首页 | 本学科首页   官方微博 | 高级检索  
     

序贯LSB隐写术的提取攻击
引用本文:陈嘉勇,刘九芬,周涵,张卫明.序贯LSB隐写术的提取攻击[J].计算机工程,2008,34(24):146-148.
作者姓名:陈嘉勇  刘九芬  周涵  张卫明
作者单位:解放军信息工程大学信息工程学院,郑州,450002
基金项目:国家自然科学基金资助项目,河南省自然科学基金资助项目
摘    要:序贯LSB隐写术在载体中通过连续LSB替换嵌入消息,其提取攻击问题本质上是消息嵌入起止点的估计问题。该文建立针对序贯LSB隐写术的提取攻击模型,将提取攻击问题转化为一类排序问题。对嵌入率未知情形,提出计算复杂度为O(n)的提取攻击算法。对嵌入率已知情形,给出计算复杂度为O(2logn)的快速提取攻击算法。实现了对序贯JSteg算法的提取攻击。

关 键 词:隐写分析  LSB嵌入  提取攻击  序贯JSteg
修稿时间: 

Extracting Attack to Sequential LSB Steganography
CHEN Jia-yong,LIU Jiu-fen,ZHOU Han,ZHANG Wei-ming.Extracting Attack to Sequential LSB Steganography[J].Computer Engineering,2008,34(24):146-148.
Authors:CHEN Jia-yong  LIU Jiu-fen  ZHOU Han  ZHANG Wei-ming
Affiliation:(School of Information Engineering, PLA Information Engineering University, Zhengzhou 450002)
Abstract:Sequential LSB steganography embeds message into cover image by sequential LSB substitution. The problem of extracting attack to sequential LSB steganography is essentially equivalent to the problem of estimating the beginning and the end of the secret message. This paper constructs an extract attack model for sequential LSB steganography, by translating the problem of extracting attack into a sort-problem. It proposes an algorithm whose complexity is O(n) when the embedding rate p is unknown and a fast algorithm whose complexity is O(2logn) when p is known. The extracting attack to sequential JSteg is successfully made.
Keywords:steganalysis  LSB embedding  extracting attack  sequential JSteg
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号