浏览全部资源
扫码关注微信
1. 中国科学技术大学信息科学技术学院,安徽 合肥 230001
2. 中国科学院电磁空间信息重点实验室,安徽 合肥 230001
[ "孙曦(1994-),男,安徽阜阳人,中国科学技术大学硕士生,主要研究方向为信息隐藏、计算机视觉等。" ]
[ "张卫明(1976-),男,河北保定人,中国科学技术大学教授,主要研究方向为信息隐藏、数字内容安全。" ]
[ "俞能海(1964-),男,安徽无为人,中国科学技术大学教授,主要研究方向为多媒体数据处理与分析、数字内容安全。" ]
[ "魏尧(1992-),男,陕西宝鸡人,中国科学技术大学硕士生,主要研究方向为网络安全、信息隐藏等。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
孙曦, 张卫明, 俞能海, 等. 基于空域图像变换参数扰动的隐写术[J]. 通信学报, 2017,38(10):166-174.
Xi SUN, Wei-ming ZHANG, Neng-hai YU, et al. Steganography based on parameters’ disturbance of spatial image transform[J]. Journal on communications, 2017, 38(10): 166-174.
孙曦, 张卫明, 俞能海, 等. 基于空域图像变换参数扰动的隐写术[J]. 通信学报, 2017,38(10):166-174. DOI: 10.11959/j.issn.1000-436x.2017155.
Xi SUN, Wei-ming ZHANG, Neng-hai YU, et al. Steganography based on parameters’ disturbance of spatial image transform[J]. Journal on communications, 2017, 38(10): 166-174. DOI: 10.11959/j.issn.1000-436x.2017155.
在经典图像隐写算法研究中,使用的载体图像库多为实验室环境下的自然图像库,而在现实环境下,随着各种图像处理软件的流行,用户也越来越多地使用经图像处理后的图片。然而,如何利用图像处理来更好地指导隐写还未被系统地研究过。对此,以空域图像变换为例,提出参数扰动模型,将隐写带来的图像噪声隐藏在因参数微扰而带来的图像像素波动中,主动引入了图像集的失配因素。实验结果表明,在相同的隐写算法下,相较于直接使用原始图像库,隐写分析者在应对参数扰动的情况下的检错率有明显提高,从而显著增强了隐写算法的安全性,也使隐写算法更适用于现实环境。
In the research of state-of-the-art steganography algorithms
most of image sources were natural images in laboratory environment.However
with the rapid development of image process tools and applications
images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration
a parameters’ disturbance model was presented
which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile
it would introduce cover source mismatch for a steganalyzer.The experimental results show that
compared with using traditional image database
it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.
FRIDRICH J . Steganography in digital media:principles,algorithms,and applications [M ] // Steganography in Digital Media : Principles,Algorithms,and applications.Cambridge University Press , 2010 : 1 - 20 .
CRANDALL R . Some notes on steganography [J ] . Posted on SteganoGraphy Mailing List , 1998 .
PEVNÝ T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix [J ] . IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 2 ): 215 - 224 .
FRIDRICH J , KODOVSKÝ J . Rich models for steganalysis of digital images [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 3 ): 868 - 882 .
SHI Y Q , SUTTHIWAN P , CHEN L . Textural features for steganalysis [C ] // Information Hiding . 2012 : 63 - 77 .
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 920 - 935 .
PEVNÝ T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography [C ] // Information Hiding.Springer Berlin Heidelberg . 2010 : 161 - 177 .
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters [C ] // IEEE International Workshop on Information . 2013 : 234 - 239 .
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion [C ] // The First ACM Workshop on Information Hiding and Multimedia Security . 2013 : 59 - 68 .
LI B , WANG M , LI X , et al . A strategy of clustering modification directions in spatial image steganography [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1905 - 1917 .
DENEMARK T , FRIDRICH J . Improving steganographic security by synchronizing the selection channel [C ] // The 3rd ACM Workshop on Information Hiding and Multimedia Security . 2015 : 5 - 14 .
GUO L , NI J , SHI Y Q . Uniform embedding for efficient JPEG steganography [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 5 ): 814 - 825 .
BAS P , FILLER T , v T . Break our steganographic system:the Ins and outs of organizing BOSS [M ] // Information Hiding . 2011 : 59 - 70 .
FRIDRICH J . Study of cover source mismatch in steganalysis and ways to mitigate its impact [J ] . SPIE-International Society for Optical Engineering , 2014 , 9028 ( 2 ): 96 - 101 .
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 221 - 234 .
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images [J ] . IEEE Transactions on Information Forensics & Security , 2012 , 7 ( 3 ): 868 - 882 .
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media [J ] . IEEE Transactions on Information Forensics & Security , 2012 , 7 ( 2 ): 432 - 444 .
SEDIGHI V , FRIDRICH J , COGRANNE R . Toss that BOSSbase,Alice! [J ] . Electronic Imaging , 2016 .
PEVNÝ T KER A D . Towards dependable steganalysis [J ] . SPIE-International Society for Optical Engineering , 2015 ,9409:94090I-94090I-14
0
浏览量
1196
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构