共查询到18条相似文献,搜索用时 125 毫秒
1.
提出了一种基于数字图像的新的隐写信道模型.在该模型中,考虑隐写分析器的作用和载体与隐秘体的相似性,引入错误概率和检测率作为失真约束条件.运用博弈论,把隐写过程看成编解码方与攻击方的博弈,给出了隐写博弈的双方在不同失真约束条件下的隐写容量,并对容量结果进行了分析. 相似文献
2.
数字隐写和隐写分析是信息隐藏技术的重要分支。JPEG图像是隐写术最常见的载体,因而研究以JPEG图像为载体的隐写和隐写分析具有重要意义。剖析了JPEG文件结构,提出了基于JPEG格式的隐写方案;并针对该方案提出了相应的隐写分析方案;然后通过大量统计,建立了两个数据库,并最终构建了一个准实时隐藏信息提取系统。该系统从5万幅互联网上的JPEG图像提出了信息,并有效攻击了11种互联网上的隐写软件。 相似文献
3.
音频隐写是将秘密信息隐藏到音频载体中,已成为信息隐藏领域的一个研究热点。已有研究大多聚焦最小化隐写失真,却以牺牲隐写容量为代价,且往往被一些常规信号攻击后难以正确提取秘密信息。为此,基于扩频技术,首先,分析了隐写参数(分段隐写强度和分段隐写容量)与不可感知性和鲁棒性的关系,并构建了一种以分段隐写强度、分段隐写容量为自变量,以不可感知性和隐写容量为优化目标,以信噪比为约束条件的音频隐写多目标优化模型;然后,提出了一种基于差分进化的鲁棒音频隐写算法,设计了相应的编码、适应度函数、交叉和变异算子。对比实验结果表明,所提隐写算法能够在保证不可感知性和抗隐写分析能力的前提下达到更好的鲁棒性,可以有效抵御一些常规信号处理攻击。 相似文献
4.
本研究对常用的最低有效位(LSB)隐写技术进行了隐写分析。在目前的网络环境中,检测低嵌入率语音隐写信号仍然是一个非常有挑战性的课题。近年来,神经网络模型在许多课题中都取得了显著的性能。神经网络的主流架构包括卷积神经网络(Convolution neural Networks, CNNs)和循环神经网络(Recurrent neural Networks, RNNs),这两种网络采用了不同的方式来理解各种信号。本文提出了一种合适的方法来结合这两种架构的优点,然后构造了一个新的模型,即CNN-LSTM网络来检测基于LSB的隐写方法。在本文提出的模型中,使用双向长短时记忆循环神经网络(BiLSTM)来捕获信号的长时间上下文信息,然后使用CNN捕获局部特征和全局特征。实验结果表明,该模型相较对比方法对于基于LSB的隐写分析达到了更好的效果。 相似文献
5.
图像隐写分析中游程检验算法的研究与应用 总被引:2,自引:0,他引:2
随着隐写术在因特网中的广泛应用,隐写分析已经成为学术界研究的热点之一。本文在深入研究BMP图像LSB隐写算法的基础上,在图像隐写分析中提出了游程检验算法并给出了算法原理和工程实现。该算法基于盲检测、不需要训练图像数据库、在满足一定的假设条件下,检测性能优良、算法简单、易于实现,具有一定的实用价值。 相似文献
6.
基于图像特征的隐写术载体图像的选择 总被引:4,自引:4,他引:0
隐写术不同于其它信息隐藏技术,信息嵌入者可以自由选择载体图像,而选择合适的载体图像有助于提高隐写术系统的不可感知性。本文通过分析载体图像的方差、复杂度、熵、直方图及其函数等图像特征和隐写术系统中的相对熵、直方度改变量等隐写术系统的性能参数之间的关系,探究图像特征是否会影响或者决定隐写术系统的性能,为隐写术载体图像选择方案提供依据。实验证明,选择合适的载体图像是提高隐写术系统不可感知性较有效的途径;在使用类LSB嵌入算法的隐写术系统中,色调、信息和纹理丰富的图像不一定是合适的载体图像,而直方图曲线变化缓慢的图像是较理想的载体图像;使用同样嵌入算法,选择合适载体图像的隐写术系统的相对熵比选择不合适载体图像低6×104多倍。 相似文献
7.
8.
9.
