数字图像信息隐写与隐写分析技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络和信息技术的发展,数字多媒体数据可以在通信网络中迅速便捷的传输,带来通信便利的同时,也给信息安全带来新的挑战。信息隐藏技术成为信息安全领域的研究热点。作为信息隐藏技术主要分支的信息隐写技术,通过将秘密信息隐藏到公开的数字媒体中,以达到传输秘密信息的目的,因而具有更强的隐蔽性。研究信息隐写技术及隐藏信息的检测—隐写分析技术,对国家信息安全具有重要意义。本文主要研究以数字图像为载体的信息隐写及隐写分析技术。
     论文对图像信息隐写技术进行了回顾,利用信息论对信息隐写系统的安全性进行了分析。提出了一种DCT域的图像信息隐写算法。该算法将数字图像置乱技术中的幻方变换与数字通信中的数字调制技术相结合,以二值文字图像为待隐藏的秘密信息,以静止图像为载体。实验证明算法透明性好,具有良好的抗剪切性。在深入研究人类视觉系统模型的基础上,提出了基于视觉模型的小波域数字图像隐写算法。考虑人类视觉系统的特性,给出图像小波域临界噪声域值矩阵JND(justnoticed difference),利用迭代混合的方法将秘密信息白适应的嵌入原始图像的小波系数中。实验证明该算法具有良好的透明性和鲁棒性。
     论文对图像隐写分析技术进行了回顾,总结了图像统计模型。图像隐写工具Jsteg使用图像DCT系数的LSB隐藏秘密信息,传统的卡方攻击只能检测序列Jsteg隐藏,不能检测随机Jsteg隐藏。提出了一种基于图像统计模型的针对Jsteg隐写分析算法。算法利用Laplacian分布拟和图像AC系数的统计量,运用皮尔逊x~2进行拟和度检验,使用线性回归估计嵌入量。该方法能够检测序列Jsteg嵌入和随机Jsteg嵌入。
     隐写算法中利用图像DCT系数最不重要位隐藏信息的隐写算法具有透明性好,鲁棒性强等特点。这类隐写算法包括Jsteg,Outguess等。论文提出了针对DCT系数最不重要位隐写算法的隐写分析算法。算法利用DCT系数的相关性,以统计测试值作为特征,运用支撑向量回归判别隐秘图像与原始图像。实验证明该隐写分析算法能够有效检测Jsteg隐写和Outguess隐写。
     主动隐写分析的目的不光是判别隐秘图像,而且估计嵌入算法的参数为秘密信息的提取作准备。论文提出了一种针对图像扩展频谱序列隐写的密钥估计算法。该算法基于序列分析与突变检测的理论,考虑图像DCT系数满足拉普拉斯分布,给出了理想平稳拉普拉斯分布信号扩展频谱隐藏密钥估计的模型。对于非平稳信号的图像数据,利用局部最有效序列检测法,给出了拉普拉斯分布的密钥估计模型。实验证明,该方法不但能检测出扩展频谱隐写,估计嵌入密钥,而且比Trivedi的方法更有效。
     设计实现了数字图像隐写分析平台。该软件平台基于VC++语言实现,可对BMP图像和JPEG图像挂接隐写、空域隐写、频域隐写及部分隐写软件工具隐写进行检测。
     介绍了文本信息隐写技术。深入分析了文本隐写工具Stego的隐写原理,提出了针对Stego的隐写分析方法。当隐写所使用的字典单词全以小写字母开头时,可以通过基于标志特征的隐写分析方法检测出隐秘文本;当上述条件不满足时可通过基于统计特征的隐写分析方法检测出隐秘文本。
With the development of network and information technology, digital media data can be transmitted fleetly and conveniently on communication netwok. Bring conveniency to communication, it also brings new challenge to communication security. Information hiding has become the hotspot in reseach of communication security. Steganography, as the main embranchment of information hiding, hiding the secret information into open digital media for the purpose of secret communication, is more imperceptible. Research on steganography and the detection of hiding message is very important to national communication security. This thesis is mainly researching on steganography and steganalysis technique of images.
     A review of steganorgraphy in images is given. The security of steganography system is analysised using information theory. A steganography algorithm in DCT domain of image is proposed. Using literal image as secret message and still image as cover, this algorithm combines image scrambling with digital modulation. Experiment results show that the property of invisibility and anticropping is good. Based on human visual system model, a novel image steganography algorithm in wavelet domain is proposed using the iterative blending method. Giving the character of human visual system, a JND (just noticed difference) threshold matrix is caculated pixel by pixel in the image subbands. Using the iterative blending method, the secret message is embedded into wavelet coefficients adaptively. Experiment results show that the property of invisibility and robustness is good.
     A review of steganalysis in images is given. Steganography software Jsteg uses the LSB of DCT coefficients to hide secret message. The tranditional Chi-square test can only detec the sequential Jsteg hiding and can not detect the random Jsteg hiding. A new fast steganalysis algorithm for detecting Jsteg hiding based on statistical model of image is proposed. The algorithm uses the Laplacian to fit the distribution of statistic of AC coefficients and uses Pearsonχ~2 test to test goodness-of fit. The amount of embedding message is estimated using linear regression. The algorithm can detect both sequential Jsteg hiding and random Jsteg hiding.
     The kind of steganography algorithms using the least significant bit of the DCT coefficients to hide message have the characters of invisibility and robustness. This kind of steganography algorithms includes Jsteg, Outguess and so on. A steganalysis algorithm that can detect the hiding in the least significant bit of the DCT coefficients is proposed. The algorithm is based on the thought that the DCT coefficients are correlative. Using the statistical tests as the features, support vector regression is trained to discriminate the stego-images from the clear ones. Experiment results show that our method can detect the hiding by Jsteg and OutGuess.
