首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 203 毫秒
1.
对空域图像LSB隐写术的提取攻击   总被引:2,自引:0,他引:2  
隐写分析的研究一直集中于检测隐藏信息的存在性,而关于如何提取隐藏信息(即对隐写术的提取攻击)的研究还非常少.对于使用密钥的隐写术,提取攻击等价于恢复隐写密钥.文中结合隐写分析中的检测技术和密码分析中的相关攻击技术,对空域图像LSB隐写术提出了一种隐写密钥恢复方法.理论分析说明:此攻击方法的计算复杂度主要由所需的样本量决定,并且当嵌入率r接近0或1时攻击将失败.作者通过混合高斯模型给出了一个估计最小样本量的方法.针对隐写软件"Hide and Seek 4.1"的实验表明:此攻击方法可以成功恢复隐写密钥,从而提取隐藏的消息.如果消息长度L未知,当嵌入率5.3%<r<94.7%时攻击可以成功;如果L已知,当1.1%<r<98.4%时攻击可以成功,并且当11%<r<50%时,使用估计的最小样本量可以将攻击速度提高10%~45%.  相似文献   

2.
基于JPEG图像的空域特征,针对DCT域连续LSB隐写术提出一种唯载密提取攻击方法。根据JPEG图像编码块在空域的块不连续性,将嵌入消息起止点估计问题转化为序列突变点的估计问题,建立逼近理想序列模型估计序列突变点。新模型不仅适用于对连续JSteg算法的提取攻击,对一类可抵抗χ2检验攻击的连续JSteg改进算法同样有效。实验结果表明,对消息嵌入起止点的平均估计误差约为260个系数。  相似文献   

3.
基于纹理复杂度和差分的抗盲检测图像隐写算法   总被引:1,自引:0,他引:1  
陶然  张涛  平西建 《计算机应用》2011,31(10):2678-2681
通过分析纹理复杂度对图像隐写分析的影响,提出一种基于纹理复杂度和像素差分的隐写算法。首先,将图像划分为大小相同的分块,通过分块中起点位置的不同计算分块中不同小块的纹理复杂度,选择复杂度最高的图像小块;然后,计算小块的相邻像素差分值,并根据秘密消息的长度和不同方向上的差分值分布确定嵌入阈值,在大于该阈值的差分值中嵌入秘密消息。对多种嵌入算法在不同图像库上做通用盲检测实验,实验结果表明,该算法在抵抗小波高阶统计量分析等盲检测算法能力方面,优于LSB匹配、图像边缘自适应嵌入等隐写算法。  相似文献   

4.
在图像边缘自适应LSB匹配改进隐写算法中,秘密信息嵌入位置的选择仅由某个方向上像素对的差值决定,未考虑该像素与其邻域内其他像素的差值变化的特点.针对该问题,对隐写前后图像的八方向差分直方图进行分析,提出一种基于LSB匹配改进算法(LSBMR)边缘自适应隐写检测的算法.该算法计算图像的八方向绝对差分直方图,提取直方图中隐写前后变化较为明显的频数用以构建特征向量,并使用支持向量机完成检测.对较低嵌入率下(≤0.5 bpp)的EALSBMR隐写结果进行检测,结果表明该算法的平均检测率均高于现有典型的隐写分析算法.  相似文献   

5.
LSB匹配隐写是图像隐写分析中的重点研究问题。根据图像相邻像素的相关性, 提出了一种新的隐写分析算法。通过图像复原算法计算出复原图像, 利用高阶Markov链模型分别对待检测图像和复原图像建模, 根据LSB匹配隐写对高阶Markov链模型经验矩阵的影响, 提取复原图像和待检测图像的统计特征组合成新的27维特征向量对支持向量机进行训练。实验表明提出的算法对LSB匹配隐写有较好的分析效果, 特别在嵌入率低的情况下, 算法具有较好的分析能力。  相似文献   

6.
刘静  汤光明 《计算机应用研究》2010,27(10):3896-3898
在已知嵌入消息长度的条件下,隐写密钥可以看做消息嵌入的起始位。将图像像素划分为不同类点,通过分析信息嵌入和最低位置反对各类点的影响,得到图像嵌入信息部分和未嵌入信息部分的差异,最终设计了针对空域序列LSB(least significant bits)隐写图像的密钥估计算法。实验结果表明,该算法可对隐写密钥进行快速有效的估计。  相似文献   

