期刊文献+
共找到733篇文章
< 1 2 37 >
每页显示 20 50 100
Image Steganalysis Based on an Adaptive Attention Mechanism and Lightweight DenseNet
1
作者 Zhenxiang He Rulin Wu Xinyuan Wang 《Computers, Materials & Continua》 2025年第10期1631-1651,共21页
With the continuous advancement of steganographic techniques,the task of image steganalysis has become increasingly challenging,posing significant obstacles to the fields of information security and digital forensics.... With the continuous advancement of steganographic techniques,the task of image steganalysis has become increasingly challenging,posing significant obstacles to the fields of information security and digital forensics.Although existing deep learning methods have achieved certain progress in steganography detection,they still encounter several difficulties in real-world applications.Specifically,current methods often struggle to accurately focus on steganography sensitive regions,leading to limited detection accuracy.Moreover,feature information is frequently lost during transmission,which further reduces the model’s generalization ability.These issues not only compromise the reliability of steganography detection but also hinder its applicability in complex scenarios.To address these challenges,this paper proposes a novel deep image steganalysis network designed to enhance detection accuracy and improve the retention of steganographic information through multilevel feature optimization and global perceptual modeling.The network consists of three core modules:the preprocessing module,the feature extraction module,and the classification module.In the preprocessing stage,a Spatial Rich Model(SRM)filter is introduced to extract the high-frequency residual information of the image to initially enhance the steganographic features;at the same time,a lightweight Densely Connected Convolutional Networks(DenseNet)structure is proposed to enhance the effective transmission and retention of the features and alleviate the information loss problem in the deep network.In the feature extraction stage,a hybrid modeling structure combining depth-separated convolution and ordinary convolution is constructed to improve the feature extraction efficiency and feature description capability;in addition,a dual-domain adaptive attention mechanism integrating channel and spatial dimensions is designed to dynamically allocate feature weights to achieve precise focusing on the steganography-sensitive region.Finally,the classification module adopts dual fully connected layers to realize the effective differentiation between coverage and steganography maps.These innovative designs not only effectively improve the accuracy and generalization ability of steganography detection,but also provide a new efficient network structure for the field of steganalysis.Numerous experimental results show that the detection performance of the proposed method outperforms the existing mainstream methods,such as SR-Net,TSNet,and CVTStego-Net,on the publicly available dataset BOSSbase and BOSW2.Meanwhile,multiple ablation experiments further validate the validity and reasonableness of the proposed network structure.These results not only promote the development of steganalysis technology but also provide more reliable detection tools for the fields of information security and digital forensics. 展开更多
关键词 Image steganalysis lightweight densenet adaptive attention feature focusing information retention
在线阅读 下载PDF
Steganalysis Using Fractal Block Codes and AP Clustering in Grayscale Images 被引量:1
2
作者 Guang-Yu Kang Yu-Xin Su +2 位作者 Shi-Ze Guo Rui-Xu Guo Zhe-Ming Lu 《Journal of Electronic Science and Technology》 CAS 2011年第4期312-316,共5页
This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very chal... This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very challenging problem in steganalysis. Since fractal codes represent the "self-similarity" features of natural images, we adopt the statistical moment of fractal codes as the image features. We first build an image set to store the statistical features without hidden messages, of natural images with and and then apply the AP clustering technique to group this set. The experimental result shows that the proposed scheme performs better than Fridrich's traditional method. 展开更多
关键词 Affinity propagation clustering fractal compression steganalysis universal steganalysis.