     The purpose of active steganalysis is not only detecting stego-image, but also estimate the parameter of embedding algorithm for extraction of the secret message. A steganalysis algorithm that estimates the secret key used in sequential steganography of spread spectrum embedding is proposed. Considering the Laplacian distribution of image DCT coefficients, a secret key estimation model of stationary laplacian host signal embedded by spread spectrum steganography is presented based on the theory of detection of abrupt changes and sequential detection. For non-statioanry digital image, a locally most powerful steganaysis detector is derived based on Laplacian distribution. The results of experiments show that our method is more efficient than Trivedi's method.
     An image steganalysis software is designed and implemented by Visual C++ language. This software can detects the steganography of connecting, hiding in spacial domain, hiding in frequent domain and hiding using some steganography software.
     A sumarise of steganography in test is given. By deeply study the mechanism of Stego, two steganalysis methods are proposed. When the first letters of words in dictionary are lowercases, the steganalysis method based on the signature characters can detect Stego. When it's not the case, the steganalysis method based on statistical characters can detect Stego.
引文
[1]Petitcola F,Anderson R J,Kuhn M G.Information hiding-a survey.Proceedings of the IEEE,1999,87(7):1062-1078.
    [2]Katzenbeisser S,Petitcola F.信息隐藏技术—隐写术与数字水印[M].吴秋新等,译.北京:人民邮电出版社,2001.
    [3]Chen Minya,Wong Edwar K,Memon Nasir,Adams Scott.Recent developments in document image watermarking and data hiding.Proceedings of SPIE Multimedia Systems and Application,Aug 2001,4518:166-176.
    [4]王育民,刘建伟.通信网的安全一理论与技术[M].西安:西安电子科技大学出版社,1999.
    [5]Desmedt Yvo.Establishing big brother using covert channels and other covert techniques.Proceedings of 1nd International Workshop on Information Hiding,LNCS 1174:65-71,Springer-Verlag Berlin Heidelberg 1996.
    [6]Meadows Catherine,Moskowitz S.Covert channels-a context based view.Proceedings of 1nd International Workshop on Information Hiding,LNCS 1174:73-93,Springer-Verlag Berlin Heidelberg,1996.
    [7]柳葆芳.信息伪装与数据隐藏算法研究[D].郑州:解放军信息工程大学,2002.
    [8]Cox Ingemar J,Linnartz Jean-Paul M G..Some general methods for tampering with watermarks.Journal on Selected Areas in Communications,1998,16(4):587-593.
    [9]Wolfgang R B,Delp E J.A watermark for digital images.Proceedings of IEEE International Conference on Image Processing,1996,3:219-222.
    [10]Zeng W and B.Liu.On resolving rightful owner-ships of digital images by invisible watermarks.Proceedings of ICIP'97,vol Ⅰ:552-555,1997.
    [11]Chandramouli R.A mathematical framework for active steganalysis.Special issue on multimedia watermarking,Springer/ACM Multimedia Systems,2003,9(3):303-311.
    [12]Johnson N F,Jajodia S.Exploring steganography-seeing the unseen.IEEE Computer,1998,31(2):26-34.
    [13]Bender W,Gruhl D,Morimoto N,Lu A.Techniques for data hiding.IBM System Journal,1996,35(3&4):313-336.
    [14]Anderson R J,Petitcolas F.On the limits of steganography.IEEE Journal of Selected Areas in Communications,1998,16(4):474-481.
    [15]江早.信息伪装.一种崭新的信息安全技术.中国图像图形学报,1998(3):83-86.
    [16]柏森,胡中豫,吴乐华,周道华.通信信息隐匿技术[M].北京:国防工业 出版社,2005.
    [17]华先胜.静止图像的局部化多类数字水印[D].北京:北京大学,2001.
    [18]杜江.信息隐藏与数字水印技术研究[D].西安:西安电子科技大学,2001.
    [19]王卫卫.小波与提升及其在图像数字水印中的算法研究[D].西安:西安电子科技大学,2001.
    [20]孔祥维.信息安全中的信息隐藏理论和方法研究[D].大连:大连理工大学,2003.
    [21]Pfitzmann B.Information hiding terminology.Workshop on information Hiding,Cambridge,UK,LNCS 1174:327-350,Springer Verlag,1996.
    [22]袁渊.小波域盲水印检测算法研究[D].长沙:国防科技大学,2003.
    [23]Katzenbeisser Stefan,Petitcolas Fabien A P.Information hiding techniques for steganography and digital watermarking[M].Artech House,Inc,2000.
    [24]Anderson R J.Stretching the limits of steganography.Information Hiding:First International workshop,LNCS 1174:39-48,Springer Verlag,1996.
    [25]Machado R.Stego.http://www.nitv.net/~mesh/Romana/Stego.html,1994
    [26]孔祥维,尤新刚.信息隐藏技术安全性的攻击框架即方法.信息隐藏全国学术研讨会(CIHW2002)论文集.北京:机械工业出版社,2002:42-47.
    [27]Flynn J.A Journey Within Steganos.http://www.fravia.org/fly01.html.
    [28]PhotoShop 4.0/Digimarc:Commercial stupidity-Digimarc downfall,http://www.fravia.org/forgdigi.htm,1997.Original post in Learn Cracking Ⅳ.
    [29]Kellen T.Hiding in plain view:could stegnography be a terrorist tool?http://rr.sans.org/steg/plain_view.php.
    [30]WetStone Technologies Web Site Gargoyle,http://www/wetstonetech.com/gargoylens.html.
    [31]Cachin C.An information theoretic model for steganography.Lecture Notes on Computer Science,1525:306-318,Springer-Verlag,1998,
    [32]Zollner J,Federrath H,Klimant H,Pfitzmann A,Piotraschke R.Modeling the security of steganographic systems.2th Workshop on Information Hiding,Portland,LNCS 1525:345-355,Springer-Verlag,1998.
    [33]Mceliece Robert J.The theory of information and coding.Cambridge University Press.2002.
    [34]傅祖芸.信息论—基础理论与应用[M].北京:电子工业出版社,2001.
    [35]阮秋琦.数字图像处理[M].北京:电子工业出版社,2001.
