浏览全部资源
扫码关注微信
1. 解放军信息工程大学 导航与空天目标工程学院,河南 郑州 450001
2. 解放军信息工程大学 网络空间安全学院,河南 郑州 450001
3. 数学工程与先进计算国家重点实验室,河南 郑州 450001
4. 中国科学院 信息工程研究所 信息安全国家重点实验室,北京 100093
[ "卢记仓(1985-),男,河北大名人,解放军信息工程大学讲师,主要研究方向为信息隐藏与检测。" ]
[ "刘粉林(1964-),男,江苏溧阳人,解放军信息工程大学教授、博士生导师,主要研究方向为网络信息安全、信息隐藏与检测。" ]
[ "罗向阳(1978-),男,湖北荆门人,解放军信息工程大学副教授、博士生导师,主要研究方向为网络信息安全、信息隐藏与检测。" ]
[ "张轶(1987-),男,河南漯河人,解放军信息工程大学博士生,主要研究方向为信息隐藏与检测。" ]
网络出版日期:2015-03,
纸质出版日期:2015-03-25
移动端阅览
卢记仓, 刘粉林, 罗向阳, 等. 基于辨识性统计特征的PQ隐密图像识别算法[J]. 通信学报, 2015,36(3):139-148.
Ji-cang LU, Fen-lin LIU, Xiang-yang LUO, et al. Recognition of PQ stego images based on identifiable statistical feature[J]. Journal of communications, 2015, 36(3): 139-148.
卢记仓, 刘粉林, 罗向阳, 等. 基于辨识性统计特征的PQ隐密图像识别算法[J]. 通信学报, 2015,36(3):139-148. DOI: 10.11959/j.issn.1000-436x.2015068.
Ji-cang LU, Fen-lin LIU, Xiang-yang LUO, et al. Recognition of PQ stego images based on identifiable statistical feature[J]. Journal of communications, 2015, 36(3): 139-148. DOI: 10.11959/j.issn.1000-436x.2015068.
提出一种基于辨识性统计特征的PQ(perturbed quantization)隐密图像识别算法。该算法根据经典PQ隐写对图像数据的更改方式,提取可有效区分该类隐密图像与其他类隐密图像的辨识性统计特征,并运用SVM(support vector machines)分类器进行分类识别。实验结果表明,本算法能够可靠地将PQ隐密图像从5类典型JPEG隐写PQ、F5、nsF5、MB1和MOD的隐密图像中识别出来;即使F5、nsF5、MB1和MOD的隐密图像不参与分类器的训练,本算法仍能有效识别PQ隐密图像。
A PQ (perturbed quantization) stego images recognition algorithm is proposed based on identifiable statistical feature. According to the specific changing ways of PQ steganography to image data
the proposed algorithm extracts the identifiable statistical feature that can distinguish PQ stego images from other types of stego images. Then
the SVM (support vector machines) classifier is trained to recognize PQ stego images. Experimental results show that
the proposed algorithm can reliably recognize PQ stego images from multi-class stego images generated by five types of well-known JPEG steganography (PQ、F5ns、F5、MB1 and MOD). Even though the stego images generated by F5、nsF5、MB1 and MOD are not used for training classifier
the proposed algorithm can still effectively recognize PQ stego images.
沈昌祥 , 张焕国 , 冯登国 等 . 信息安全综述 [J ] . 中国科学E辑:信息科学 , 2007 , 37 ( 2 ): 129 - 150 .
SHEN C X , ZHANG H G , FENG D G , et al . Survey of information security [J ] . Science in China Series: E , 2007 , 37 ( 2 ): 129 - 150 .
王朔中 , 张新鹏 , 张卫明 . 以数字图像为载体的隐写分析研究进展 [J ] . 计算机学报 , 2009 , 32 ( 7 ): 1247 - 1263 .
WANG S Z , ZHANG X P , ZHANG W M . Recent advances in im-age-based steganalysis research [J ] . Chinese Journal of Computers , 2009 , 32 ( 7 ): 1247 - 1263 .
KER A D , BAS P , BÖHME R , et al . Moving steganography and stega-nalysis from the laboratory into the real world [A ] . Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security [C ] . Montpellier, France , 2013 . 45 - 58 .