在线阅读 下载PDF
神经网络模型隐写研究进展
3
作者 龙玲慧 王子驰 张新鹏 《中国图象图形学报》 北大核心 2026年第1期45-61,共17页
神经网络模型数量增长迅猛,以神经网络为代表的人工智能技术在很多应用领域取得巨大成功。与此同时,神经网络模型含有大量冗余信息,可为隐藏机密信息提供便利条件,因此可以借助神经网络模型传递机密信息。在此背景下,本文介绍以神经网... 神经网络模型数量增长迅猛,以神经网络为代表的人工智能技术在很多应用领域取得巨大成功。与此同时,神经网络模型含有大量冗余信息,可为隐藏机密信息提供便利条件,因此可以借助神经网络模型传递机密信息。在此背景下,本文介绍以神经网络为载体的隐写技术。通过与相关技术进行对比,首先概述了神经网络模型隐写的研究意义、基础概念和评价指标;之后依据模型隐写的不同策略,从基于训练的模型隐写、基于修改的模型隐写、基于后门等技术的模型隐写3个不同的角度分别梳理了研究现状,阐述各类方法的核心机制与适用场景,以及分析了各类方法在实际应用中的优缺点。同时也对模型隐写分析的成果进行了分析和讨论,总结白盒和黑盒模型隐写分析技术,揭示当前模型隐写攻防态势。最后对模型隐写技术发展趋势进行了展望,指出大模型隐写、高隐蔽—大容量协同优化、端到端安全传输等未来方向。本文提供了一个关于模型隐写技术的全面视角,旨在展示其在信息安全领域的重要性和潜力。 展开更多
关键词 隐写 模型隐写 隐写分析 神经网络 信息隐藏
原文传递
基于层次感知匹配的文本隐写分析方法
4
作者 贾江浩 张梓葳 +2 位作者 郜丽婷 文娟 薛一鸣 《计算机工程》 北大核心 2026年第2期245-252,共8页
针对现有文本隐写分析模型难以学习和提取载密数据中真实存在的多层有效信息的问题,提出一种基于层次感知匹配的文本隐写分析方法HAM-Stega。该方法利用隐写数据中的文本信息与标签信息之间相对距离的匹配关系,以层次感知的方式获取文... 针对现有文本隐写分析模型难以学习和提取载密数据中真实存在的多层有效信息的问题,提出一种基于层次感知匹配的文本隐写分析方法HAM-Stega。该方法利用隐写数据中的文本信息与标签信息之间相对距离的匹配关系,以层次感知的方式获取文本与粗粒度、细粒度标签之间的特征匹配关系,以此设计联合嵌入损失函数和匹配学习损失函数,引导文本特征表示进行分类学习,得到最终的层次分类信息。实验结果表明,HAM-Stega在更符合现实场景的多分布混合数据集Large上的检测精度比对比模型提高了1.25~7.42百分点,表明该模型在混合数据集上具有有效的隐写分析检测能力。同时,HAM-Stega对于隐写数据中存在的其他多层有效信息(载密文本的隐写算法、嵌入率、语料类型等)可以进行提取和检测,其在层次分类指标Macro-F1和Micro-F1上相较于预训练的BERT模型分别提高了5.41和4.36百分点。 展开更多
关键词 信息安全 文本隐写分析 层次感知匹配 图神经网络 BERT
在线阅读 下载PDF
基于注意力机制的图像隐写分析综述
5
作者 吴朝平 杨本娟 《计算机时代》 2026年第3期27-33,共7页
隐写术是实现隐蔽通信的一种手段,而隐写分析是用来检测是否存在秘密信息隐蔽传输的技术,两者在相互对抗中不断进步与发展。基于失真函数和校验网格码(STC)结合的自适应图像隐写算法的提出使得图像隐写分析愈加困难,导致隐写分析算法难... 隐写术是实现隐蔽通信的一种手段,而隐写分析是用来检测是否存在秘密信息隐蔽传输的技术,两者在相互对抗中不断进步与发展。基于失真函数和校验网格码(STC)结合的自适应图像隐写算法的提出使得图像隐写分析愈加困难,导致隐写分析算法难以对图像隐写区域进行针对性检测。为此,许多专家提出在基于深度学习的隐写分析模型中加入注意力机制,引导模型重点关注隐写区域的特征,从而实现检测准确率提升的目标。本文介绍了近几年在隐写分析模型中引入各种注意力机制来提高模型性能的技术,对最新的技术进行了剖析,总结和展望该机制在隐写分析中的研究前景和应用方向,为后续研究提供有价值的参考依据。 展开更多
关键词 深度学习 注意力机制 隐写区域 图像隐写分析
在线阅读 下载PDF
A HEVC Video Steganalysis Algorithm Based on PU Partition Modes 被引量:3
6
作者 Zhonghao Li Laijing Meng +3 位作者 Shutong Xu Zhaohong Li Yunqing Shi Yuanchang Liang 《Computers, Materials & Continua》 SCIE EI 2019年第5期563-574,共12页
Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos.Currently,with the higher speed of the Internet,videos have become a kind of main ... Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos.Currently,with the higher speed of the Internet,videos have become a kind of main methods for transferring information.The latest video coding standard High Efficiency Video Coding(HEVC)shows better coding performance compared with the H.264/AVC standard published in the previous time.Therefore,since the HEVC was published,HEVC videos have been widely used as carriers of hidden information.In this paper,a steganalysis algorithm is proposed to detect the latest HEVC video steganography method which is based on the modification of Prediction Units(PU)partition modes.To detect the embedded data,All the PU partition modes are extracted from P pictures,and the probability of each PU partition mode in cover videos and stego videos is adopted as the classification feature.Furthermore,feature optimization is applied,that the 25-dimensional steganalysis feature has been reduced to the 3-dimensional feature.Then the Support Vector Machine(SVM)is used to identify stego videos.It is demonstrated in experimental results that the proposed steganalysis algorithm can effectively detect the stego videos,and much higher classification accuracy has been achieved compared with state-of-the-art work. 展开更多
关键词 Video steganalysis PU partition modes data hiding HEVC videos
在线阅读 下载PDF
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix 被引量:2
7
作者 Junjia Chen Wei Lu +4 位作者 Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第5期201-211,共11页
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic s... In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic schemes,they always find out the flippable pixels to minimize the embedding distortions.For this reason,the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain.However,the distortion maps can be calculated for cover and stego images and the difference between them is significant.In this paper,a novel binary image steganalytic scheme is proposed,which is based on distortion level co-occurrence matrix.The proposed scheme first generates the corresponding distortion maps for cover and stego images.Then the co-occurrence matrix is constructed on the distortion level maps to represent the features of cover and stego images.Finally,support vector machine,based on the gaussian kernel,is used to classify the features.Compared with the prior steganalytic methods,experimental results demonstrate that the proposed scheme can effectively detect stego images. 展开更多