    [36]孙兆林.Matlab 6.X图像处理[M].北京:清华大学出版社,2002.
    [37]沈庭芳,方子文.数字图像处理及模式识别[M].北京:北京理工大学出版社,1998.
    [38]黎绍发,詹青.层次余弦变化的零树编码法.通信学报,2000,21(3):84-87.
    [39]吴乐南.数据压缩[M].北京:电子工业出版社,2000.
    [40]Grossmann A,Morlet J.Decomposition of hardy functions into square integrable wavelets of constant shape.SIAM Journal of Mathematical Analysis,1984,15:723-736.
    [41]Grossmann A,Morlet J.Transforms associated to square integrable group representations.Journal of Mathematical Physics,1985,26(10):2473-2479.
    [42]崔锦泰.小波分析导论.西安:西安交通大学出版社,1995.
    [43]刘贵忠,邸双亮.小波分析及其应用.西安:西安电子科技大学出版社,1995.
    [44]丁玮,齐东旭.基于Arnold变换的数字图像置乱技术.计算机辅助设计与图形学学报,2001,13(4):338-341.
    [45]Qi Dongxu,Zou Jianchen,Han Xiaoyou.A new class of scrambling transformation and its application in the image information covering.Science in China(Series E),2000,43(3):304-312.
    [46]王道顺,杨地莲,齐东旭.数字图像的两类非线性变换及其周期性.计算机辅助设计与图形学学报,2001,13(9):829-833.
    [47]邹建成,唐旭辉,李国富.数字图像的仿射变换及其周期.北方工业大学学报,2000,12(3):13-16.
    [48]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽忠的应用.中国科学(E辑),2000,30(5):440-448.
    [49]孙伟.关于Arnold变换的周期.北方工业大学学报,1999,11(1):29-32.
    [50]邹建成,铁小匀.数字图像的二维Arnold变换及其周期.北方工业大学学报,2000,12(1):10-14.
    [51]丁玮,齐东旭.基于生命游戏的数字图像置乱与数字水印技术.北方工业大学学报,2000,12(1):1-5.
    [52]丁玮,齐东旭.基于置乱与融合的数字图象隐藏技术及其应用.中国图象图形学报,2000,5(A,8):643-649.
    [53]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):839-843.
    [54]齐东旭.芬形及其计算机生成.北京:科学出版社,1994.
    [55]王新成.多媒体实用技术(图像分册).成都:电子科技大学出版社,1995.
    [56]沈庭方,方子文.数字图像处理及模式识别.北京:北京理工大学出版社,1998.
    [57]李国富,宋瑞霞,赵敏.椭圆曲线在数字图像隐藏中的应用.北方工业大学 学报,2000,12(3):17-20.
    [58]柏森,曹长修等.基于骑士巡游变换的数字图象细节隐藏技术.中国图象图形学报,2001,6(11,A):1090-1100.
    [59]柏森,曹长修.一种新的数字图像置乱隐藏算法.计算机工程,2001,27(11):18-19,119.
    [60]卢朝阳,周幸妮.一种新的数据信息置乱算法.计算机工程与科学,1998,20(3):28-31.
    [61]丁玮.数字图像信息安全的算法研究[D].北京:中国科学院,2000.
    [62]李国富.基于正交拉丁方的数字图像置乱方法.北方工业大学学报,2001,23(1):14-17.
    [63]易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法.计算机辅助设计与图形学学报,2000,12(9):672-676.
    [64]陈东斌,段晓辉等.抗剪切的彩色图像多数字水印算法[A].全国第三届信息隐藏学术研讨会论文集[C],2001.
    [65]Christian J.van den Branden Lambrecht,Farrell Joyce E.Perceptual quality metric for digitally coded color images.Proceedings of the European Signal Processing Conference,pp.1175-1178,Trieste,Italy,September 10-13,1996.
    [66]Shen Day-Fann,Wang Shih-Chang.Measurements of JND property of HVS and its applications to image segmentation,coding and requantization.Proceeding of Digital Compression Technologies and Systems for Video Communications,SPIE Vol.2952:113-121.
    [67]Lew A S,Knowles G.Image compression using the 2-D wavelet transform.IEEE Transactions on Image Processing,1992,1(2):244-245.
    [68]Huh Y,ttwang J J.The new extended JPEG coder with variable quantizer using block wavelet transform.IEEE Transaction on Consumer Electronics,1997,43(3):401-409.
    [69]Wolfgang Raymond B,Podilchuk Christine I.Perceptual Watermarks for Digital Images and Video.Proceeding of the IEEE,1999,87(7):1108-1126.
    [70]Lin Ching-Yunng,Chang Shih-Fu.Watermarking capacity of digital images based on domain specific masking effects.IEEE International Conference on Information Technology:Coding and Computing,Las Vegas,NV,Apr.2001:90-94.
    [71]Lai Yung-Kai,Kuo C C J.Perceptual image compression with wavelet transform.Proceedings of the 1998 IEEE International Symposium on Circuits and Systems,1998.ISCAS'98,vol.4:29-32.
    [72]Podilchuk C,Zeng W.Perceptual watermarking of still images.IEEE First Workshop on Multimedia Signal Processing,1997:363-368.
    [73]Inoue Hisashi,Miyazaki Akio,Katsura Takashi.An image watermarking method based on the wavelet transform.1999 International Conference on Image Processing(ICIP'99),Japan Kobe,1999:24-28.
    [74]Kankanhalli M S,Ramakrishnan K R.Content based watermarking of images.In:Effelsberg W,ed.Proceedings of the ACM Multimedia 98-Electronic,the 6th ACM International Multimedia Conference.New York:ACM Press,1998,61-70.
    [75]Watson Andrew B.DCT quantization matrices visually optimized for individual images.In Proc.SPIE Int.Conf.Human Vision,Visual Processing and Digital Display-Ⅳ,1993,vol.1913:202-216.
