期刊文献+

F5隐写算法及其隐写分析研究 被引量:6

Studies of F5 steganographic algorithm and its steganalysis
在线阅读 下载PDF
导出
摘要 图像隐写分析是检测、提取和破坏隐写图像中秘密信息的技术,是信息安全领域的研究热点之一。由Westfeld提出的F5隐写算法是一种重要的图像隐写算法。分析了F5隐写算法及其隐写系统,讨论了一种针对F5隐写算法的隐藏检测方法,并给出了具体实现的算法。实验结果表明,F5算法采用矩阵编码,提高了嵌入效率。 Image steganalysis is a technique of detecting, extracting and destroying the hiding information in stegoimage, and it has become one of the focuses in the field of information security. F5 Steganographic Algorithm is a important steganography. F5 Steganographic Algorithm and its Steganographic system are presented. A steganalytic method that detect messages hidden in JPEG images is discussed. Experimental results show that F5 algorithm implements matrix encoding to improve the efficiency of embedding.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第4期884-887,共4页 Computer Engineering and Design
基金 航空基金项目(03F51060) 总装备部"十五"预研基金项目(418010703)
关键词 隐写术 载体图像 隐写图像 矩阵编码 F5隐写算法 隐写分析 steganography coverimage stegoimage matrix encoding FSalgorithm steganalysis
  • 相关文献

参考文献9

  • 1Westfeld A,Pfitzman A.Attacks on stegographic system[C].Proceedings of 3th International Workshop on Information Hiding,2001.517-522.
  • 2Westfeld A.F5-A steganographic algorithm:High capacity despite better steganalysis[C].New York,Berlin,Heidellberg:Springer-Verlag,2001.289-302.
  • 3Fridrich J,Goljan M,Hogea D.Steganalysis of JPEG images:Breaking the F5 algorithm[C].Netherlands:5th Information Hiding Workshop,2002.7-9.
  • 4Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia:Signal Issue on Security,2001,8(4):22-28.
  • 5Fridrich J,Goljan M,Hogea D.New methodology for breaking steganographic techniques for JPEGs[C].CA:Proc EI SPIE Santa Clara,2003.143-155.
  • 6Fridrich J,Soukal D.Quantitative steganalysis of digital images:Estimating the secret message length[J].ACM Multimedia Systems Journal,2003,9(3):288-302.
  • 7Fridrich J,Goljan M.On estimation of secret message length in LSB steganography in spatial domain[C].CA:Proc EI SPIE San Jose,2004.
  • 8Fridrich J,Soukal D,Goljan M.Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain[C].CA:Proc EI SPIE San Jose,2005.595-606.
  • 9Fridrich J,Holotyak T S,Soukal D.Stochastic approach to secret message length estimation in k embedding steganography[C].CA:Proc EI SPIE San Jose,2005.673-684.

同被引文献27

  • 1梁光岚,王朔中,张新鹏.一种新的二值图像密写方法[J].信号处理,2005,21(z1):591-594. 被引量:1
  • 2刘鸿霞,夏春和.图像隐写分析现状研究[J].计算机工程与设计,2006,27(1):21-25. 被引量:9
  • 3梁光岚,王朔中,张新鹏.Steganography in binary image by checking data-carrying eligibility of boundary pixels[J].Journal of Shanghai University(English Edition),2007,11(3):272-277. 被引量:6
  • 4刘春庆,梁光岚,王朔中,张新鹏.应用二值图像信息隐藏技术实现彩色图像中的安全隐写[J].应用科学学报,2007,25(4):342-347. 被引量:5
  • 5Westfeld A. F5: A Steganographic Algorithm[C]//Proc. of the 4th International Workshop on Information Hiding. [S. l.]: Springer- Verlag, 2001.
  • 6Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG Images: Breaking the F5 Algorithm[C]//Proc. of the 5th Information Hiding Workshop. Noordwijkerhout Netherlands: [s, n.], 2002.
  • 7姚国祥 林良超.RSA密钥对高效生成算法.计算机工程,2007,33(20):148-149,152.
  • 8王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
  • 9Gul G. , Kurugollu F. JPEG Image Steganalysis Using Multivari- ate PDF Estimates with MRF Cliques[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):578 -587.
  • 10Prema G. , Natarajan S.. Steganography Using Genetic Algo- rithm Along with Visual Cryptography for Wireless Network Ap- plication[ C ]. International Conference on Information Commu- nication and Embedded Systems, Chennai, India, 2013:727 - 730.

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部