PEVNÝ T , FRIDRICH J . Towards multi-class blind steganalyzer for JPEG images [A ] . Proceedings of the 4th International Workshop on Digital Watermarking [C ] . Siena, Italy , 2005 . 39 - 53 .
PEVNÝ T , FRIDRICH J . Multiclass detector of current steg-anographic methods for JPEG format [J ] . IEEE Transactions on Information Forensics and Security , 2008 , 3 ( 4 ): 635 - 650 .
WANG P , LIU F L , WANG G D , et al . Multi-class steganalysis for JPEG stego algorithms [A ] . Proceedings of the 15th IEEE International Conference on Image Processing [C ] . San Diego, CA , 2008 . 2076 - 2079 .
DONG J , WANG W , TAN T N . Multi-class blind steganalysis based on image run-length analysis [A ] . Proceedings of the 8th International Workshop on Digital Watermarking [C ] . Guildford, UK , 2009 . 199 - 210 .
LUO X Y , WANG D S , WANG P , et al . A review on blind detection for image steganography [J ] . Signal Processing , 2008 , 88 ( 9 ): 2138 - 2157 .
KODOVSKÝ J , FRIDRICH J . Rich models for steganalysis of digital images [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 3 ): 868 - 882 .
罗向阳 , 刘粉林 , 杨春芳 等 . 基于最优小波包分解的图像隐写通用检测 [J ] . 中国科学:信息科学 , 2010 , 40 ( 2 ): 327 - 339 .
LUO X Y , LIU F L , YANG C F , et al . Universal steganalysis based on best wavelet packet decomposition [J ] . Science in China Series F: In-formation Sciences , 2010 , 40 ( 2 ): 327 - 339 .
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography with wet paper codes [A ] . Proceedings of the 2004 ACM Workshop on Multimedia and Security [C ] . Magdeburg, Germany , 2004 . 4 - 15 .
GUL G , KURUGOLLU F . SVD-based universal spatial domain image steganalysis [J ] . IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 2 ): 349 - 353 .
PEVNÝ T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix [J ] IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 2 ): 215 - 224 .
FRIDRICH J , PEVNÝ T , KODOVSKÝ J . Statistically undetectable JPEG steganography: dead ends challenges, and opportunities [A ] . Proceedings of the 9th ACM Workshop on Multimedia and Security [C ] . 2007 . 3 - 14 .
ZHANG Y , LIU F L , LUO X Y , et al . Steganalysis of PQ based on the histogram difference between coefficient adjacent positions [A ] . Proceedings of the 4th International Conference on Multimedia Information Networking and Security [C ] . Nanjing, China , 2012 . 955 - 958 .
WESTFELD A . F5—A steganographic algorithm—high capacity despite better steganalysis [A ] . Proceedings of the 4th International Workshop on Information Hiding [C ] . Pittsburgh, PA, USA , 2001 . 289 - 302 .
SALLEE P . Model-based steganography [A ] . Proceedings of the 2nd International Workshop on Digital Watermarking [C ] . Seoul, Korea , 2003 . 154 - 167 .
FILLER T , FRIDRICH J . Design of adaptive steganographic schemes for digital images [A ] . Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII [C ] . 2011 . 1 - 14 .
LUO X Y , LIU F L , LIAN S G , et al . On the typical statistic features for image blind steganalysis [J ] . IEEE Journal on Selected Areas in Communications , 2011 , 29 ( 7 ): 1404 - 1422 .
陈铭 , 张茹 , 刘凡凡 等 . 基于区域相关性的 LSB 匹配隐写分析 [J ] . 通信学报 , 2010 , 31 ( 3 ): 1 - 11 .
CHEN M , ZHANG R , LIU F F , et al Steganalysis of LSB matching based on regional correlation [J ] . Journal on Communications , 2010 , 31 ( 3 ): 1 - 11 .
MALIK H , SUBBALAKSHMI K P , CHANDRAMOULI R . Non-parametric steganalysis of QIM steganography using approximate entropy [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 418 - 431 .
SALLEE P . Model-based methods for steganography and steganalysis [J ] . International Journal of Image Graphics , 2005 , 5 ( 1 ): 167 - 190 .
CHANG C C , LIN C J . LIBSVM: a library for support vector machines [J ] . ACM Transactions on Intelligent Systems and Technology , 2011 , 2 ( 3 ): 1 - 27 .
0
浏览量
530
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构