图像隐写分析的目的是检测图像中隐藏信息的存在性.JPEG图像的广泛使用使其成为一种重要的隐写载体,因而针对JPEG图像的隐写分析受到研究者们的广泛关注.本文基于彩色图像YCbCr颜色空间DCT系数的统计分布模型,提出一种彩色JPEG图像的隐写分析算法.通过计算载体图像和掩密图像DCT系数统计分布之间的鉴别信息,评估常见DCT域隐写术对载体图像DCT系数统计分布的改变.以统计分布模型参数为特征向量,采用支持向量机实现对载体图像和掩密图像的有效分类.实验结果表明,本文算法具有较高的检测率,性能优于使用Faxid所提出的彩色QMF统计量的隐写分析算法. 相似文献
10.
介绍了基于数字图像隐写容量分析的最新研究成果,重点介绍了安全性限制下针对不同的隐写信道模型的隐写容量的分析和在选择给定的载体方法和失真约束条件下对一个具体图像的隐写容量计算.最后对已有的容量分析结果进行了分类,并给出了下一步研究的方向. 相似文献
11.
12.
Transcoding steganography (TranSteg) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. It offers high steganographic bandwidth, retains good voice quality, and is generally harder to detect than other existing VoIP steganographic methods. In TranSteg, after the steganogram reaches the receiver, the hidden information is extracted, and the speech data is practically restored to what was originally sent. This is a huge advantage compared with other existing VoIP steganographic methods, where the hidden data can be extracted and removed, but the original data cannot be restored because it was previously erased due to a hidden data insertion process. In this paper, we address the issue of steganalysis of TranSteg. Various TranSteg scenarios and possibilities of warden(s) localization are analyzed with regards to the TranSteg detection. A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding. The proposed method allowed for efficient detection of some codec pairs (e.g., G.711/G.729), while some others remained more resistant to detection (e.g., iLBC/AMR). 相似文献
13.
The security of steganographic system is significant in this research field. The security defined by relative entropy is widely cited to measure the security of different steganographic systems. However, two examples are presented to show that some limitations exist in Cachin’s definition. Based on the analysis of a basal hypothesis testing problem, a very useful conclusion can be drawn to define the security of steganographic system. According to the above illation, an amendatory definition is presented based on the probability of the empirical probability distribution. With the help of new definition, the relationship between security and capacity can be interpreted clearly, and truly secure steganographic method could be designed. 相似文献
14.
15.
基于图像复杂度的隐写算法 总被引:2,自引:2,他引:0
提出了一种新的基于图像复杂度的隐写算法。该算法充分利用了复杂度高的图像,包含更多的信息,因而能承载更多秘密信息的特点,将图像划分为3×3的图像块,借助图像块的信息熵和对比度描述图像块的复杂度,根据各块复杂度统计值确定阈值,以判定各块复杂度高低,并针对不同复杂度的图像块进行不同强度的嵌入,实现了基于图像复杂度的隐写算法。性能分析与实验对比表明,在相同的嵌入率下,该算法具有较高峰值信噪比和较强的统计安全性。 相似文献
16.
VoIP (voice over IP) is a kind of voice communication technology based on UDP/IP protocols. Packet loss will inevitably happen when the channel environment deteriorates, which can pose challenges to the reliable transmission of VoIP steganography. A steganographic model based on joint encoding was proposed. In this model, packet erasure coding was introduced to preprocess the secret data. And the encoded data were embedded into voice packets with minimum dis-tortion using matrix embedding. Furthermore, the influences of key parameters on the performance of joint coding were studied. The selection algorithm for optimal parameters was also given. Experimental results show that the proposed joint coding can effectively improve steganographic resistance to packet loss, and decrease the number of modifications to the voice stream. 相似文献
17.
Bin Chen Guorui Feng Xinpeng Zhang Fengyong Li 《Signal, Image and Video Processing》2014,8(8):1475-1482
This paper proposes a JPEG steganalysis scheme based on the ensemble classifier and high-dimensional feature space. We first combine three current feature sets and remove the unimportant features according to the correlation between different features parts so as to form a new feature space used for steganalysis. This way, the dependencies among cover and steganographic images can be still represented by the features with a reduced dimensionality. Furthermore, we design a proportion mechanism to manage the feature selection in two subspaces for each base learner of the ensemble classifier. Experimental results show that the proposed scheme can effectively defeat the MB and nsF5 steganographic methods and its performance is better than that of existing steganalysis approaches. 相似文献