期刊文献+

隐写分析算法的模糊综合评估 被引量:6

Fuzzy Comprehensive Evaluation of Steganalysis Algorithms
在线阅读 下载PDF
导出
摘要 隐写术和隐写分析技术是信息对抗的重要内容。目前,已经有许多隐写分析算法,但这些算法特点各异,在实际应用时,难以取舍。为此,提出了隐写分析算法的模糊综合评估算法,来实现对各种隐写分析算法的性能评估和比较。该评估算法不仅可以用于从已知隐写分析算法中选择出最优算法,也适合对新的隐写分析算法进行性能评估。 Steganography and steganalysis are main paris of information countermeasure on the lnternet, which are very important to information security. A lot of steganalysis algorithms are proposed, but it is difficult to choose a proper one for actual applications. A fuzzy comprehensive evaluation algorithm is proposed to evaluate and compare different steganalysis algorithms. The algorithm can be applied to choose the best steganalysis algorithm, or to evatuate a new steganalysis algorithm.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第21期141-144,共4页 Computer Engineering
基金 国家自然科学基金资助项目(90104005) 国家"十五""863"计划基金资助项目(2003AA142160) 信息安全国家重点实验室(中国科学院研究生院)开放课题基金资助项目
关键词 数字水印 信息隐藏 隐写分析 模糊综合评估 Digital wartermark Information hiding Steganalysis Fuzzy comprehensive evaluation
  • 相关文献

参考文献5

二级参考文献13

  • 1Lee Yeuan-Kuen, Chen Ling-Hwei. An adaptive image steganographic model based on minimum-error LSB replacement[A]. In.. Proceedings of the Ninth National Conference on Information Security [C], Taiwan, China, 1999 : 8-15.
  • 2Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In.. Proceedings of Third international Workshop, IH'99[C], Dresden, Germany, Springer Verlag, 1999:61-75.
  • 3Fridrich J, Du R, Meng L. Steganalysis of LSB encoding in color images [A]. In: 2000 IEEE international conference on multimedia and Expo[C], New York City, 2000,3 : 1279-1282.
  • 4Fridrich Jessica, Goljan Miroslav, Du Rui. Detecting LSB steganography in color and gray-scale images [J ]. IEEE Tranactions on Multimedia, 2001,8(4):22-28.
  • 5Hary Farid. Detecting hidden messages using higher-order statistical models [A]. In: Proceedings IEEE international conference on image processing[C], Rochester, NY, 2002:23-27.
  • 6Provos N, Honeyman P. Detecting steganographic content on the internet[R], Technical Report CITI 01-1a, University of Michigan, U.S. ,2001.
  • 7[6]Fridrich J, Goljan M. Practical steganalysis of digital images- state of art [ A ]. Security and Watermarking of Multimedia Contents Ⅳ,
  • 8[1]Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996,35 (3,4):313-336.
  • 9[2]Fridrich J, Goljan M. A new steganographic method for palette images [A]. Proceedings of IS&T PICS [C]. Savannah, Georgia ,USA :IS&I, 1999. 285- 289.
  • 10[3]Machado L R. EZ Stego. http : //www. stego. com/2003-04-25.

共引文献80

同被引文献60

引证文献6

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部