图像信息隐藏与隐藏分析算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术(Information Hiding or Steganography)与信息隐藏分析(Steganalysis)技术是信息隐藏领域两个重要分支。
     信息隐藏是将秘密信息(Secret information)隐藏在载体文件(Cover files)中形成载密文件,以达到保护载体或者隐藏秘密信息的目的。载体文件可以是数字文本、数字图像、数字音频和数字多媒体等。
     与信息隐藏技术相反,信息隐藏分析技术是判断测试文件中是否隐藏有秘密信息,分析隐藏信息的量以及恢复秘密信息。信息隐藏分析的主要目的是对隐藏的信息进行分析和检测。它是防止非法信息传播的重要手段,也是评价信息隐藏算法安全性的重要措施之一
     以数字图像为载体的信息隐藏研究已成为信息安全领域研究的热点。本文在了解图像信息隐藏研究的前沿,深入分析了图像信息隐藏本质和最新研究成果的基础上,研究了数字图像的统计性质,提出了一些数字图像信息隐藏算法和信息隐藏分析算法。本文的主要的研究成果和创新表现在:
     1.信息隐藏算法
     在空域中,通过分析与研究图像比特层面的相关性,相邻像素层面的相关性以及空域信息隐藏算法的不足,设计出一种可抗SPA分析的非对称LSB信息隐藏算法。分析与实验结果表明ALRS方法能够有效的抵抗SPA方法分析,其准确性、灵活性和计算效率等优于同类信息隐藏算法。
     在频域中,通过分析与研究相邻像素层面的相关性,频域系数的分布特性以及YASS算法固定划分父块的不足,设计出RASA信息隐藏算法。在RASA算法隐藏过程中,父块的大小随密钥变化。实验结果表明RASA算法的安全性更高。
     2.信息隐藏分析算法
     在频域中,通过分析频域系数的分布特性以及图像行列系数变化与其频域系数的相关性,结合F5信息隐藏算法的特点,设计出一种针对F5的图像信息隐藏分析算法(FSF算法)。该算法能够得到更好的原始图像的估计值。实验结果表明:该算法的性能更稳定,精确度更高。
     在研究了图像行列系数变化与其频域系数的相关性基础上,结合目前求解双重压缩初始矩阵方法的不足,提出了信息隐藏分析中的初始矩阵的求解算法CM算法。该算法通过均值方式求解双重压缩图像的原始图像,然后将得到的新图像进行双重压缩,对比原有的双重压缩图像,来确定双重压缩的初始量化矩阵。实验结果表明CM算法是一种非常有效算法。
There are the two important branchs in the field of information hiding technology, which is information Hiding or Steganography and steganalysis.
     Information hiding will embed secret information in the cover files and form the stego files, in order to protect the cover files or hide secret information. The cover files can be digital text, digital images, digital audio and digital multimedia.
     On the other hand, steganalysis will detect whether to hide secret information or not, what is the amount of the secret information, as well as how to recover the secret information. The detection of hidden information is the main purpose of the steganalysis. It is an important means to prevent illegal dissemination of information, but also is the measure to evaluate the information hiding algorithm security.
     Information hiding of the digital images has become a hot spot of the field of information security. The information hiding algorithm and information hiding analysis algorithms of digital images are proposed on the basis of the understanding forefront of research of information hiding, in-depth analysis of the essence and the latest research results of information hiding and the statistical nature of the digital images. The main research results are as followed:
     1. Information hiding algorithms
     In the spatial domain, through the analysis of the correlation of images bit-level and the relation of adjacent pixels level, it is proposed which is an asymmetric LSB information hiding algorithm of resisting SPA(ALRS method). The analysis and experimental results show that ALRS can effectively resist the SPA analysis and is more than similar information hiding algorithm in the accuracy, flexibility and computational efficiency.
     In the frequency domain, through the analysis of correlation of adjacent pixels level, the distribution characteristics of frequency domain coefficients, as well as the defect of the YASS algorithm, it is presented by RASA algorithm. In the RASA algorithm, the size of the parent block will change with the key. Experimental results show that the security of the RASA algorithm has been improved greatly.
     2. Steganalysis algorithms
     By analyzing the distribution of image features and correlation of size of image and its frequency domain coefficients, it is designed by a steganalysis of information hiding For F5(FSF algorithm) combining with F5hidden features of the algorithm,. The experimental results show that the performance of FSF algorithm is more stable and higher accuracy.
     Based on the correlation of size of image and its frequency domain coefficients, it is proposd by a method of calculating primary quantization matrix of JPEG(CM algorithm). The approximation of the original image in the CM algorithm can be get more stable than others. The experimental results show that the CM algorithm is more effective algorithm.