    [76]Watson Andrew B,Yang Gloria Y.Visibility of wavelet quantization noise.IEEE Transactions on Image Processing,1997,6(8):1164-1175.
    [77]Watson Andrew B,Yang Gloria Y.Visual thresholds for wavelet quantization error.In Proc.SPIE Human Vision and Electronic Imaging,1996,2657:381-392.
    [78]Christone I,Podilchuk,Zeng Wenjun.Image adaptive watermarking using visual models.IEEE Journal on Selected Areas in Communications,1998,vol.16:525-539.
    [79]Kundur Deepa,Hatzinakos Dimitrios.A robust digital image watermarking method using wavelet-based fusion.IEEE International Conference on Image Processing,1997,Vol.1:544-547.
    [80]Levine M D.Vision in Man and Machine.Toronton:McGraw-Hill,1985.
    [81]Barni Mauro,Bartolini Franco.Improved wavelet-based watermarking through pixel-wise masking.IEEE Transactions on Image Processing,2001,10(5):783-791.
    [82]杨恒伏,陈孝威.小波域鲁棒自适应公开水印技术.软件学报,2003,14(9):1652-1660.
    [83]Kuo C H,Chen C F A.prequantizer with the human visual effects for the DPCM [J].Signal Processing:Image Communicationg,1996,(8):433-422.
    [84]Kuo C H,Chen C F A.Vector quantization scheme using prequantizers of human visual effects[J].Signal Processing:Image Communication,1998,(12):13-21.
    [85]Ahumada Albert J.Jr,Peterson Heidi A.Luminance-model-based DCT quantization for color image compression.Proceedings of SPIE on Human Vision,Visual Processing,and Digital Display Ⅲ.1992,1666:365-374.
    [86]Legge G E.A power law for contrast discrimination.Vision Research.1981,21:457-467.
    [87]Legge G E,Foley J M.Contrast masking in human vision.Journal of the Optical Society of America.1980,70:1458-1471.
    [88]张贵仓,王让定,章毓晋.基于迭代混合的数字图像隐藏技术.计算机学报,2003,26(5):569-574.
    [89]Huang Jinggang.Statistics of natural images and models.PhD thesis.Brown University,May,2000.
    [90]Olshaussen B A,Field D J.Natural image statistics and efficient coding.Network Computation in Neural Systems,1996,7(2):333-339.
    [91]张涛,平西建.基于差分直方图实现LSB信息信息伪装的可靠检测.软件学报,2004,15(1):35-41.
    [92]Huang JG,Mumford D.Statistics of natural images and models.Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition,1999 Vol.1:1541-1547.
    [93]Mallat S G.A theory for multiresolution signal decomposition:the wavelet representation.IEEE Transactions on Pattern Analysis and Machine Intelligence,1989,7:674-693.
    [94]Mallat S G.Multifrequency channel decomposition of images and wavelet models.IEEE Transactions on Acoustics,Speech,Signal Processing,1989,37(12):2091-2110.
    [95]Hernandez J R,Amado M,Gonzalez F P.DCT domain watermarking techniques for still images:detector performance analysis and a new structure.IEEE Transaction on image Processing,2000,9(1):55-68.
    [96]Pratt W K.Digital Image Processing.New York:Wiley,1978.
    [97]Birney K A,Fisher T R.On the modeling of DCT and subband image data for compressin.IEEE Transaction On Image Processing,1997,4:402-408.
    [98]Reininger R C,Gibson J D.Distribution of the two-dimensional DCT coefficients for images.IEEE Transaction On Communicatins,1983,31(6):835-839.
    [99]M(u|¨)ller F.Distribution shape of two-dimensional DCT coefficients of nature images.Electron.Letter,1993,Vol.29:1935-1936.
    [100]Barni M,Bartolini F,Cappellini V,Piva A.Statistical modeling of full frame DCT coefficients.Proceedings of EUSIPCO'98,Rodos,Greece 1998:1513-1516.
    [101]Lam E Y,Goodman J W.A mathematical analysis of the DCT coefficient distributions for images.IEEE Transactions on Image Processing,2000,9(10):1661-1666.
    [102]Wainwright M J,Simoncelli E P.Scale mixtures of gaussians and the statistics of natural images.Conference on Neural Information Processing Systems(NIPS).Denver,CO.Nov 29-Dec 2,1999:855-861.
    [103]Moulin P,Liu J.Analysis of multiresolution image denoising schemes using a generalized Gaussian and complexity priors,IEEE Trans.Info.Theory,1999,45:909-919.
    [104]Simoncelli E P,Adelson E H.Noise removal via bayesian wavelet coring,In Third International Conference on Image Proc,1996,Vo1.Ⅰ:379-382.
    [105]Simoncelli E P.Modeling the joint statistics of images in the wavelet domain,Proc SPIE,44th Annual Meeting,Denver,CO.,1999,7,Vol.3813:188-195.
    [106]Buccigrossi R W,Simoncelli E P.Image compression via joint statistical characterization in the wavelet domain.IEEE Transaction of Image Processing,1999,8(12):1688-1701.
    [107]Mihcak M K,Kozintsev I,Ramchandran K,Moulin P.Low complexity image denoising based on statistical modeling of wavelet coefficients.IEEE Signal Processing Leter,1999,6(12):300-303.
    [108]Mihcak M K,Kozintsev I,Ramchandran K.Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising,IEEE International Conference on Acoust,Speech and Signal,Phoenix,1999:3253-3256.
    [109]ISO/IEC TCI 10918-1,ITU-T REC.T.81.Information technology digital compression and coding of continuous-time still images:requirements and guidelines,1994.
    [110]JPEG-Jsteg-V4.http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz.
    [111]张涛.图像隐写分析技术研究[D].郑州:解放军信息工程大学,2003.
    [112]Wu Yi.Applied Statistics[M].Chang Sha:Publishing Company of National University of Defence Technology,1995.
    [113]Provos Neil.Dfending against statistical steganalysis.Proc.10th USENIX Security Symposium.Washington,DC,2001:323-335.
