首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
针对一类信息伪装算法的隐藏信息检测   总被引:7,自引:1,他引:6  
张涛  平西建 《通信学报》2002,23(5):123-129
本文针对一类基于空域LSB替换的信息伪装方法,提出了一种有效的隐藏信息检测技术。本文提出的隐藏信息的检测技术基于图像LSB比特序列的随机性度量的分析。在唯载密图像攻击条件下,通过在图像中嵌入测试信息的方法,建立秘密信息嵌入比例与LSB比特序列随机性度量的逻辑回归模型,从而实现图像中隐藏信息存在性的检测。实验表明对于灰度图像中即使0.4比特每像素的隐藏容量,仍可能获得较高的检测可靠性。这一方法同样适用于真彩图像。  相似文献   

2.
高明 《电子科技》2007,(4):83-86
Fridrich提出的RS掩密分析方法,适合于检测采用随机嵌入的LSB掩密算法,不但可以检测信息的存在,还可以检测出嵌入信息的长度。文中对现有的空域LSB掩密算法加以改进,使改进后的算法可以抵抗RS攻击,从而进一步提高了LSB掩密算法的安全性。  相似文献   

3.
一种基于LSB的易碎性数字盲水印算法   总被引:2,自引:1,他引:1  
提出了一种基于LSB的易碎性数字盲水印算法.水印由m序列确定的嵌入像素LSB清零后的原始图像CRC-32值、有意义的二值图像及其CRC-32值组成,嵌入到由m序列确定的像素LSB中,有效地解决了信息隐藏、盲水印提取和篡改检测等关键问题.试验结果表明,该算法能够满足数字档案资料版权保护和篡改鉴真的要求,具有实用价值.  相似文献   

4.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

5.
徐治 《电子科技》2015,28(8):84
将需要保密的信息隐藏到数字音频信号或文件中可达到伪装的效果,是实现信息安全或保密通信的重要手段。文中设计了一种基于频谱特征的频域嵌入信息隐藏算法。介绍了该算法的基本处理流程,频域信息嵌入和提取的具体方法,并给出了对算法透明性、信息容量、鲁棒性的测试结果。文中算法可实现盲检测,实验表明其具有较好的透明性,对多种攻击的鲁棒性较好,并可实现一定码率下的无差错传输。  相似文献   

6.
冯雪峰 《信息技术》2006,30(1):30-32
首先分析了BMP图像文件格式,然后根据传统LSB算法在BMP图像文件中应用,提出一种改进的LSB隐藏算法,提高了伪装图像质量。最后通过仿真验证了该算法的优越性。  相似文献   

7.
薛龙  吴柯  徐民  李丹 《电子技术》2012,(5):13-15
为了分析空间域、变换域图像信息隐藏算法的抗攻击特性,文章对基于DWT、DCT、LSB信息隐藏算法的抗攻击性进行比较研究,在嵌入容量相同的情况下,分别用压缩攻击、裁减攻击、旋转攻击、缩放攻击对基于LSB、DCT、DWT的三种具体算法进行实验。所选取的DCT算法在攻击参数变化时,归一化相关系数的波动性较小。  相似文献   

8.
提出了一种隐藏二值图像的方法,它利用游程编码技术实现对二值图像的无损压缩来减少对掩护载体的像素修改。实验结果表明,相对于传统的LSB隐藏方法,本算法在一定程度上能抵抗RS检测攻击,其载密图像在视觉上更不容易被察觉,秘密信息的安全性得到了增强。  相似文献   

9.
一种基于混沌的信息高位隐藏新方法   总被引:4,自引:0,他引:4       下载免费PDF全文
于晓洋  徐贵森  张健  董秋玲 《电子器件》2007,30(5):1677-1680
在空域图像信息隐藏算法中,LSB算法虽嵌入容量大,但隐藏位置不可靠,鲁棒性差.针对信息隐藏的鲁棒性和安全性问题提出了一种空域信息隐藏新算法HSBH,该算法通过区间设定来提高算法的鲁棒性;通过混沌定位来增强信息隐藏的安全性.实验结果表明,本算法在伪装图像上叠加4×rand(256,256)的随机噪声后,仍可以提取出完整的秘密信息.  相似文献   

10.
论文分别从空间域、变换域分析了常用的图像信息隐藏和检测技术,研究了一种可对DFT域、DCT域和DWT域图像信息隐藏实现通用盲检测的、基于频率域差分直方图能量分布分析的检测方法,设计了互联网内容监管网关中的图像信息隐藏检测模块,并通过功能性实验证明了其有效性。  相似文献   

11.
Data hiding in multiple images has been a significant research direction in information security. How to reasonably design the embedding strategy to spread the payload among multiple images is still an open issue. In this paper, we propose an embedding strategy on fusing multiple features. We utilize the typical characteristic parameters of gray level co-occurrence matrix, the image entropy and the shape parameter to describe image complexity. Furthermore, we combine with the number of cover images, the number of cover images assigned to steganographer and the size of cover image to estimate the steganographic capacity of each image. The strategy is implemented together with some state-of-the-art single image steganographic algorithms. Experimental results demonstrate that the security performance of the proposed strategy is higher than that of the state-of-the-art embedding strategy against the blind universal pooled steganalysis.  相似文献   