引文
[1]沈昌祥,张焕国,冯登国,等.信息安全综述.中国科学E辑:信息科学,2007,37(2):129-150
    [2]R. J. Anderson, F. A. P. Petitcolas. On the Limits of Steganography. IEEE J Selected Areas Commun,1998,16(4):474-481
    [3]A. Herodotus. The histories. London, England:J.M. Dent & Sons, Ltd,1992
    [4]D. Kahn. The Codebreakers-The story of secret writing. New York, USA:Scribner,1996
    [5]B. Newman. Secret of German Espionage. London, Robert Hale Ltd,1940
    [6]A. S. Cohen, A. Lapidoth. The Gaussian watermaking game. IEEE Trans. Inform. Theory, 2002,48(6):1639-1667
    [7]P. Moulin, M. K. Miheak. The Parallel-Gaussian watermarking game. IEEE Trans. Inform. Theory,2004,50(2):272-289
    [8]A. Somekh-Baruch, N. Methav. On the error exponent and capacity games of Private watermarking systems. IEEE Trans. Inform. Theory,2003.49(3):537-562
    [9]A. Somekh-Barueh, N. Methav. On the capacity game of public watermarking systems. IEEE Trans. Inform. Theory,2004.50(3):511-524
    [10]P. Moulin, A. Briassouli. A stochastic QIM algorithm for robust undetectable image watermarking. In Proc.Int.Conf on Image Proeessing, SingaPore,2004:1173-1176
    [11]H. Malvar, D. Flomeio. Improved spread spectrum:A new modulation technique for robust watermarking. IEEE Trans. Signal Proeessing,2003,51(4):898-905
    [12]M. Bami. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Proeessing Lett.2005,12(2):158-161
    [13]N. Provos, P. Honeyman. Detecting steganographic content on the internet. In ISOC NDSS'02, San Diego, CA,2002,1-14
    [14]H. Farid. Detecting steganographic messages in digital images. Technical Report, TR2001-412, Dartmouth College, Computer Science,2001,1-9
    [15]I. J. Cox, M. L. Miller, J. A. Bloom. Watermaking application and their properties. In Proc. Of Int. Conf. on information Teehnology:Coding and Computing, Mar.2000:6-10
    [16]J. Fridrich, M. Goljan. Practical steganaiysis of digital images-state of the art. In Proc. Of SPIE Photonics West, San Jose, CA,2002,4675:1-13
    [17]N. Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, Washington, DC,2001:323-336
    [18]F. A. P. Petitcolas, R. J. Andesron, M. G. Kuhn. Information hiding-a survey. Proceedings of the IEEE,1999,87(7):1062-1078
    [19]M. Kutter, F. Jordna, F. Bossen. Digital signature of color images using amplitude modulation. Proceeding of the SPIE Ⅷ,1997:200-205
    [20]Y. Jie. Algorithm of XML document information hiding based on equal element. Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 (3):250-253
    [21]J. Davis, J. MacLean; D. Dampier. Methods of information hiding and detection in file systems.5th International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, United states, SADFE,2010:66-69
    [22]E. M. Andres, C. Palamidessi, V. R. Peter, et al. Information hiding in probabilistic concurrent systems. Proceedings-7th International Conference on the Quantitative Evaluation of Systems, QEST2010, Williamsburg, VA, United states,2010:17-26
    [23]A. Westfeld, G. Wolf. Steganography in a video conferencing system [EB/OL]. http:// citeseer.nj.nec.com/westfed99steganography.html
    [24]Y. Paota, T. Hunghsu, L. Jyhshyan. Digital watermaking based on neural networks for color images. Signal Processing,2001,81:663-671
    [25]J. Puate, F. Jordan. Using fractal compression scheme to embed a digital signature into an image [EB/OL]. http://citeseer.nj.nec.com/puate98-using.html
    [26]林良行,苏中民,王庆,等.向量量化图象中的信息搭载.清华大学学报(自然科学版),1997,37(4):106-109
    [27]柳保芳,平西建,邓宇虹.基于融合的数据隐藏算法.电子学报,2001,29(11):1445-1447
    [28]伯晓晨,沈林成,常文森.基于拉普拉斯分布模型的DCT域图像水印视觉可见性评估.电子学报,2003,31(1):33-36
    [29]J. Zollner, H. Federrath. Modeling the security of steganographic systems. In D.Aucsmith, editor, Information Hiding:Seeond International Workshop, SpringerVerlag, Lecture Notes in Computer Sciences,1998,1525:344-354