    [114]Vapnik V.Statistical learning theory[M].New York:Wiley,1998.
    [115]Vapnik V著,统计学习理论的本质[M].张学工译.北京:清华大学出版社,2000.
    [116]Comes C,Vapnik V.Support vector networks.Machine Learning.1995,20:273-297.
    [117]Scholkopf B,Burges R,and Vapnik V.Extracting support data for a given task.First International Conference on Knowledge Discovery & Data Mining,Menlo Park,1995,AAAI Press.
    [118]Smola A,Scholkopf B.A tutorial on support vector regression,NeuroCOLT Technical Report NC-TR-98-030,Royal Holloway College,University of London,UK,1998.
    [119]Maurer U M.A universal statistical test for random bit generators.Journal of Cryptology,1992,5(2):89-105.
    [120]Tirkel A,Rankin G,Schyndel R V,Ho W,Nee N,Osborne C.Electronic watermark.Proceeding of Digital Image Computing,Technology and Applications,DICTA 1993,DEC/1993:666-672.
    [121]Machado R.Ezstego.http://www.stego.com.
    [122]Cox J,Kilian J,Leighton T,Shamoon T.Secure spread spectrum watermarking for multimedia.IEEE Transaction on Image Processing,1997,6(12):1673-1687.
    [123]Marvel L M,Boncelet C G Jr.,Retter C T.Spread spectrum image steganography.IEEE Transactions on Image Processing,1999,8(8):1075-1083.
    [124]Chandramouli R.A mathematical framework for active steganalysis.Special issue on multimedia watermarking Springer/ACM Multimedia Systems,2003,9(3):303-311.
    [125]Wald A.Sequential Detection.Willey,1947.
    [126]Nikiforov I,Basseville M.Detection of abrupt changes.Printice Hall,1998.
    [127]Trivedi S,Chandramouli R.Secret key estimation in sequential steganography.IEEE Transactions on Signal Processing,2005,53(2):746-757.
    [128]Page E.Continuous inspection schemes.Biometrika,1954.
    [129]Cox J,Kilian J,Leighton T,Shamoon T.Secure spread spectrum watermarking for multimedia.IEEE Transaction On Image Processing,1997 6(12):1673-1687.
    [130]Marvel L M,Boncelet C G Jr,Retter C T.Spread spectrum image steganography.IEEE Transactions on ImageProcessing,1999,8(8):1075-1083.
    [131]张强,马润年,许进.广义高斯分布随机变量的仿真.西安电子科技大学学报(自然抖学版),2001,28(4):549-552.
    [132]Bender W,Gruhl D,Morimoto N,Lu A.Techniques for data hiding.IBM Systems Journal,1996,35(3,4):313-335.
    [133]http://www.rugeley.demon.co.uk/security/ffencode.zip.
    [134]http://www.cast-tcc.com/ispro.
    [135]http://www.darkside.com.au/snow/index.html.
    [136]http://www.fourmilab.ch.
    [137]Westfield A,Pfitzmann A.Attack on steganographic systems.Proceedings of Information Hiding Workshop.LNCS 1768:61-76,Springer-Verlag,1999.
    [138]Fridrich J,Goljan M.Practical steganalysis of digital images state of the art.Security and Watermarking of Multimedia Contents Ⅳ,Proceedings of SPIE[C].2002,4675:1-13.
    [139]Chandramouli Rajarathnam,Kharrazi Mebdi,Memon Nasir.Image steganography and steganalysis:concepts and practice.IWDW 2003,LNCS 2939:35-49,2004.
    [140]梁小萍,何军辉,李健乾,黄继武.隐写分析—原理、现状与展望.中山大学学报,2004,43f6):93-96.
    [141]夏熠,郎荣玲,戴冠中,黄殿中,钱思进.基于图像的信息隐藏分析技术综述.计算机工程,2003,29(7):1-3.
    [141]夏熠,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述.计算机研究与发展,2004,41(4):728-736.
    [142]Johnson N F,Jajodia S.Steganalysis of images created using current steganography software.Proceedings of Information Hiding Workshop.Lecture Notes in Computer Science,Springer-Verlag,Berlin,1998,1525:273-289.
    [143]Fridrich J,Du R,Lomg M.Steganalysis of LSB encoding in color images.Proceedings IEEE International Conference on Multimedia and Expo,July 30-Auguest 2,2000:1279 -1282,New York City,NY.
    [144]Fridrich J,Goljan M,Du R.Reliable dectection of LSB steganography in color and grayscale images.Proceedings of ACM Workshop on Multimedia and Security,Ottawa,Oct.5,2001:27-30.
    [145]Dumitrescu S,Wu X,Wang Z.Detection of LSB steganography via samplepairan alysis.IEEE Transaction on Signal Processing,2003,51(7):1995-2000.
    [146]Lu Peizhong,Luo Xiangyang,Tang Qingyang,Shen Li.An improved sample pairs method for detection of LSB embedding.Lecture Notes in Computer Science,Springer-Verlag,Berlin,2004,3200:116-127.
    [147]Fridrich Jessica,Goljan Miroslav,Soukal David.Higher order statistical steganalysis of palette image.Security and Watermarking of Multimedia Contents V,Proceeding of SPIE-IS&T Electronix Imaging,SPIE Vol.5020:131-142,2003.
    [148]Andrew D K.Quantitative evaluation of pairs and RS steganalysis.Security,Steganography and Watermarking of Multimedia Contents Ⅵ,Proceeding of SPIE-IS&T Electronix Imaging,SPIE Vol.5306:83-97,2004.
    [149]Andrew D K.Improved Detection of LSB Steganography in Grayscale Images.Information Hiding Workshop,Springer LNC5 3200:97-115,2004.
    [150]Zhang T,Ping XJ.Reliable detection of spatial LSB steganography based on diference histogram[J].Journal of Software,2004,Vol.15(1):151-158.
