期刊文献+

隐写分析技术研究 被引量:2

The Research of Steganalysis
在线阅读 下载PDF
导出
摘要 隐写分析技术成为信息安全领域的一个新的研究热点,通过对隐写分析技术的研究现状进行分析与综述,针对现有的隐写分析技术进行分类总结,阐述隐写分析的概念和意义,重点分析了现有几种常用的隐写分析算法,并评价其优缺点,最后指出了隐写分析技术的发展方向。 Steganalysis is a hotspot in the research of information security. The steganalytic algorithms are classified by analyzing and reviewing its research condition, as well as its meaning is given. Some common steganalytic algorithms were mainly analyzed and evaluated. The way of steganalysis developing is pointed out.
出处 《装备制造技术》 2007年第7期80-82,共3页 Equipment Manufacturing Technology
关键词 信息隐藏 隐写分析 信息隐藏检测 盲检测 Steganography Steganalysis Information Hiding & Detecting Blind image steganalysis
  • 相关文献

参考文献6

  • 1夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:20
  • 2Wen-Nung Lie and Guo-shiang Lin.A Feature_Based Classification Technique for Blind Imnge Steganalysis[J].IEEE TRANSACTIONS ON MULTIMEDIA,2005,7(6):1007-1020.
  • 3张俊萍,谭月辉,梁欣,尹文龙.信息隐藏的检测技术研究[J].河北工业科技,2006,23(5):264-266. 被引量:2
  • 4J.Fridrich,R.Du and M.Long.Steganalysis of LSB encoding in color images[A].Proceedings of ICME[C].New York,ACM Press,2000,(2):56-60.
  • 5Provos N,Honeyman P.Hide and seek:an introduction to Steganography.[J].IEEE security & privacy,2003,(7):32-44.
  • 6Hary Farid.Detecting hidden messages using higher-order statistical models[A].Proceedings of the IEEE Int'l.Conference on Image Processing 02[C],New York:IEEE,2002.

二级参考文献26

  • 1刘绍辉,姚鸿勋,高文,姜峰.针对小波域量化隐藏方法的图像监测技术研究[J].通信学报,2004,25(7):71-77. 被引量:5
  • 2[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 3[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 4[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23
  • 5[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230
  • 6[5]Avcbas, B Sankur. Statistical analysis of image quality measures. The 10th European Signal Processing Conf(EUSIPCO'2000), Tampere, Finland, 2000
  • 7[6]A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proc of Information Hiding, Third Int'l Workshop, LNCS 1768. Berlin Heidelberg: Springer-Verlag, 2000. 61~76
  • 8[7]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia(Special Issue on Security), 2001, 8(4): 22~28
  • 9[8]J Fridrich, R Du, M Long. Steganalysis of LSB encoding in color images. ICME'2000, New York, USA, 2000
  • 10[9]Y K Lee, L H Chen. An adaptive image steganographic model based on minimum-error LSB replacement. The 9th National Conf on Information Security, Taichung, Taiwan, 1999

共引文献20

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部