    [30]N. F. Johnson, S. Jajodia. Steganalysis of images created using current steganography software. In:Proc of 2nd International Workshop on Information Hiding, SpringerVerlag, Lecture Notes in Computer Sciences,1998,1525:273-289
    [31]C. G. Rafael, E. W. Richard著,阮秋琦,阮宇智等译.数字图像处理(第二版).北京:电子工业出版社,2009
    [32]于万波.基于Matlab的图像处理.北京:清华大学出版社,2008
    [33]黎绍发,詹青.层次余弦变化的零树编码法.通信学报,2000,21(3):84-87
    [34]A. Grossmann, J. Morlet. Decomposition of hardy functions into square integrable wavelets of constant shape. SIAM Journal of Mathematical Analysis,1984,15:723-736
    [35]张德丰Matlab小波分析与工程应用.北京:国防工业出版社,2008
    [36]G. J. Simmons. The prisoners'problem and the subliminal channel. Proc. CRYPTO'83: 51-67
    [37]田源.抗侦测的图像信息隐藏方法研究[博士学位论文].合肥:电路与系统,中国科技大学,2007
    [38]B. Pfitzmann. Information hiding terminology. Workshop on information Hiding, Cambridge, UK, SpringerVerlag, Lecture Notes in Computer Sciences,1996,1174:327-350
    [39]孔祥维.信息安全中的信息隐藏理论和方法研究[博士学位论文].大连:大连理工大学,2003
    [40]钮心忻.信息隐藏与数字水印.北京:北京邮电大学出版社,2004
    [41]R. J. Anderson. "Stretching the limits of steganography" in Information Hiding:First International Workshop, Proceedings, Springer, Lecture Notes in Computer Sciences,1996, 1174:39-48
    [42]T. Ilhami, C. Edoardo. Watermaking-based copyright protection of sequential functions. IEEE Journal of Solid-State Circuits,2000,35(2):434-440
    [43]吴秋新,钮心忻,杨义先,等.信息隐藏技术-隐写术与数字水印.北京:人民邮电出版社,2001
    [44]A. Westfeld, A. Pfitzmann. Attack on steganographic systems breaking the steganographic utilities ezstego, Jsteg, Steganos, and S-Tools and some lessons learned. Information Hiding, Third International workship. IH'99 Proeeedings,1999:61-76
    [45]D. Zheng, Y. Liu, J. Zhao. A survey of RST invariant image watermarking algorithms. ACM Comput. Surv.,2007,39(2):1-9
    [46]J. Zollner, H. Federrath, et al. Modeling the Security of Steganograhic Systems. In D.Aucsmith, editor, Information Hiding:Seeond International Workshop. Springer-Verlag, Lecture Notes in Computer Sciences,1998,1525:344-354
    [47]秦姣华.空域图像隐藏信息检测技术研[博士学位论文].长沙,计算机应用技术,湖南大学
    [48]M. Pierre. Information-Hiding Games. Workshop on Digital Watermarking, Springer-Verlag Lecture Notes in Computer Sciences, Seoul, Korea, Nov,2002,2613:1-12
    [49]M. Pierre, A. JosePh, O. Sullivan. Information theoretic analysis of information hiding. IEEE Transaction On Information Theory,2003,49(3):563-593
    [50]吴明巧.数字图像信息隐写与隐写分析性技术研究[博士学位论文].长沙,计算机科学与技术,国防科技大学,2007
    [51]Wbstego软件,http://home.tele2.at/wbailer/wbstego/wbs42i.zip
    [52]TextHide软件,http://www.eompris.eom
    [53]Eshow软件,http://www.truemark.cn/download/eshow.zip
    [54]I. Pitas. A method for signature casting on digital image. Proceeding of International Conference on Image Proeessing,1996,3:207-218
    [55]J. Fridrich, D. Rui. Secure steganographic methods for Palette images. Springer-Verlag, Lecture Notes in computer Science,2000,1768:47-60
    [56]D. Gruhl, W. Bender. Information Hiding to Foil the Casual Counterfeiter. Springer-Verlag, Lecture Notes in Computer Science,1998,1768:1-15
    [57]丁玮.数字图像信息安全的算法研究[博士学位论文].北京:中国科学院,2000
    [58]M. Liaw. An effective data hiding method. Proceedings of IPPR conference on Computer vision, graphics, and image Processing, Taiwan,1997:146-153
    [59]L. M. Marvel, C. G. Bondelet, C. T. Retter. Reliable blind information hiding for images. Springer-Verlag, Lecture Notes in Computer Science, Berlin, Heidelberg,1998,1525:48-61
    [60]L. M. Marvel, C. G. Boncelet, C. T. Retter. Spread spectrum image steganography. IEEE Transactions on Image Proceeding,1999,8(8):1075-1083
    [61]J. Fridrich, M. Goljan, R. Du. Digital image steganography using stochastic modulation. Proceedings of SPIE:Seeurity and Watermarking of Multimedia Contents,2003,5020: 191-202
    [62]E. Kawaguchi, R. O. Eason. Principle and application of BPCS-steganography. In Proeeedings of SPIE:Multimedia Systems and Applications,1998,3528:464-472