    [151]杨春芳,罗向阳,倪大平,刘粉林.DIH方法的改进及与SPA和RS方法的比较分析.哈尔滨工业大学学报,2006,第38卷增刊.
    [152]Dabeer Onkar,Sullivan Kenneth,Madhow Upamanyu,Chandrasekaran Shivakumar,Manjunath B S.Detection of hiding in the least significant bit.IEEE Transaction On Signal Processing,2004,52(10):3046-3058.
    [153]Li Zhi,Sui Ai Fen,Yang Yi Xian.A LSB steganography detection algorithm.Proceedings of IEEE 2003 International Symposium Personal Indoor and Moble Ratio Communucation.Beijing,2003:2780-2783.
    [154]Yu Xiaoyi,Tan Tieniu,Wang Yuhong.Extended optimization method of LSB steganalysis.IEEE International Conference on Image Processing,Vol.2:1102-1105,Septemberl 1-14,2005,Genoa,Italy.
    [155]Kong Xiangwei,Zhang Ting,You Xingang.A new steganography approach based on both complexity estimate and statistical filter.IEEE Pacific Rim Conference on Multimedia 2002:434-441.
    [156]孔祥维,耿红敏,付海燕,尤新刚.基于位平面失真度的隐秘分析算法.哈尔滨工业大学学报。2006第38卷增刊.
    [157]夏熠,郎荣玲,戴冠中,黄殿中,钱思进.基于数字图像LSB嵌入的检测算法.计算机工程,2004,30(4):10-11..
    [158]张新鹏,王朔中,张开文.基于统计特性的LSB密写分析.应用科学学报,2004,22(1):22(1):16-19.
    [159]翟卫东,吕述望,刘振华.基于广义高斯分布的彩色图像空域隐写检测算法.通信学报,2004,25(2):33-42.
    [160]Provos N.Honeyman P.Detecting steganographic content on the internet.Technical Report CITI 01-1a,University of Michigan.2001.
    [161]Fridrich J,Goljan M,Hogea D.Steganalysis of JPEG images:breaking the F5.Proceeding of Information Hiding Workshop.Lecture Notes in Computer Science,2002,2578:310-323.
    [162]Fridrich J,Goljan M.New methodology for breaking steganographic techniques for JPEGs.In Proceeding of SPIE,Security and Watermarking of Multimedia Contents V:143-155,January 2003.
    [163]Harmsen J J,Pearlman W A.Kernal fisher disriminant for steganlysis of JPEG hiding.In Proceedings of SPIE,Security,Steganography and Watermarking of Multimedia Contents Ⅵ,Vol.5306,2004.
    [164]Fridrich J,Goljan M,Hogea D.Attacking the OutGuess.Proceedings of ACM Workshop on Multimedia and Security,France,December 6,2002:3-6.
    [165]Fridrich J,Goljan M,Du R.Steganalysis based on JPEG compatibility.Proceeding of Multimedia Systems and Applications Ⅳ.SPIE,2002,Vol.4518:275-280.
    [166]Wang Ying,Moulin Pierre.Steganalysis of block-dct image steganography.IEEE Workshop on Statistical Signal Processing,2003:339-342.
    [167]Harmsen J J,Pearlman W A.Steganalysis of additive nosie modelable information hiding.Security and Watermarking of Multimedia Contents Ⅴ,Proceeding of SPIE-IS&T Electronix Imaging,SPIE Vol.5020:21-24,2003.
    [168]Liu Shaohui,Yao Hongxun,Gao Wen.Steganalysis based on wavelet texture analysis and neural network.Proceeding of the 5th Wolrd Congress on Intelligent Control and Automation,Jun 15-19,2004,Hangzhou,P.R.China.
    [169]Liu Shaohui,Yao Hongxun,Gao Wen.Steganalysis of data hiding techniques in wavelet domain[C].International Conference on Information Technology:Coding Computing,ITCC.LasVegas USA,2004(1):751-754.
    [170]刘绍辉,姚鸿勋,高文,姜峰.针对小波域量化隐藏方法的图像监测技术研究.通信学报,2004,25(7):71-77.
    [171]Avcibas I.Steganalysis Uusing image quality metrics.IEEE Transactions on Image Processing.2003,12(2):231-239.
    [172]Avcibas I,Sankur B,Sayood K.Statistical analysis of image quality measures.Jounal of Electronics Image,2002,vol.11:206-223.
    [173]Farid H.Detecting hidden messages using higher-order statistical models.International Conference on Image Processing,Rochester,New York,2002.
    [174]Farid H.,Lyu S.Higher-order wavelet statistics and their application to digital forensics.IEEE Workshop on Statistical Analysis in Computer Vision,2003.
    [175]Lyu S,Farid It.Detecting hidden messages using higher-order statistics and support vector machines.5th International Workshop on Information Hiding,Noordwijkerhout,the Netherlands,2002.
    [176]Lyu Siwei,Farid Hany.Steganalysis Using color Wavelet Statistics and One-Class Support Vector Machines[C].In:SPIE Symposium on Electronic Imaging,San Jose,CA,2004.
    [177]Lie Wen-Nung,Lin Guo-Shiang.A feature-based classification technique for blind image steganalysis.IEEE Transaction on Multimedia,2005,7(6):1007-1020.
    [178]Lin G S,Lie W N.Study on detecting image hiding By feature analysis.Proc.of IEEE International Symposium on Circuits and Systems,ISCAS-2001,Sydney,Australia,2001:149-152.
    [179]Dou Hongchen,Zhang Hongbin,Zhan Shuanghuan.Independent Componet Analysis Applied to Steganalysis.Proceedings of 7th International Conference on Signal Processing,ICSP'04,2004,3:2498-2501.
    [180]Shi YunQ,Xuan Guorong,Yang Chengyun,Gao Jianjiong,Zhang Zhenping,Chai Peiqi,Zou Dekun,Chen Chunhua,Chen Wen.Effective steganalysis based on statistical moments of wavelet characteristic function.Proceeding of the International Conference on Information Technology:Coding and Computing, ITCC'05,April 4-6,2005,Las Vegas,Nevada,USA.