12.
Steganalysis using image quality metrics   总被引:32,自引:0,他引:32  
We present techniques for steganalysis of images that have been potentially subjected to steganographic algorithms, both within the passive warden and active warden frameworks. Our hypothesis is that steganographic schemes leave statistical evidence that can be exploited for detection with the aid of image quality features and multivariate regression analysis. To this effect image quality metrics have been identified based on the analysis of variance (ANOVA) technique as feature sets to distinguish between cover-images and stego-images. The classifier between cover and stego-images is built using multivariate regression on the selected quality metrics and is trained based on an estimate of the original image. Simulation results with the chosen feature set and well-known watermarking and steganographic techniques indicate that our approach is able with reasonable accuracy to distinguish between cover and stego images.  相似文献   

13.
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit embedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding.  相似文献   

14.
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability distribution as the covertext. Then no statistical test can reliably detect the presence of the hidden message. We refer to such steganographic schemes as perfectly secure. A few such schemes have been proposed in recent literature, but they have vanishing rate. We prove that communication performance can potentially be vastly improved; specifically, our basic setup assumes independent and identically distributed (i.i.d.) covertext, and we construct perfectly secure steganographic codes from public watermarking codes using binning methods and randomized permutations of the code. The permutation is a secret key shared between encoder and decoder. We derive (positive) capacity and random-coding exponents for perfectly secure steganographic systems. The error exponents provide estimates of the code length required to achieve a target low error probability. In some applications, steganographic communication may be disrupted by an active warden, modeled here by a compound discrete memoryless channel (DMC). The transmitter and warden are subject to distortion constraints. We address the potential loss in communication performance due to the perfect-security requirement. This loss is the same as the loss obtained under a weaker order-1 steganographic requirement that would just require matching of first-order marginals of the covertext and stegotext distributions. Furthermore, no loss occurs if the covertext distribution is uniform and the distortion metric is cyclically symmetric; steganographic capacity is then achieved by randomized linear codes. Our framework may also be useful for developing computationally secure steganographic systems that have near-optimal communication performance.  相似文献   

15.
在H.264/AVC视频编码标准框架下,提出一种基于H.264宏块内码率控制的视频隐写算法,根据CSF函数对DCT变换频率进行分类,判别DCT变换块的不敏感频率,并对DCT块进行分类,最后通过秘密信息比特位指导DCT块不敏感频率系数的舍弃和选取。实验中进行了隐写容量测试、信噪比损失测试和视频压缩码流大小测试。实验表明,该算法在损失信噪比较小的情况下能嵌入较多的信息,并能保持原视频编码器的压缩特性。  相似文献   

16.
提出了一种新的基于图遍历的自适应调色板图像 密写方案。将调色板中各颜色视 为图节点,利用颜色间的亮度差和欧氏距离,构建颜色图。应用图的遍历为颜色节点,分配 秘密比特。嵌入秘密信息的过程中,利用相邻像素颜色间的相关性,建立自适应嵌入准则。 对比实验结果表明,提出的密写方案具有较大的嵌入容量,并保持很好的图像质量,与其他 的密写方案相比,提出的方案更能抵抗直方图特征函数(HCF)统计分析。  相似文献   

17.
In this paper sound steganographic system receiver structure with signal spectrum broadening is proposed and researched. This receiver consists of rehabilitate filter with adaptive coefficients and correlation receiver. Steganographic system algorithms with blind coder and decoder procedure are researched. It is shown that the rehabilitate filter with adaptive coefficients application provides essential increase in probability of correct binary detection of off-stage information or allows adding 30 times more bits of built-in data.  相似文献   

18.
We develop adaptive schemes for bidirectional modeling of unknown discrete stationary sources. These algorithms can be applied to statistical inference problems such as noncausal universal discrete denoising that exploit bidirectional dependencies. Efficient algorithms for constructing those models are developed and we compare their performance to that of the DUDE algorithm for universal discrete denoising  相似文献   

19.
谷波  刘琚  许宏吉 《通信学报》2006,27(12):127-131
通过在不同天线发射的信号之间引入时域和空域信息,正交空时分组编码(OSTBC)可以获得发射分集增益,而且可以在不牺牲带宽的情况下获得更高的编码增益。但是其译码却需要精确的信道状态信息(CSI),因此,信道信息估计的准确性严重影响系统的性能。基于独立分量分析(ICA)的盲源分离(BSS)技术可以在不进行信道估计的情况下对发射信号实现有效检测。通过利用OSTBC的正交特性,提出了2种基于ICA的盲检测方案,同时,一些基于信道估计的检测算法也被用来进行性能比较。瑞利衰落信道下的仿真结果表明,2种新方案均具有较好的系统适应性和误码率性能。  相似文献   

20.
基于改进增强特征选择算法的特征融合图像隐写分析   总被引:2,自引:2,他引:0  
针对现有的基于特征融合的JPEG隐写分析方法特征冗余度高、通用性较低的问题,提出了一种基于改进的增强特征选择(BFS,boosting feature selection)算法的通用JPEG隐写分析方法。从线性相关度和非线性相关度两方面降低特征冗余,将特征自相关系数和互信息这两种统计性能引入到特征的评价准则中,重新设计了特征权重计算方法,改进了BFS算法的特征评价函数。通过改进的BFS特征选择算法将3组互补性较强且准确率高的特征进行融合降维,得到最优特征子集训练分类器。对3种高隐蔽性隐写算法F5、Outguess和MME3,在不同嵌入率下进行了大量实验。结果表明,本文方法的分析准确率高于现有的检测率较高的JPEG隐写分析方法和典型的融合分析方法,融合后的特征相关性明显下降,并且具有更强的通用性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号