    [63]J. Spaulding, H. Noda, M. N. Shilazi, et al. BPCS steganography using EZW lossy compressing images. Pattern Recognition Letters,2002,23:1579-1587
    [64]H. Hioki. A data embedding method using BPCS Principle with new complexity measures. Pacific Rim on Digital Steganography,2002:738-751
    [65]D. C. Wu, T. W. Hsai. A steganographic method for images by Pixel-value differencing. Pattern Recognition Letters,2003,24:1613-1626
    [66]X. P. Zhang, S. Z. Wang. Steganography using multiple base notational system and human vision sensitivity. IEEE Signal Processing Letters,2005,12(1):67-70
    [67]罗向阳,陆佩忠,刘粉林.一类可抵抗SPA分析的动态补偿LSB信息隐藏方法.计算机学报,2007,30(3):463-473
    [68]韩杰思,沈建京,彭韶峰.抗SPA攻击的快速LSB均衡隐藏算法.电子科技大学学报,2010,39(5):769-773
    [69]刘培培,朱中梁,王宏霞.一种抗SPA隐写分析的图像隐写策略.铁道学报,2010,32(4):65-69
    [70]O. Masood, S. Shadrokh, D. Sorina. An efficient high payload+/- 1 data embedding scheme. Multimedia tools and applications,2011,54(2):201-218
    [71]C. C. Lin. An information hiding scheme with minimal image distortion. Computer standards & interfaces,2011,33(5):477-484
    [72]S. Geetha, V. Kabilan, S. P. Chockalingam, et al. Varying radix numeral system based adaptive image steganography. Information on processing letters,2011(16):792-797
    [73]S. Geetha, V. Kabilan, S. P. Chockalingam,et al. Varying radix numeral system based adaptive image steganography. Information Processing Letters,2011,111(16):792-797
    [74]J. H. Li, W. B. Lee, D. P. Ye, et al. Adaptive secret sharing for color images. International Journal of Computational Intelligence Systems,2011,4(5):797-805
    [75]X. P. Zhang, S. Z. Wang. Efficient data hiding with histogram-preserving property. Telecommunication Systems,2011,49(2):179-185
    [76]C. C. Wu, S. J. Kao, M. S. Hwang. A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and software,2011 SpringerVerlag, Lecture Notes in Computer Sciences,84(12):2196-2207
    [77]H. Pan, C. Yuyuan, Y. Tseng. A secure data hiding scheme for two-color images. IEEE Symposium on Computers and Communications,2000:750-755
    [78]Y. Tseng, H. Pan. Secure and invisible data hiding in 2-color images. IEEE Symposium on Computers and Communieations,2000:268-279
    [79]W. Min, T. Edward, L. Bede. Data hiding in digital binary images. Proceeding of IEEE International Conference on Multimedia and ExPo, New York, NY, USA,2000,1:393-396
    [80]L. Guoshiang, C. Yiting, L. WenNung. Anti-Steganalysis Based on Simulated Annealing Algorithm. IEEE Transactions on multimedia,2010,12(5):345-357
    [81]L. Chihyang, C. Chinchen, W. Yuzheng. Reversible steganographic method with high payload for JPEG images. IEICE Transactions on Information and Systems,2008, E91D(3): 836-845
    [82]T. Yenshing, T. Piyu. Adaptive data hiding for vector quantization images based on overlapping codeword clustering. Information sciencses,2011,181(15):3188-3198
    [83]I. Pitas. A method for watermark easting on digital images. IEEE Transaction on circuits and systems for video technology,1998,8(6):775-780
    [84]JPEG-Jsteg-V4. http://www.funet.fi/Pub/crypt/steganograPhy/jpeg-jsteg-v4.diff.gz
    [85]C. C. Chen, T. S. Chen. A steganographic method based upon JPEG and quantization table modification. Information Science,2002,141:123-138
    [86]A. Westfeld. F5-a steganographic algorithm. In 4th International Workshop on Information Hiding, Springer-Verlag, Lecture Notes in Computer Science,2001,2137:289-302
    [87]B. Chen, G. W. Wornell. Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia. JVLSI Signal Processing Syst Signal, Image, and Video Technol(SpeeialIssue on Multimedia Signal Processing), 2001,27:7-33
    [88]Q. Yuan, H. X. Yao, W. Gao, et al. Blind watermarking method based on DWT middle frequency pair[A]. Proceedings of IEEE International Conference on Multimedia & Expo(ICME), Lausanne,2002:473-476
    [89]陈铭.隐写与隐写分析算法及实践研究[博士学位论文],北京:北京邮电大学,2008