    [181]Shi YunQ,Xuan Guorong,Zou Dekun,Gao Jianjiong,Yang Chengyun,Zhang Zhenping,Chai Peichi,Chen Wen,Chen Chunhua.Image steganalysis based on moments of characteristic function using wavelet decomposition,prediction error image,and neural network.IEEE International Conference on Multimedia and Expo,2005.ICME 2005:4-7.
    [182]钱思进,王凝,王衍波,张凯泽,何德全.基于多分辨率小波分解—BP神经网络德图像隐藏分析技术.哈尔滨工业大学学报,2006,第38卷增刊.
    [183]Chandramouli R.A mathematical framework for active steganalysis.Special issue on multimedia watermarking Springer/ACM Multimedia Systems,2003,9(3):303-311.
    [184]Trivedi S,Chandramouli R.Active steganalysis of sequential steganography.Security and Watermarking of Multimedia Contents V,SPIE conference California,5020(13):123-130,January,2003.
    [185]张利平,张汗灵.一种主动隐写分析算法.哈尔滨工业大学学报,2006,第38卷增刊.
    [186]张卫明,刘九芬,李世取.LSB隐写术的密钥恢复方法.中山大学学报(自然科学版)。2005,44(3):29-33.
    [187]肖和立,张卫明,刘文芬.一种隐密消息的提取方法.计算机工程与应用,2005,41(15):34-37.
    [188]周治平,王永志,纪志成,林家骏.隐写路径搜寻算法研究.哈尔滨工业大学学报,2006,第38卷增刊。
    [189]Cheng Jun,Kot Alex C,Liu Jun,Cao Hong.Steganalysis of binary image.天津大学学报,38(12):1088-1090.
    [190]Cheng Jun,Kot Alex C,Liu Jun,Cao Hong.Steganalysis of data hiding in binary text image.IEEE International Conference on Image Processing,2005,ICIP 2005.3:73-76,11-14 Sept.,2005.
    [191]Jang M,Wu X,Wong E K,Memon N.Steganalysis for boundary based steganorgraphy using autoregressive model of digital boundaries.IEEE Internatinal Conference on Multimedia and Expro,ICME,2004,Vol.2:883-886.
    [192]Yu Xiaoyi,Wang Yunhong,Tan Tieniu.Steganalysis of data hiding in binary images.Proceeding of the 17th International Conference on Pattern Recognition,ICPR'04,2004,Vol.4:877-880.
    [193]Niimi M,Eason R O,Noda H,Kawaguchi E.Intenisty histogram steganalysis in BPCS-steganography.Proceedings of SPIE,Security and Watermarking of Multimedia Contents,Vol.4314:555-564,Electronic Imaging 2001 San Jose, 20-26 January,2001.
    [194]Niimi M,Eason R O,Noda H,Kawaguchi E.An improvement in the security of BPCS Steganography.Proceedings of the Tird International Workshop on Practice and Theory in Public Key Cryptography PKC2000:35-43,2000.
    [195]张新鹏 王朔中.对空域BPCS密写的统计分析.计算机辅助设计与图形学学报,2005,17(7):1625-1629.
    [196]Pierre Moulin.Information-Hiding Games.Workshop on Digital Watermarking,Seoul,Korea,Nov.2002.,Springer-Verlag Lecture Notes in Computer Sciences,Vol.2613,May 2003.
    [197]Pierre Moulin,Joseph A,Sullivan O.Information theoretic analysis of information hiding.IEEE Transaction On Information Theory,2003,49(3):563-593.
    [198]Cox J,Kilian Jeo,Leighton Tom,Shammon Talal.A Secure,imperceptable yet perceptually salient spread spectrum watermark for multimedia.Southcon/96Conf.Record 1996,pp.192-197.
    [199]Turner L F.Digital data security system.Patent IPNWO 89/08915,1989.
    [200]Schynde R F V,Tirkel A Z,Osborne C F.A digital watermarl.IEEE Internatinal Conference on Image Processing,1994,Vol.2:86-90.
    [201]Aura T.Invisiable communication.EET 1995,Technicial Report.Helsinki University of Technology,Finland,Nov.1995.
    [202]Smith Joshua R,Comiskey Barrett O.Modulation and information hiding in images.Information Hiding,First International Workshop,Volume 1174 of Lecture Notes in Computer Science,pp:207-226,Springer-Verlag,Berlin,1996.
    [203]Pitas I.A method for signature casting on digital image.Proceeding of International Conference on Image Processing,1996,Vol.3:207-218.
    [204]Voyatzis G,Pitas I.Chaotic watermarks for embedding in spatial digital image domain.Proceeding of IEEE International Conference on Image Processing,ICIP98 pp:432-436,1998
    [205]Fridrich J,Du R.Secure steganographic methods for palette images.Lecture Notes in Computer Science,1768:47-60,Springer-Verlag,1999.
    [206]Gruhl Daniel,Bender Walter.Information Hiding to Foil the Casual Counterfeiter,Lecture Notes in Computer Science 1768:1-15,Springer-Verlag 1999.
    [207]Bender Walter,Mortimoto N,Gruhl D.Method and apparatus for data hiding in images,1997,US Patent 5689587.
    [208]Chen Tung-Shou,Chang Chin-Chen,Hwang Min-Shiang,A virtual image cryptosystem based upon vector quantization.IEEE Transaction on Image Processing,1998,7(10):1485-1487.
    [209]罗纲,孙星明,刘玉玲.基于噪声检测的文本隐藏信息检测算法研究.湖南大学学报(自然科学版),2005,32(6):181-184.
    [210]Lippman A.Receiver compatible enhanced EDTV system.U.S.Patent No 5010405,1991.
    [211]Liaw M.An effective data hiding method.Proceedings of IPPR conference on Computer vision,graphics,and image processing,1997,Taiwan,pp:146-153.
