首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 3 毫秒
1.
基于统计特征的JPEG图像通用隐写分析   总被引:1,自引:0,他引:1  
分析了嵌入信息前后原始图像与隐密图像之间统计特征的差异,根据隐密图像,采用裁剪、重压缩的方法,得到图像F2来代替原始图像,利用15个向量函数提取出特征进行实验,并运用支持向量机(SVM)对待测图像分类,得到了较好的效果.  相似文献   

2.
綦科  谢冬青 《计算机应用》2011,31(4):956-959
基于JPEG图像的离散余弦变换(DCT)系数直方图差值序列,提出一种新的检测JPEG MB2隐写术的方法。该算法定义JPEG图像的DCT系数一阶直方图与其Cauchy拟合分布模型的系数直方图之间的差值序列作为相关性度量,在此基础上构造区分隐写图像和载体图像的分类特征序列。在特征分析中,通过Hilbert-Huang变换对特征序列进行经验模式分解,构建了基于Hilbert谱的特征向量。实验结果表明,基于该特征向量的支持向量机(SVM)对MB2隐写算法检测平均准确率达到84.48%,该方法也适用于JPEG MB1的检测。  相似文献   

3.
目的传统隐写技术在实际社交网络信道上难以保护秘密信息的完整性。在社交网络中,图像往往经过有损压缩信道进行传输,从而导致隐蔽通信失效。为了保证经过压缩信道传输的载密图像鲁棒性,设计安全鲁棒的隐蔽通信技术具有实际应用价值。基于最小化图像信息损失,本文提出无损载体和鲁棒代价结合的JPEG图像鲁棒隐写。方法首先,指出构造无损载体能有效维持隐写安全性和鲁棒性的平衡,对经过压缩信道前后的JPEG图像空域像素块进行差分,构造无损载体以确定鲁棒嵌入域;其次,通过对离散余弦变换(discrete cosine transform, DCT)系数进行"±1"操作,并计算空域信息在压缩传输前后的损失,设计衡量DCT系数抗压缩性能的鲁棒代价;同时,验证在低质量因子压缩信道下鲁棒代价更能区分DCT系数的鲁棒能力,最后,利用校验子格编码(syndrome-trellis code, STC),结合无损载体和鲁棒代价对秘密信息进行嵌入。结果实验在BossBase1.01图像库上进行对比实验,相比于传统JPEG隐写技术,构造无损载体作为嵌入域能有效地将信息平均提取错误率降低24.97%,图像的正确提取成功率提高了21...  相似文献   

4.
针对JPEG图像提出了一种基于STC(Syndrome-Trellis codes)编码和分频段嵌入的信息隐藏技术。STC编码是一种二元隐写码,可以用来提高嵌入效率,增强数字隐写系统的安全性。在所提算法中,将离散余弦变换系数(DCT系数)分为六个频段,包括直流、低频、中低频、中频、中高频和高频,与STC编码相结合在不同频段设置不同的嵌入率,通过调节各频段的编码系数,在高频段取得最高的嵌入效率和最低的数据嵌入率,并逐步增加在中高频、直流、中频、中低频和低频段的嵌入率,提高算法的安全性。为了评估所提算法的抗检测性,采用四种隐写分析算法进行测试分析。四种隐写分析算法的检测结果表明,所提算法在多种JPEG图像质量因子下的安全性优于文献中多种隐写算法。  相似文献   

5.
Multimedia Tools and Applications - Steganography is an important branch of information hiding, which is an effective way to solve the problem of communication security. Steganography can hide...  相似文献   

6.
为了进一步挖掘自适应JPEG隐写图像中隐写噪声信号特征,提出基于噪声感知残差网络的JPEG隐写分析方法.该方法由噪声感知、噪声分析和判断三部分组成.其中,噪声感知部分提取图像噪声,利用图像去噪网络,更加全面地捕获隐写引入的扰动;噪声分析部分获得噪声信息的统计特征;判断部分确定图像是否携带隐写信息.此外,网络中的残差连接有效融合多尺度特征,并防止训练中出现梯度消失和爆炸.多种条件下的对比实验结果表明,该方法相较于对比算法,能够提升针对JPEG自适应隐写的检测性能并具有更好的泛化能力.  相似文献   

7.
Song  Xiaofeng  Yang  Chunfang  Han  Kun  Ding  Shichang 《Multimedia Tools and Applications》2022,81(25):36453-36472

Social media platform such as WeChat provides rich cover images for covert communication by steganography. However, in order to save band-width, storage space and make images load faster, the images often will be compressed, which makes the image steganography algorithms designed for lossless network channels unusable. Based on DCT and SVD in nonsubsampled shearlet transform domain, a robust JPEG steganography algorithm is proposed, which can resist image compression and correctly extract the embedded secret message from the compressed stego image. First, by combining the advantages of nonsubsampled shearlet transform, DCT and SVD, the construction method for robust embedding domain is proposed. Then, based on minimal distortion principle, the framework of the proposed robust JPEG steganography algorithm is given and the key steps are described in details. The experimental results show that the proposed JPEG steganography algorithm can achieve competitive robustness and anti-detection capability in contrast to the state-of-the-art robust steganography algorithms. Moreover, it can extract the secret message correctly even if the stego image is compressed by WeChat.