    [90]J. Fridrich, M. Goljan. Practical steganalysis of digital images state of the art. Sceurity and Watermarking of Multimedia Contents Ⅳ, Proceedings of SPIE[C],2002,4675:1-13
    [91]R. Chandramouli, M. Kharrazi, N. Memon. Image steganography and steganalysis:concepts and Practice. Springer-Verlag, Lecture Notes in Computer Science, IWDW 2003,2939: 35-49
    [92]梁小萍,何军辉,李健乾,等.隐写分析-原理、现状与展望.中山大学学报,2004,43(6):93-96
    [93]夏熠,郎荣玲,戴冠中,等.基于图像的信息隐藏分析技术综述.计算机工程,2003,29(7):1-3
    [94]A. Westfeld, A. Pfitzmann. Attacks on steganographic systems. Proceedings of Information Hiding Workshop, Springer-Verlag, Lecture Notes in Computer Science,1999,1768:61-76
    [95]F. J. Neil, S. Jajodia. Steganalysis of images created using current steganography software. Proceedings of the second Information Hiding Workshop, Springer-Verlag, Lecture Notes in Computer Science,, Oregon, USA,1998,1525:273-289
    [96]J. Fridrich, D. Rui, M. Lomg. Steganalysis of LSB encoding in color images. Proceedings IEEE International Conference on Multimedia and ExPo, New York City, NY, July 30-Auguest 2,2000:1279-1282
    [97]J. Fridrich, M. Goljan, R. Du. Reliable dectection of LSB steganography in color and grayscale images. Proceedings of ACM Workshop on Multimedia and Sceurity, Ottawa, Oct.5,2001:27-30
    [98]S. Dumitreseu, X. Wu, Z. Wang. Detection of LSB steganography via sample Pairan alysis. IEEE Transaetion on Signal Processing,2003,51(7):1995-2000
    [99]P. Z. Lu, X. Y. Luo, Q. Y. Tang, et al. An improved sample Pairs method for detection of LSB embedding. Springer-Verlag, Lecture Notes in Computer Science, Berlin,2004,3200: 116-127
    [100]J. Fridrich, M. Goljan, D. Soukal. Higher order statistical steganalysis of palette image. Security and Watermarking of Multimedia Contents V, Proceeding of SPIE-IS&T Electronix Imaging, SPIE 2003,502:131-142
    [101]D. K. Andrew. Quantitative evaluation of pairs and RS steganalysis. Sceurity, Steganography and Watermarking of Multimedia Contents VI, Proceeding of SPIE-IS&T Electronix Imaging,2004 SPIE,5306:83-97
    [102]D. K. Andrew. Improved Detection of LSB Steganography in Grayseale Images. Information Hiding Workshop, Springer LNCS,2004,3200:97-115
    [103]张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测.软件学报,2004,15(1):151-158
    [104]杨春芳,罗向阳,倪大平,等.DIH方法的改进及与SPA和RS方法的比较分析.哈尔滨工业大学学报,2006,第38卷增刊
    [105]Dabeer OnLkar, Sullivan Kenneth, Madhow Upamanyu, et al. Detection of hiding in the least significant bit. IEEE Transaction On Signal Processing,2004,52(10):3046-3058
    [106]Z. Li, S. A. Ren, Y. X. Yang. A LSB steganograph y detection algorithm. Proceedings of IEEE 2003 International Symposium Personal Indoor and Moble Ratio Communucation, Beijing,2003:2780-2783
    [107]X. Q. Yu, T. N. Tan, Y. H. Wang. Extended optimization method of LSB steganalysis. IEEE International Conference on Image Processing, September 11-14,2005, Genoa, Italy,2: 1102-1105
    [108]X. W. Kong, T. Zhang, X. G. You, et al. A new steganalysis approach based on both complexity estimate and statistical filter. IEEE Pacific Rim Conference on Multimedia 2002, LNCS 2532:273-294
    [109]H. C. Dou, H. B. Zhang, S. H. Zhan. Independent componet analysis applied to steganalysis. Proceedings of 7th International Conference on Signal Processing, ICSP'04,2004,3: 2498-2501
    [110]夏熠,郎荣玲,戴冠中,等.基于数字图像LSB隐藏的检测算法.计算机工程,2004,30(4):10-11
    [111]翟卫东,吕述望,刘振华.基于广义高斯分布的彩色图像空域隐写检测算法.通信学报,2004,25(2):33-42
    [112]M. Niimi, R. O. Eason, H. Noda, et al. Intenisty histogram steganalysis in BPCS-steganograPhy. Proceedings of SPIE, Security and Watermarking of Multimedia Contents, Electronic Imaging 2001 San Jose,20-26 January,2001,4314:555-564
    [113]张新鹏,王朔中.对空域BPCS密写的统计分析.计算机辅助设计与图形学学报,2005,17(7):1625-1629
    [114]S. R. Khosravirad, T. Eghlidos, S. Ghaemmaghami. Closure of sets:a statistically hypersen-sitive system for steganalysis of least significant bit embedding. IET signal processing, 2010,5(4):379-389
