首页 | 本学科首页   官方微博 | 高级检索  
     

对空域图像LSB隐写术的提取攻击
引用本文:张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631.
作者姓名:张卫明  李世取  刘九芬
作者单位:信息工程大学信息研究系 郑州450002上海大学通信与信息工程学院上海200072(张卫明),信息工程大学信息研究系 郑州450002(李世取,刘九芬)
摘    要:隐写分析的研究一直集中于检测隐藏信息的存在性,而关于如何提取隐藏信息(即对隐写术的提取攻击)的研究还非常少.对于使用密钥的隐写术,提取攻击等价于恢复隐写密钥.文中结合隐写分析中的检测技术和密码分析中的相关攻击技术,对空域图像LSB隐写术提出了一种隐写密钥恢复方法.理论分析说明:此攻击方法的计算复杂度主要由所需的样本量决定,并且当嵌入率r接近0或1时攻击将失败.作者通过混合高斯模型给出了一个估计最小样本量的方法.针对隐写软件"Hide and Seek 4.1"的实验表明:此攻击方法可以成功恢复隐写密钥,从而提取隐藏的消息.如果消息长度L未知,当嵌入率5.3%<r<94.7%时攻击可以成功;如果L已知,当1.1%<r<98.4%时攻击可以成功,并且当11%<r<50%时,使用估计的最小样本量可以将攻击速度提高10%~45%.

关 键 词:隐写术  隐写分析  提取攻击  相关攻击  混合分布  空域  图像  隐写术  提取攻击  Spatial  Domain  Steganography  速度提高  长度  实验  Hide  隐写软件  攻击方法  最小  估计  高斯模型  混合  失败  嵌入率  样本量  计算复杂度
修稿时间:2004-05-17

Extracting Attack to LSB Steganography in Spatial Domain
ZHANG Wei-Ming,LI Shi-Qu,LIU Jiu-Fen.Extracting Attack to LSB Steganography in Spatial Domain[J].Chinese Journal of Computers,2007,30(9):1625-1631.
Authors:ZHANG Wei-Ming  LI Shi-Qu  LIU Jiu-Fen
Affiliation:1.Department of Information Research,Information Engineering Institute,Zhengzhou 450002;2.School of Communication and Information Engineering,Shanghai University,Shanghai 200072
Abstract:Many steganalysis techniques have been developed to detect the existence of hidden information. However, there are few approaches about how to extract the hidden information, i.e., extracting attack to steganography. For key-dependent steganography, extracting attack is equivalent to recovering the stego key. By combining detecting techniques in steganalysis and correlation attack in cryptanalysis, the authors propose a new method to recover the stego key of LSB steganography in spatial domain of images. Theoretic analysis is made for this method, which establishes that its complexity is mainly determined by the number of samples and the attack will fail when the embedding rate r tends to 0 or 1. The authors introduce an estimator for the minimum number of samples n based on a mixture Gaussian model. The experiments on the stego software "Hide and Seek 4.1" show that the proposed method can recover the stego key and extract the hidden message. If the length of messages L is not known, the attack can success for 5.3%
Keywords:steganography  steganalysis  extracting attack  correlation attack  mixture distribution
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号