using Higher-order Statistical Models [A]. Proceedings of the IEEE International Conference on Image Processing [C]. 2002: 905-908.
    [101] Avcibas I., Memon N. and Sankur B. Steganalysis of Watermarking Techniques Using Image Quality Metrics [A]. Proceedings of the SPIE: Security and Watermarking of Multimedia Contents III [C]. 2000: 523-531.
    [102] Shi Y. Q., Xuan G. R. and Yang C. Y. et al. Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function [A]. In: proceeding of IEEE International Conference on Information Technology [C]. 2005: 768-773.
    [103] Berger R. J., Bijan G. M. Watermarking in JPEG Bitstream [A]. Proceedings of the SPIE: Security and Watermarking of Multimedia Contents III [C], 2005, 539-548.
    [104] Westfeld A., Pfizman A. Attack on steganographic systems [A]. Proceedings of the 3rd Information Hiding Workshop, Lecture Notes in Computer Science vol 1768[C], 2000, 61-75.
    [105] Provos N. Defending against statistical steganalysis [A]. Proceedings of the 10th USENIX Security Symposium [C], 2001, 323-336.
    [106] Fridrich J., Goljan M. and Hogea D. Attacking the OutGuess [A]. Proceedings of the ACM Workshop on Multimedia and Security [C], 2002, 3-6.
    [107] Westfeld A. F5-A steganographic algorithm: high capacity despite better steganalysis [A]. Proceedings of the 4th Information Hiding Workshop, Lecture Notes in Computer Sciencevol 2137 [C], 2001, 289-302.
    [108] Fridrich J., Goljan M. and Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm [A]. Proceedings of the 5th Information Hiding Workshop, Lecture Notes in Computer Science vol 2578 [C], 2002, 310-323.
    [109] Sallee P. Model-based steganography [A]. Proceedings of the International Workshop of Digital Watermarking, Lecture Notes in Computer Science, vol 2939 [C], 2004, 154-167.
    [110] Bohme R., Westfeld A. Breaking Cauchy model-based JPEG steganography with first order statistics [A]. Proceedings of the 9th European Symposium on Research in Computer Security, Lecture Notes in Computer Science vol 3193 [C], 2004, 125-140.
    [111] Cachin C. An information theoretic model for steganography [J]. Inform. Computer. 2004, 192(1):41-56.
    [112] Huang J., Shi Y. and Shi Y. Embedding image watermarks in DC components [J]. IEEE Transaction on Circuits and Systems for Video Technology, 2000, 10(6):974-979.
    [113] Golub G. H., Van Loan C. F.袁亚湘等译.矩阵计算[M].北京:科学出版社, 2001.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700