    [115]Z. H. Xia, L. C. Yang, X. M. Sun, et al. A learning-based steganalytic method against LSB matching steganography. Radio Engineering,2011,20(1):102-109
    [116]W. Q. Luo, J. W. Huang, F. J. Huang. Security analysis on spatial+/-1 steganography for JPEG decompressed images. IEEE Signal Processing Letters,2011,18(1):39-42
    [117]M. Jang, X. Wu, E. K. Wong, Memon N. Steganalysis of boundary based steganorgraphy using autoregressive model of digital boundaries. IEEE Intematinal Conference on Multimedia and ExPro, ICME,2004,2:883-886
    [118]Y. Y. Meng, B. J. Gao, Y. Qiang, et al. A novel steganalysis of data hiding in binary Text images. IEEE Singapore International Conference on Communication Systems,2008ICCS, 2008:347-351
    [119]H. Zhao, H. X. Wang, M. K. Khan. Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Processing,2011,91(11):2595-2605
    [120]N. Provos. P. Honeyman. Detecting steganographic content on the internet. Technical Report CITI 01-la, University of Miehigan,2001,1-13
    [121]J. Fridrich, M. Goljan, D. Hogea. Steganalysis of JPEG images:breaking the F5. Proceeding of Information Hiding Workshop, Springer-Verlag, Lecture Notes in Computer Science, 2002,2578:310-323
    [122]J. Fridrich, M. Goljan. New methodology for breaking steganographic techniques for JPEGs. In Proceeding of SPIE, Sceurity and Watermarking of Multimedia Contents V 2003: 143-155
    [123]J. H. Eremiah, A. P. William. Kernal fisher disriminant for steganlysis of JPEG hiding. In proceedings of SPIE, Seeurity, Steganography and Watermarking of Multimedia Contents V1,2004:13-22
    [124]J. Fridrich, M. Goljan, D. Hogea. Attacking the Outguess. Proceedings of ACM Workshop on Multimedia and Sceurity, France, December 6,2002:3-6
    [125]J. Fridrich, M. Goljan, R. Du. Steganalysis based on JPEG compatibility. Proceeding of Multimedia Systems and Applications IV, SPIE,2002,4518:275-280
    [126]Y. Wang, P. Moulin. Steganalysis of block-dct image steganography. IEEE Workshop on Statistical Signal Processing,2003:339-342
    [127]J. J. Harmsen, W. A. Pearlman. Steganalysis of additive nosie modelable information hiding. Security and Watermarking of Multimedia Contents V, Proceeding of SPIE-IS&T Electronix Imaging, SPIE 2003,5020:21-24
    [128]C. H. Chen, Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE International Symposium on Circuits and Systems, ISCAS 2008, Seattle, WA,2008:3029-3032
    [129]M. Hernandez-Chamorro, A. Espejel-Trujillo, J. Lopez-Hernandez, et al. A methodology of steganalysis for image.2009 International Conference on Electrical, Communications, and Computers, Cholula, Puebla,2009:102-106
    [130]Y. Wang, J. F. Liu, W. M. Zhang, et al. Reliable JPEG steganalysis based on multi-directional correlations. Signal Processing,2010,25(8):577-587
    [131]Q. Z. Liu, H. Sung Andrew, M. Y. Qiao, et al. An improved approach to steganalysis of JPEG images. Information Sciences,2010,180(9):1643-1655
    [132]Z. H. Xia, X. M. Sun, L. Wei, et al. JPEG image steganalysis using joint discrete cosine transform domain features. Journal of Electronic Imaging,2010,19(2):300601-300613
    [133]S. H. Liu, H. X. Yao, W. Gao. Steganalysis based on wavelet texture analysis and neural network. Fudan Journal (Natural Science),2004,43(5):910-913
    [134]S. H. Liu, H. X. Yao, W. Gao. Steganalysis of data hiding techniques in wavelet domain. International Conference on Information Technology:Coding Computing, ITCC, Las Vegas, USA,2004(1):751-754
    [135]刘绍辉,姚鸿勋,高文,等.针对小波域量化隐藏方法的图像监测技术研究.通信学报,2004,25(7):71-77
    [136]S. Hedieh, J. Mansour. CBS:Contourlet-Based Steganalysis Method. Journal of Signal Processing Systems for Signal Image and Video Technology,2011,61(3):367-373
    [137]I. Avcibas. Steganalysis Using image quality metrics. IEEE Transactions on Image Processing,2003,12(2):221-229