7.
针对LSB匹配隐写的图像复原隐写分析   总被引:3,自引:0,他引:3  
最低有效位(LSB)匹配隐写是目前图像隐写分析的难点和热点之一.为了提高针对LSB匹配隐写的隐写分析算法性能,将图像退化复原理论与图像隐写分析相结合,提出一种新的隐写分析算法.首先将LSB匹配隐写过程建模为加性噪声造成的图像退化过程,提出了一种专用复原滤波算法;然后将载密图像的复原图像作为载体图像的估计图像,提取载密图像与估计图像的质心特征,结合Fisher线性判决器实现隐写分析.实验结果表明,复原滤波算法可有效地复原受LSB匹配隐写噪声污染的退化图像,隐写分析算法的总体性能优于Ker方法,尤其在低嵌入率条件下表现良好,适用于空间域图像LSB匹配隐写.  相似文献   

8.
LSB算法是一种典型的空间域信息隐藏算法,由于嵌入信息量大、算法简单而成为最常见的信息隐藏算法,也同时成为了隐写分析者很感兴趣的对象。针对隐写位置密钥的攻击,本文提出了一种改进的LSB隐写算法,先在图像各像素的LSB位嵌入噪声信息,再在密钥的控制下有选择性地在部分像素点嵌入隐藏信息。在已知载体图像或已知多幅用同一载体进行信息隐藏的载密图像的情况下,可以有效抵御针对隐写位置密钥的攻击,提高了LSB算法的安全性。同时该思想也可应用于基于DCT域等频域的隐藏算法中。  相似文献   

9.
基于Arnold变换与改进LSB嵌入方案的信息伪装算法   总被引:4,自引:0,他引:4  
文章提出了一种基于二维Arnold变换与改进LSB嵌入方案的图像信息伪装算法,在对图像进行二维Arnold变换的基础上,采用改进的LSB嵌入方案嵌入数据,提取时只需提取Arnold变换图像的LSB即可。该算法结合了图像置乱技术和改进的LSB嵌入方案,对嵌入的数据形成了双层保护。实验结果表明,该算法的数据嵌入量及失真度与传统的LSB嵌入方式一致,同时能够有效地抵抗RS(RegularSingular)和SPA(SamplePairAnalysis)隐写分析,并保持了图像的直方图统计特征,此外,该方法适用于灰度图像和彩色图像,易于实现。  相似文献   

10.
小波细节信息的LSB隐写分析算法   总被引:1,自引:1,他引:0       下载免费PDF全文
为了准确地估计出隐藏图像的嵌入率,利用LSB隐写对图像小波细节信息影响较大这一特点,首先给出了图像的小波细节信息和小波细节信息能量的定义,同时利用LSB隐写图像计算出其原始图像的小波细节信息能量;然后根据隐写图像与原始图像的小波细节信息能量,估计出LSB隐写图像的嵌入率。实验证明,该方法在隐藏图像嵌入率不是很低的情况下,能够比较准确地估计出隐藏图像的嵌入率。  相似文献   

11.
At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer forensics. Due to the difficulty of an extracting attack, research in this field is limited. In steganography with a stego key, an extracting attack is equivalent to recovering the stego key. In this paper we study a method for recovering the stego key in least significant bit (LSB) steganography with a decompressed JPEG image as the cover image. Firstly, the recovery of the stego key is translated into a cryptanalysis problem for a sequential cipher. The method for recovering the stego key is based on estimating the modification positions. The minimum size of the data used to recover the stego key successfully is discussed. Secondly, when a decompressed JPEG image is used as the cover image, the probability of recovering the cover pixels using recompression is discussed. Recompression is used to compute the error of the estimated sequence. Finally, an algorithm to recover the stego key in LSB steganography with a decompressed JPEG image as the cover image is proposed. The experimental results for the steganographic software, Hide and Seek 4.1 and its variant, which is a typical representative of LSB steganography, show that the proposed method can successfully recover the stego key in LSB replacement and LSB matching, i.e., the extracting attack is successful, and it outperforms three previous methods in terms of computational complexity.  相似文献   

