期刊文献+

基于Boosting算法融合的图像隐写分析方法 被引量:1

Image Steganalysis Method Based on Boosting Algorithm Fusion
在线阅读 下载PDF
导出
摘要 现有盲检测技术在实际检测中,由于嵌入算法未知导致检测困难。为此,提出一种基于Boosting算法融合的图像隐写分析方法。通过训练分类器建立不同隐写算法下的分类器模型,利用Boosting算法计算各分类器的分类性能,对各分类器的概率输出进行融合,得到最终检测结果。基于典型空间域隐写算法和JPEG隐写算法的实验结果表明,该方法实现了对多种隐写算法的有效检测,应用Boosting算法融合后整体检测性能提升了约2%。 The existing detection algorithms are difficult to obtain high detection accuracy when applied to the condition, in which the embedding algorithm of the stego-images is unknown. 'Therefore, this paper proposes a steganography-unknown image steganalysis method based on Boosting fusion. It obtains various classifying results by establishing steganography algorithm classifier models in the training phase, and acquires the performance of these classifies according to the Boosting algorithm. The final detection result is obtained by combinational rule based on probability output. The detection work is presented to attack the current different spatial domain and JPEG steganographic algorithms. Extensive experimental restdts show that this proposed method is effective for multi-steganographic algorithms, and Boosting takes advantage of the individual strengths from each detection system and whole detection performance is probably increased by 2%.
出处 《计算机工程》 CAS CSCD 2013年第12期148-151,156,共5页 Computer Engineering
基金 国家自然科学基金资助项目(60903221 61272490)
关键词 信息隐藏 数字隐写 隐写分析 BOOSTING算法 分类器融合 支持向量机 information hiding steganography steganalysis Boosting algorithm classifier fusion Support Vector Machine(SVM)
作者简介 万宝吉(1986一),男,硕士研究生,主研方向:信息隐藏技术,信息融合技术; 张涛,副教授、博士; 侯晓丹、硕士研究生 朱振浩,硕士研究生
  • 相关文献

参考文献17

  • 1Petitcolas P,Anderson J,Kuhn G.Information Hiding——A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2Sharp T.An Implementation of Key-based Digital Signal Steganography[C]//Proc.of the 4th Information Hiding Workshop.Berlin,Germany:Springer-Verlag,2001:13-26.
  • 3Wu D,Tsai W.A Steganographic Method for Images by Pixel-value Differencing[J].Pattern Recognition Letters,2003,24(9-10):1613-1626.
  • 4Kawaguchi E,Eason R O.Principle and Applications of BPCS Steganography[J].Multimedia Systems and Applications,1999,3528(1):464-473.
  • 5Cheng Hsing-Yang,Chi Yao-Weng.Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
  • 6Upham D.JPEG-JSteg-V4[EB/OL].(2007-06-01).http://www.funet.fi/pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.
  • 7Westfeld A.F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis[C]//Proc.of the 4th International Workshop on Information Hiding.New York,USA:[s.n.],2001:289-302.
  • 8Sallee P.Model-based Steganography[C]//Proc.of the 2nd International Workshop on Digital Watermarking.New York,USA:Springer-Verlag,2003:154-167.
  • 9Sallee P.Model-based Methods for Steganography and Steg-analysis[J].International Journal of Image and Graphics,2005,5(1):167-189.
  • 10Kovovsky J,Fridrich J,Pevny T.Statistically Undetectable JPEG Steganography:Dead Ends,Challenges,and Opportunities[C]//Proc.of the 9th ACM Multimedia & Security Workshop.Dallas,USA:[s.n.],2007:3-14.

二级参考文献8

  • 1Fridrich J, Goljan M. Reliable Detection of LSB Steganography in Grayscale and Color Images[C]//Proc. of ACM Special Session on Multimedia Security and Watermarking. Ottawa, Canada: ACM Press, 2001.
  • 2Dumitrescu S, Wu Xiaolin, Wang Zhe. Detection of LSB Steganography via Sample Pair Anaiysis[C]//Proc. of the 5th International Workshop on Information Hiding. [S. l.]: Springer-Verlag, 2002.
  • 3Zhang Tao, Ping Xijian. A New Approach to Reliable Detection of LSB Steganography in Natural Images[J]. Signal Processing, 2003, 83(10): 2085-2093.
  • 4Fridrich J, Goljan M. On Estimation of Secret Message Length in LSB Steganography in Spatial Domain[C]//Proc. of EI SPIE'04. San Jose, California, USA: [s. n.], 2004.
  • 5Lu Peizhong, Luo Xiangyang, Tang Qingyang, et al. An Improved Sample Pairs Method for Detection of LSB Embedding[C]// Proceedings of the 6th International Workshop. Toronto, Canada: [s. n.], 2004.
  • 6Andrew D K. Improved Detection of LSB Steganography in Grayscale Images[C]//Proc. of the 6th Information Hiding Workshop. [S. l.]: Springer, 2004.
  • 7Fridrich J, Goljan M. Higher-order Statistical Steganalysis of Palette Images[C]//Proc. of EI SPIE'03. Santa Clara, USA: [s. n.], 2003.
  • 8NRCS Photo Gallery[Z]. (2004-01-01). http://photogallery.nrcs. usda.gov/.

共引文献1

同被引文献16

  • 1Dumitrescu S, Wu X L, Wang Z. Detection ofLSB Steganography via Sample Pair Analysis[ J].IEEE Trans, on Signal Processing, 2003, 51(7): 1995 - 2007.
  • 2Zhihua Xia, Xinhui Wang, Xingming Sun, et al.Steganalysis of least significant bit matching usingmulti-order differences[ J]. Security and Commu-nication Networks, 2014,7(8) : 1283-1291.
  • 3Zhihua Xia, Xinhui Wang, Xingming Sun, et al.Steganalysis of LSB matching using differences be-tween nonadjacent pixels [ C ]. Multimedia Toolsand Applications ,2014.
  • 4Pevny T, Bas P,Fridrich J. Steganalysis by Sub-tractivePixel AdjacencyMatrix [ J ]. IEEE Transac-tions onlnformation Security and Forensics, 2010,5(2): 215-224.
  • 5Fridrich J, Kodovsky J. Rich Models for Steganal-ysis of Digital Images [ J ]. IEEE Transactions onInformation Forensics and Security, 2012,7(3).
  • 6Kodovsky J, Fridrich J, Holub. V. : EnsembleClassifiers for Steganalysis of Digital Media. IEEETrans [ J ]. Information Forensics Security, 2011.
  • 7Kodovsky J, Pevny T, Fridrich J. Modem stega-nalysis can detect YASS[C]. In Proc. SPIE, E-lectronic Imaging, Security Forensics of Multime-diaXII,San Jose, CA, 2010, 7541:201-211.
  • 8Breiman L. Random forest[ J]. Machine Learn-ing, 2001, 45(l);5-32.
  • 9Filler T,Pevny T,Bas P. BOSS ( Break OurSteganography System) 2014 [EB/OL]. Availa-ble : http ://agents, fel. cvut. cz/stegodata/Boss-Base-1. 01 -cover, tar. bz2,2014.
  • 10Sharp T. An Implementation of Key-based DigitalSignal Steganography [ C ] . In Proceedings of the4th International Workshop on Information Hid-ing, London, UK, 2001 : 13-26.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部