期刊文献+

基于冗余零系数消除的F5改进算法 被引量:1

Improved F5 Algorithm Based on Surplus Zero Coefficient Elimination
在线阅读 下载PDF
导出
摘要 F5隐写分析算法利用收缩现象,比较剪裁后图像直方图和估计载体图像直方图的差异进行检测。针对该算法的特点,提出改进的F5算法,通过部分消除冗余零系数,提高嵌入率、防止收缩现象的发生。在标准图像集上的实验结果表明,改进算法改善了含密直方图的收缩现象,各检测参数与原始载体图像差别较小,可以有效抵抗F5隐写分析算法。 F5 steganalysis uses the shrinkage and compares the differences between estimation of the cover-image histogram and the stego-image to realize detection. This paper presents improved F5 algorithm to resist such detection based on the characteristic of F5 steganalysis. It can eliminate a part of surplus 0, elevate embedding efficiency and prevent the shrinkage. Expeiiment on the standard images shows the improved algorithm can get parameters close to the cover-image, and resist F5 steganalysis.
作者 王舰 汤光明
出处 《计算机工程》 CAS CSCD 北大核心 2009年第16期164-166,共3页 Computer Engineering
关键词 隐藏算法 F5算法 F5隐写分析算法 离散余弦变换直方图 hiding algorithm F5 algorithm F5 steganalysis Discrete Cosine Transformation(DCT) histogram
  • 相关文献

参考文献4

  • 1Westfeld A. F5: A Steganographic Algorithm[C]//Proc. of the 4th International Workshop on Information Hiding. [S. l.]: Springer- Verlag, 2001.
  • 2刘昌鑫,朱平,夏春和.F5隐写算法及其隐写分析研究[J].计算机工程与设计,2007,28(4):884-887. 被引量:6
  • 3王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
  • 4Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG Images: Breaking the F5 Algorithm[C]//Proc. of the 5th Information Hiding Workshop. Noordwijkerhout Netherlands: [s, n.], 2002.

二级参考文献9

  • 1Westfeld A,Pfitzman A.Attacks on stegographic system[C].Proceedings of 3th International Workshop on Information Hiding,2001.517-522.
  • 2Westfeld A.F5-A steganographic algorithm:High capacity despite better steganalysis[C].New York,Berlin,Heidellberg:Springer-Verlag,2001.289-302.
  • 3Fridrich J,Goljan M,Hogea D.Steganalysis of JPEG images:Breaking the F5 algorithm[C].Netherlands:5th Information Hiding Workshop,2002.7-9.
  • 4Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia:Signal Issue on Security,2001,8(4):22-28.
  • 5Fridrich J,Goljan M,Hogea D.New methodology for breaking steganographic techniques for JPEGs[C].CA:Proc EI SPIE Santa Clara,2003.143-155.
  • 6Fridrich J,Soukal D.Quantitative steganalysis of digital images:Estimating the secret message length[J].ACM Multimedia Systems Journal,2003,9(3):288-302.
  • 7Fridrich J,Goljan M.On estimation of secret message length in LSB steganography in spatial domain[C].CA:Proc EI SPIE San Jose,2004.
  • 8Fridrich J,Soukal D,Goljan M.Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain[C].CA:Proc EI SPIE San Jose,2005.595-606.
  • 9Fridrich J,Holotyak T S,Soukal D.Stochastic approach to secret message length estimation in k embedding steganography[C].CA:Proc EI SPIE San Jose,2005.673-684.

共引文献25

同被引文献7

  • 1Sallee P. Model-based Steganography[C]//Proc. of the 3rd International Workshop on Digital Watermarking. Berlin, Germany: Springer-Verlag, 2004: 154-167.
  • 2Bohme R, Westfeld A. Breaking Cauchy Model-based JPEG Steganography with First Order Statistics[C]//Proc. of ESORICS’04. Berlin, Germany: Springer-Verlag, 2004: 125-140.
  • 3Fridrich J. Feature-based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schems[C]// Proc. of the 6th International Workshop on Information Hiding. Toronto, Canada: [s. n.], 2005: 67-81.
  • 4Hu Donghui, Wang Lina, Jiang Xiaoqiu, et al. Detecting the MB1 with Higher-order Statistics[C]//Proc. of CIS’08. Suzhou, China: [s. n.], 2008: 330-333.
  • 5伊兵哲,平西建,许漫坤.一种针对MB数字隐写的改进隐写分析方法[J].信息工程大学学报,2007,8(3):339-343. 被引量:4
  • 6孙文顒,张新鹏,王朔中.基于直方图差异的模型隐写分析[J].上海大学学报(自然科学版),2008,14(2):111-115. 被引量:3
  • 7曲欣,童学锋,宣国荣,膝建忠,施云庆.基于直方图对的JPEG图像无损数据隐藏[J].计算机工程,2010,36(1):218-220. 被引量:5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部