12.
This paper presents a least significant bit (LSB) matching steganography detection method based on statistical modeling of pixel difference distributions. Previous research indicates that natural images are highly correlated in a local neighborhood and that the value zero appears most frequently in intensity differences between adjacent pixels. The statistical model of the distribution of pixel difference can be established using the Laplace distribution. LSB matching steganography randomly increases or decreases the pixel value by 1 when the message is embedded; thus, the frequency of occurrence of the value zero in pixel differences changes most dramatically during message embedding. Based on the Laplacian model of pixel difference distributions, this paper proposes a method to estimate the number of the zero difference value using the number of non-zero difference values from stego-images and uses the relative estimation error between the estimated and actual values of the number of the zero difference value as the classification feature. Experimental results indicate that the proposed algorithm is effective in detecting LSB matching steganography and can achieve better detection performance than the local extreme method under most circumstances.  相似文献   

13.
F5 steganography is much different from most of LSB replacement or matching steganographic schemes, because matrix encoding is employed to increase embedding efficiency while reducing the number of necessary changes. By using this scheme, the hidden message inserted into carrier media imperceptibly can be transferred via a more secure subliminal channel. The embedding domain is the quantized DCT coefficients of JPEG image, which makes the scheme be immune to visual attack and statistical attack from the steganalyst. Based on this effective scheme, an extended matrix encoding algorithm is proposed to improve the performance further in this paper. By changing the hash function in matrix encoding and converting the coding mode, the embedding efficiency and embedding rate get increased to a large extent. Eventually, the experimental results demonstrate the extended algorithm is superior to the classic F5 steganography.  相似文献   

14.
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real-time constraints. Digital information revolution has caused significant changes in the data communication. This data communication may require private, secure, and sometimes malicious communication. Competent secrecy can be accomplished by applying novel and inventive audio steganography. This article focuses on the secret message followed by shuffled embedded bit substitution in original audio stream by adopting optimized audio embedding technique (OAET) from the technological observation. To hide the information in the deeper layer of the audio stream, this method uses a new elevated bit range least significant bit (LSB) audio steganography technique that decreases distortion and improves the robustness of the embedded audio stream. The proposed technique proves that the perceptual quality of audio steganography is better than the previous standard LSB technique. Experiment results proved that the cladding of the OAET provides high-level security to the universal cyber data. The interpretation of results shows that embedding data in audio enhances the level of security when used as IoT smart speakers, where the attackers could not distinguish between the original audio and the embedded audio streams.  相似文献   

15.
针对方程式重排序算法信息隐藏量低、水印嵌入和提取过程复杂的缺点,提出了一种基于变进制规则的方程式重排序软件水印算法。算法以程序中可安全交换方程式的初始系数序列作为密钥向量,无须借助远程认证中心,利用变进制转换规则和方程式系数循环右移操作实现了水印的嵌入和提取。实验分析表明,算法进一步提高了水印的数据率,增强了水印的隐蔽性,对BLOAT等扭曲攻击具有很强的抵抗能力。  相似文献   

16.
目的 图像隐写是指将秘密信息隐藏到载体图像中,生成含密图像并在公共信道中传输。隐写分析旨在识别图像中是否隐藏秘密信息。不论何种隐写方案,都会在一定程度上被隐写分析识破,从而导致胁迫攻击,即攻击者找到发送方或接收方,胁迫其提交经过验证的秘密信息。为了保护秘密信息的隐蔽通信,对抗胁迫攻击的可否认方案亟待研究。在密码学领域,为了对抗胁迫攻击,已经提出了可否认加密的概念及相关方案并受到关注与研究。而在隐写领域,有研究提出可否认隐写的概念并设计了接收方可否认隐写的框架,但没有发送方可否认隐写的相关研究。对此,本文讨论发送方可否认隐写。方法 设计方案的通用框架,并构造两个方案:基于可逆网络的发送方可否认图像隐藏方案和基于可否认加密的发送方可否认图像隐写方案。在发送方可否认隐写的框架下,发送方可使用虚假的秘密信息生成与攻击者手中相同的含密图像,以欺骗攻击者,逃脱胁迫攻击,保护真实的秘密信息。结果 实验结果表明,两个方案都是可行且有效的,与原始隐写方案相比,可否认方案达到了发送方可否认功能的同时,均不会显著降低含密图像的视觉质量(峰值信噪比(peak signal-to-noise ratio,PSN...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号