  相似文献   

8.
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the stego-images created by the proposed method. Several famous JPEG steganographic algorithms are also simulated for comparisons with the proposed method. Experimental results show that the proposed steganographic method has superior performance both in capacity and security, and is practical for the application of secret communication.  相似文献   

9.
针对JPEG2000图像小波系数一般统计特征在BPCS-JPEG2000隐写前后变化不明显的问题,提出了一种基于小波系数母函数的隐写分析方法。通过对JPEG2000图像三级小波系数低频子带进行主分量提取,计算出相应的母函数,分析它在隐写前后的变化,提取出九个母函数值作为特征向量输入到SVM分类器中。实验证明在嵌入比例为30%以上可得到80%以上的真阳性率,同时假阳性率很低。  相似文献   

10.
This paper presents a modified QIM-JPEG2000 steganography which improves the previous JPEG2000 steganography using quantization index modulation (QIM). Since after-embedding changes on file size and PSNR by the modified QIM-JPEG2000 are smaller than those by the previous QIM-JPEG2000, the modified QIM-JPEG2000 should be more secure than the previous QIM-JPEG2000.  相似文献   

11.
Song  Xiaofeng  Liu  Fenlin  Zhang  Zhengui  Yang  Chunfang  Luo  Xiangyang  Chen  Liju 《Multimedia Tools and Applications》2017,76(24):26391-26419
Multimedia Tools and Applications - To improve the detection accuracy for content-adaptive JPEG steganography, which often constrains the embedding changes to complex texture regions, a new...  相似文献   

12.
Plus minus 1 (PM1) is an improved method to least significant bits (LSB)-based steganography techniques, which not only foils typical attacks against LSB-based techniques, but also provides high capacity. But how to apply it to JPEG images does not appear in literatures. In this paper, PM1 steganography in JPEG images using genetic algorithm (GA) is proposed, in which the GA is used to optimize the performance, such as minimizing blockiness. Theoretical analysis to the histogram characteristics after steganography is discussed in details, which proves that PM1 used in JPEG images preserves the first-order statistical properties. Experiments show that the proposed method outperforms the other methods in terms of capacity and security.  相似文献   

13.
This paper proposes a novel universal steganalyzer for additive noise steganography in JPEG decompressed images. On the basis of the influence of the message embedding on the statistical distributions of alternating current (ac) discrete cosine transform (DCT) coefficients, we first develop a new steganalytic feature which is defined as the ratio between different ranges of the normalized ac coefficients histogram. Then a powerful blind detector is constructed with the proposed one-dimensional (1-D) feature. Extensive experimental results demonstrate that the proposed steganalyzer outperforms the existing state-of-the-art schemes significantly and even can detect the additive noise steganography effectively at a very low embedding rate. In addition, our method using a 1-D feature is not only practical and real-time, but also can provide a better control of the false positive rate and the false negative rate by adjusting the detection threshold. Moreover, the proposed feature can also be used to identify JPEG compression besides steganalysis, which indicates that our method has a great promise in practical applications.  相似文献   

14.
Zhao  Zengzhen  Guan  Qingxiao  Zhao  Xianfeng  Yu  Haibo  Liu  Changjun 《Multimedia Tools and Applications》2018,77(11):14093-14113
Multimedia Tools and Applications - In this paper, we present a universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. This strategy can make up for the...  相似文献   

15.
16.
由于缺少对多媒体信息的完全认知,导致以多媒体信息为载体的隐密术的安全性和容量不能得到显著改善。通过比较隐密术和数字水印功能的差异,结合隐密术在安全性和容量上的特殊要求,给出隐密术中载体信息应具备的特性。基于以上分析,将桥牌牌型作为隐密术的一种新载体信息,给出一种结合替换密码的安全隐密方法。  相似文献   

17.
相丽  潘峰  钮可  郭耀 《计算机应用》2010,30(11):3022-3024
为减小秘密信息嵌入对载体视频的修改率,提出了一种基于运动矢量及线性分组码的视频隐写方法。该方法在原始视频进行H.264压缩过程中将秘密信息嵌入到其运动矢量中。线性分组码的使用不仅可大幅提高载体视频的运动矢量利用率,而且可有效降低运动矢量修改率。所提算法不仅具有计算复杂度低、视觉不可见性高的特点,而且可以实现秘密信息的盲提取。实验表明,该方法在保持良好的视频质量的前提下,可以满足隐蔽通信对于高嵌入容量的需求。  相似文献   

18.
Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses different steganalyzer units determines the security limits for embedding in cover images. In this system, each steganalyzer unit is formed by a combination of multiple steganalyzers from the same type, which are sensitive to different payloads. The confidence of each steganalyzer on an image leads us to determine the upper bound of embedding rate for the image. Considering embedding capacity, the steganographer can minimize the risk of detection by selecting a proper cover image that is secure for a certain payload. Moreover, we analyzed the relation between complexity and embedding capacity of images. Experimental results showed the effectiveness of the proposed approach in enhancing the security of stego images.  相似文献   

19.
Multimedia Tools and Applications - Since it is difficult to acquire a strong JPEG compression resistant ability while achieving a good detection resistant performance for current information...  相似文献   

20.
根据图像JPEG压缩的特点,提出了一种简洁有效的DCT系数选择方案,不仅充分利用了非零交流DCT系数,而且还用到部分零值DCT系数;此外,通过改变系数的嵌入顺序,优先考虑低频系数,改善了算法的安全性。实验表明,将2种典型的空域隐写算法(EPES和APPM)应用到所提出的算法框架,获得了比3种经典压缩域隐写算法(JSteg、F5和nsF5)和新近提出的基于STC框架的DCT域隐写算法(LPD)更大的嵌入容量及更好的安全性。所提出的 DCT 系数选择和嵌入框架可有效提升嵌入容量和抗隐写分析的性能,且所提方案具有通用性,可应用于不同隐写算法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号