    [212]Wu D C,Tsai W H.Spatial domain image hiding using image differencing.IEE Proceeding on Vision,Image and Signal Process,2000,147(1):29-37.
    [213]Smith J R,Comiskey B O.Modulation and information hiding in images.Information Hiding,First International Workshop,Volume 1174 of Lecture Notes in Computer Science,pp:207-226,Springer-Verlag,Berlin,1996.
    [214]Provos Neil.Probabilistic Methods for Improving Information Hiding.CITI Technical Report 01-1,January 2001
    [215]Marvel Lisa M,Boncelet Charles G,Retter Charles T.Spread spectrum image steganography.IEEE Transaction on Image Proceeding.1999,8(8):1075-1083.
    [216]Marvel Lisa M.,Bondelet Charles G,Retter Charles T.Reliable blind information hiding for images.Lecture Notes in Computer Science 1525:48-61,Springer-Verlag Berlin Heidelberg,1998.
    [217]Fridrich J,Goljan M,Du R.Digital image steganography using stochastic modulation.Proceedings of SPIE:Security and Watermarking of Multimedia Contents V,2003,5020:191-202.
    [218]Kawaguchi E,Eason R O.Principle and application of BPCS steganography.In Proceedings of SPIE:Multimedia Systems and Applications,1998,3528:464-472.
    [219]Noda H,Spaulding J,Shirazi M N,Kawaguchi E.Application of bit plane decomposition steganography to JPEG 2000 encoded images.IEEE Signal Processing Letters,2002,9:410-413.
    [220]Spaulding J,Noda H,Shilazi M N,Kawaguchi E.BPCS steganography using EZW lossy compressing images.Pattern Recognition Letters,2002,23:1579-1587.
    [221]Hioki H.A data embedding method using BPCS principle with new complexity measures.Pacific Rim on Digital Steganography,2002,pp.738-751.
    [222]Wu D C,Tsai W H.A steganographic method for images by pixel value differencing.Pattern Recognition Letters,2003,24:1613-1626.
    [223]Zhang Xinpeng,Wang Shuozhong.Steganography using multiple base notational system and human vision sensitivity.IEEE Signal Processing Letters,2005, 12(1):67-70.
    [224] Pan H K, Chen Y Y, Tseng Y C. A secure data hiding scheme for two-color images. IEEE Symposium on Computers and Communications, 2000:750-755.
    [225] Tseng Y, Pan H. Secure and invisible data hiding in 2-color images. IEEE Symposium on Computers and Communications, 2000:268-279.
    [226] Wu M, Tang E, Liu B. Data hiding in digital binary images. Proceeding of IEEE International Conference on Multimedia and Expo, Jul 31-Aug 2, 2000,pp.393-396, New York, NY.
    [227] Matsui K, Tanaka K. Video steganography: how to secretly embed signature in a picture. Proceeding of IMA Intellectual 187-206 Property Project, 1994,pp.187-206.
    [228] Westfeld Andreas, Wolf Gritta. Steganography in a Video Conferencing System. Lecture Notes in Computer Science 1525:32-47, Springer-Verlag,Berlin, 1998.
    [229] Pitas Ioannis. A method for vatermark casting on digital images.IEEE Transaction On Circuits and Systems for Video Technology, 1998, 8(6):775-780.
    [230] Chen C C, Chen T S, Chung L T. A steganographic method based upon JPEG and quantization table modification. Information Science, 2002, 141:123-138.
    [231] Westfeld A. F5-a steganographic algorithm. In 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, 2137:289-302,Springer-Verlag,2001.
    [232] Ogihara Takeshi, Nakamura Daisuke, Yokoya Naokazu. Data embedding into pictorial images with less distortion using discrete cosine transform. Proceedings of the 13th International Conference on Pattern Recognition, ICPR96,vol2:675-679, 1996.
    [233] Chen B, Wornell G W. Implementations of quantization index modulation methods for digital watermarking and information embed-ding of multimedia[J].J VLSI Signal Processing Syst Signal, Image, and Video Technol (Special Issue on Multimedia Signal Processing), 27:7-33, 2001.
    [234] Yuan Q, Yao H X, Gao W. Blind watermarking method based on DWT middle frequency pair[A]. Proceedings of IEEE ICME[C]. Lausanne, 2002. 473-476.
    
    [235] 徐迎晖.文本载体信息隐藏技术研究[D].北京:北京邮电大学, 2006.
    
    [236] Brassil J T, Low S, Maxemchuk N F. Copyright protection for the electronic distribution of text documents. Proceedings of IEEE, 1999, 87 (7): 1181- 1196.
    
    [237] Low S H, Maxemchuk N F, Brassil J. Document marking and identification using both line and word shifting. Proceeding of IEEE Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 1995,Vol.2:853-860.
    [238]王炳锡,陈琦,邓峰森等.数字水印技术.西安:西安电子科技大学出版社,2003.
    [239]曹卫兵,戴冠中,夏煜等.基于文本的信息隐藏技术.计算机应用研究,2003,20(10):9-41.
    [240]Kipper Greg.Investigator's Guide to Steganography.U.S.:Auerbach Publications 2004.
    [241]周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究.通信学报,2004,25(12):97-101.
    [242]Bolshakov Igor A.A Method of linguistic steganography based on collocationally verified synonymy.Information Hiding:6th International Workshop,LNCS 3200:180-191,Springer-Verlag 2004.
    [243]WbStego软件,http://www.8ung.at/wbailer/wbstego.
    [244]TextHide软件,http://www.compris.com.
    [245]Eshow软件,http://www.yitax.com.
    [246]Topkara M,Riccardi G,Hakkani-Tur D.Taskiran Edward J.Delp,Natural Language Watermarking.Proceedings of the SPIE International Conference on Security,Steganography,and Watermarking of Multimedia Contents,January 15-19,2006,San Jose,CA.
    [247]张宇,刘挺.自然语言文本水印.中文信息学报,2005,19(1):56-62.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700