关键词 Binary image steganalysis informational security embedding distortion distortion level map co-occurrence matrix support vector machine.
在线阅读 下载PDF
MI-STEG:A Medical Image Steganalysis Framework Based on Ensemble Deep Learning 被引量:2
8
作者 Rukiye Karakis 《Computers, Materials & Continua》 SCIE EI 2023年第3期4649-4666,共18页
Medical image steganography aims to increase data security by concealing patient-personal information as well as diagnostic and therapeutic data in the spatial or frequency domain of radiological images.On the other h... Medical image steganography aims to increase data security by concealing patient-personal information as well as diagnostic and therapeutic data in the spatial or frequency domain of radiological images.On the other hand,the discipline of image steganalysis generally provides a classification based on whether an image has hidden data or not.Inspired by previous studies on image steganalysis,this study proposes a deep ensemble learning model for medical image steganalysis to detect malicious hidden data in medical images and develop medical image steganography methods aimed at securing personal information.With this purpose in mind,a dataset containing brain Magnetic Resonance(MR)images of healthy individuals and epileptic patients was built.Spatial Version of the Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Stego(HUGO),and Minimizing the Power of Optimal Detector(MIPOD)techniques used in spatial image steganalysis were adapted to the problem,and various payloads of confidential data were hidden in medical images.The architectures of medical image steganalysis networks were transferred separately from eleven Dense Convolutional Network(DenseNet),Residual Neural Network(ResNet),and Inception-based models.The steganalysis outputs of these networks were determined by assembling models separately for each spatial embedding method with different payload ratios.The study demonstrated the success of pre-trained ResNet,DenseNet,and Inception models in the cover-stego mismatch scenario for each hiding technique with different payloads.Due to the high detection accuracy achieved,the proposed model has the potential to lead to the development of novel medical image steganography algorithms that existing deep learning-based steganalysis methods cannot detect.The experiments and the evaluations clearly proved this attempt. 展开更多
关键词 Deep learning medical image steganography image steganalysis transfer learning ensemble learning
在线阅读 下载PDF
A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2
9
作者 YANG Yu 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ... Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%. 展开更多
关键词 text steganalysis SVM steganalysis space-coding detecting
在线阅读 下载PDF
Passive Steganalysis Based on Higher Order Image Statistics of Curvelet Transform 被引量:1
10
作者 S.Geetha Siva S.Sivatha Sindhu N.Kamaraj 《International Journal of Automation and computing》 EI 2010年第4期531-542,共12页
Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis st... Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis strategy in which the task is approached as a pattern classification problem. A critical part of the steganalyser design depends on the selection of informative features. This paper is aimed at proposing a novel attack with improved performance indices with the following implications: 1) employing higher order statistics from a curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, as compared to other conventional wavelet transforms; 2) increasing the sensitivity and specificity of the system by the feature reduction phase; 3) realizing the system using an efficient classification engine, a neuro-C4.5 classifier, which provides better classification rate. An extensive experimental evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods. 展开更多