    [138]I. Avcibas, B. Sankur, K. Sayood. Statistical analysis of image quality measures. Jounal of Electronics Image,2002,11:206-223
    [139]S. W. Lyu, H. Farid. Steganalysis using color wavelet statistics and One-Class support vector machines[C]. In:SPIE Symposium on Electronic Imaging, SanJose, CA,2004
    [140]W. N. Lie, G. S. Lin. A feature-based classification technique for blind image steganalysis. IEEE Transaction on Multimedia,2005,7(6):1007-1020
    [141]G. S. Lin, W. N. Lie. Study on detecting image hiding By feature analysis. Proc. of IEEE International SymPosium on Circuits and Systems(ISCAS-2001), Sydney, Australia,2001: 149-152
    [142]S. Trivedi, R. Chandramouli. Secret key estimation in sequential steganography. IEEE Transactions on signal proeessing,2005,53(2):746-757
    [143]N. F. Johnson, S. Jajodia. Steganalysis of images created using current steganography software. Proc. of the 2nd Int'lWorkshop on Information Hiding, Springer- Verlag, Berlin, 1998,273-289
    [144]许文丽,于叶云,王育民.安全高效的水印认证协议[J].计算机研究与发展,2008,45(3):557-562
    [145]黄方军,黄继武.基于图像校准的通用型JPEG隐写分析[J].中国科学F辑:信息科学,2009,39(4):383-390
    [146]A. Westfeld. Detecting low embedding rates. Proceedings of the 5th international Workshop on Information Hiding. Springer-Verlag, Lecture Notes in Computer Science, Berlin, Germany,2002,2578:324-339
    [147]J. Fridrich, M. Goljan, R. Du. Detecting LSB steganography in color and grayscale images. IEEE Transactions on Multimedia,2001,8(4):22-28
    [148]D. Sorina., X. L. Wu, Z. Wang. Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing,2003,51(7):1995-2007
    [149]J. J. Yu, J. W. Han. A secure steganographic scheme Workshop on Digital Watermarking. Springer-Verlag, Lecture Notes in computer Science 2939, Berlin, Germany,2004,497-507
    [150]X. Y. Luo, B. Liu, F. L. Liu. A dynamic compensation of LSB steganography resisting RS steganalysis. Proceeding of the IEEE on Southeast Conference,2006,244-249
    [151]罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法.计算机学报,2007,30(3):464-174
    [152]田源,程义民,谢于明,等.一种抗SPA分析的图像信息隐藏方法.中国科学技术大学学报,2008,38(12):1376-1380
    [153]C. L. Zhang, J. Jiang, K. Mohamed. Intrusion detetion using hierarchical neural networks. Pattern Recognition Letter,2005,26(6):779-791
    [154]罗向阳,高山青,刘镔,等.一种可抵御RS统计分析的图像信息隐藏方案[J].控制与决策,2007,22(4):423-435
    [155]USC-SIPI Image Database, http://sipi.usc.edu/services/database/database.html
    [156]K. Solanki, A. Sarkar, B. S. Manjunath. YASS:yet another steganographic scheme that resists blind steganalysis. Lecture Notes in Computer Science,2007,4567:16-31
    [157]S. Hetz, P. Mutzel. A graph theoretic approach to steganography. In:9th IFIPTC-6TC-11 International Conference of Communications and Multimedia Security, Salzburg, Austria, 2005,3677:119-128
    [158]J. Fridrich, M. Goljan, P. Lisonek, et al. Writing on wet paper. International ACM Workshop on Multimedia and security, Magdeburg, Germany,2004,4-15
    [159]A. Westfeld. High capacity despite better steganalysis (F5-a steganographic algorithm). Lecture notes in computer science:4th International Workshop on Information Hiding,2001, 2137:289-302
    [160]K. Solanki, K. Sullivan, U. Madhow, et al. Probably secure steganography:achieving zero K-L divergence using statistical restoration. In:Proc. ICIP.2006:125-128
    [161]K. Solanki, N. Jacobsen, U. Madhow, et al. Robust image adaptive data hiding based on erasure and error correction. IEEE Trans, on Image Processing,2004,13(12):1627-1639
    [162]T. Pevny, J. Fridrich. Multi-class blind steganalysis for JPEG images. In:Proc. of SPIE, San Jose, CA,2006,1-13
    [163]T. Pevny, J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In:Proc. of SPIE, San Jose, CA,2007,1-13
    [164]I. Avcibas, B. Sankur, N. Memon. Image steganalysis with binary similarity measures. In: Proc. ICIP,2002:645-648
    [165]G. Xuan, Y. Q. Shi, J. Gao, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In:Lecture notes in computer science:7th International Workshop on Information Hiding,2005, LNCS 3727:262-277
    [166]J. J. Harmsen, W. A. Pearlman. Steganalysis of additive noise modelable information hiding. In:Proc. of SPIE,2003:131-142
    [167]Y. Q. Shi, C. Chen, W. Chen. A Markov process based approach to effective attacking JPEG steganography. In:Lecture notes in computer science:8th Inter-national Workshop on Information Hiding,2007,4437:249-264
    [168]Y. Wang, P. Moulin. Optimized feature extraction for learning-based image steganalysis. IEEE Transactions on Information Forensics and Security,2007,2(1):31-45
    [169]O. Dabeer, K. Sullivan, U. Madhow, et al. Detec-tion of hiding in the least significant bit. IEEE Transactions on Signal Processing, Supplement on Secure Medial,2004,52(10): 3046-3058
    [170]C. Chen, Y. Q. Shi, W. Chen, et al. Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function. In:Proc. ICIP, Atlanta, GA, USA,2006: 105-108
    [171]B. Li, J. W. Huang, Y. Q. Shi. Steganalysis of yass. IEEE transations on information forensics and security,2009,4(3):369-382
    [172]L. F. Yu, Y. Zhao, R. R. Ni. A high-performance Yass-like scheme using randomized big blocks.2010 International Conference on Mechanical Enginering(ICME 2010):1-6
    [173]D. Divsalar, H. Jin, R. J. McEliece. Coding theorems for "turbo-like" codes. In 36th Annual Allerton Conference on Communication, Control, and Computing, Allerton,1998, IL:23-25
    [174]F. J. Hang, J. W. Huang. General-purpose image-based calibration JPEG steganalysis. Science in China (Series F:Information Sciences),2009,39(4):383-390
    [175]L. H. Zhang, X. F. Liao, X. B. Wang. A novel Wavalet-based Watermarking Scheme. Journal of Information& Computational Science,2005,2(1):187-192
    [176]JPEG-Jsteg-V4 [EB/OL]. [2009-06-01]. http://www.Funet.Fi/pub/crypt/steganography/jpeg-jsteg-v4.diff. gz
    [177]P. Sallee. Model-Based Steganography. International Workshop on Digital Watermarking, Springer-Verlag 2004,2939:154-167
    [178]C. Manikopoulos, Y. Q. Shi, S. Song, et al. Detection of block DCT based steganography in gray-scale images. Multimedia Signal Processing,2002,12(1):355-358
    [179]J. Fridrich, M. Goljan, D. Hogea. New methodology for breking steganographic techniques for JPEG. CA:Proc El SPIE, Santa Clara,2003:143-155
    [180]J. Fridrich, D. Soukal. Quantitative Steganalysis of digital images:Estimating the secret message length. ACM Multimedia Systems Journal,2003,9(3):288-302
    [181]J. Fridrich, M. Goljan, D. Hogea. Steganalysis of JPEG images:breaking the F5 algorithm. Proceedings of the 5th Information Hiding Workshop, Lecture Notes in Computer Science, 2002,2578:310-323
    [182]韩晓东,平西建,张涛.基于0,1系数组合差异的F5隐写分析算法[J].信息工程大学学报,2009,10(2):184-187
    [183]J. Lukas, J. Fridrich. Estimation of primary quantization matrix in double compressed JPEG Images. Proc. of Digital Forensic Research Workshop(DFRWS 2003), Cleveland, OH, USA, 2003:67-84
    [184]Z. Fan, R. L. Queiroz. Identification of bitmap compression history:JPEG detection and quantizer estimation. IEEE Trans, on Image Processing,2003,12(2):230-235
    [185]T. Pevny, J. Fridrich. Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January,2008: 1-13
    [186]A. Popescu, H. Farid. Statistical tools for digital forensics.6th International Workshop on Information Hiding, Toronto, Canada, May,2004:128-147
    [187]J. He, Z. Lin, L. Wang, et al. Detecting doctored JPEG images via DCT coefficient analysis. Proc.9th European Conference on Computer Vision (ECCV2006), Berlin,2006:423-435
    [188]王俊文,刘光杰,戴跃伟,等.一种估计JPEG双重压缩原始量化步长的新方法.电子与信息学报,2009,31(4):836-839
    [189]M. W. Tang, M. Y. Fan, W. Song, et al. A steganalysis of information hiding For F5. Journal of Computational Information System,2010,6(1):55-62

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700