关键词 Image steganalysis curvelet higher order statistics neuro-C4.5 classifier information forensics information security
在线阅读 下载PDF
A Novel Universal Steganalysis Algorithm Based on the IQM and the SRM 被引量:1
11
作者 Yu Yang Yuwei Chen +1 位作者 Yuling Chen Wei Bi 《Computers, Materials & Continua》 SCIE EI 2018年第8期261-272,共12页
The state-of-the-art universal steganalysis method,spatial rich model(SRM),and the steganalysis method using image quality metrics(IQM)are both based on image residuals,while they use 34671 and 10 features respectivel... The state-of-the-art universal steganalysis method,spatial rich model(SRM),and the steganalysis method using image quality metrics(IQM)are both based on image residuals,while they use 34671 and 10 features respectively.This paper proposes a novel steganalysis scheme that combines their advantages in two ways.First,filters used in the IQM are designed according to the models of the SRM owning to their strong abilities for detecting the content adaptive steganographic methods.In addition,a total variant(TV)filter is also used due to its good performance of preserving image edge properties during filtering.Second,due to each type of these filters having own advantages,the multiple filters are used simultaneously and the features extracted from their outputs are combined together.The whole steganalysis procedure is removing steganographic noise using those filters,then measuring the distances between images and their filtered version with the image quality metrics,and last feeding these metrics as features to build a steganalyzer using either an ensemble classifier or a support vector machine.The scheme can work in two modes,the single filter mode using 9 features,and the multi-filter mode using 639 features.We compared the performance of the proposed method,the SRM and the maxSRMd2.The maxSRMd2 is the improved version of the SRM.The simulated results show that the proposed method that worked in the multi-filter mode was about 10%more accurate than the SRM and maxSRMd2 when the data were globally normalized,and had similar performance with the SRM and maxSRMd2 when the data were locally normalized. 展开更多
关键词 Image steganalysis IQM SRM total variation universal image steganalysis
在线阅读 下载PDF
Audio steganalysis based on“negative resonance phenomenon”caused by steganographic tools 被引量:1
12
作者 RU Xue-min ZHUANG Yue-ting WU Fei 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期577-583,共7页
Researching on the impact different steganographic software tools have audio statistical features,revealed the phe-nomenon that when messages are embedded in a WAV file by using a certain tool,the variation of statist... Researching on the impact different steganographic software tools have audio statistical features,revealed the phe-nomenon that when messages are embedded in a WAV file by using a certain tool,the variation of statistical features in the WAV file which already contains messages embedded by the same tool is abruptly smaller than those in which messages have not been embedded.We call it“negative resonance phenomenon”temporarily.With the phenomenon above and Support Vector Machines(SVMs),we can detect the existence of hidden messages,and also identify the tools used to hide them.As shown by the experi-mental results,the proposed method can be very effectively used to detect hidden messages embedded by Hide4PGP,Stegowav and S-Tools4. 展开更多
关键词 Audio steganalysis Linear prediction Support Vector Machine(SVM)
在线阅读 下载PDF
An Effective Steganalysis Algorithm for Histogram-Shifting Based Reversible Data Hiding 被引量:1
13
作者 Junxiang Wang Lin Huang +3 位作者 Ying Zhang Yonghong Zhu Jiangqun Ni Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第7期325-344,共20页
To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether ... To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether some secret data has been hidden in a normal-looking image.However,conventional steganalysis schemes focused on the previous RDH algorithms,i.e.,some early spatial/pixel domain-based histogram-shifting(HS)schemes,which might cause great changes in statistical characteristics and thus be easy to be detected.For recent improved methods,such as some adaptive prediction error(PE)based embedding schemes,those conventional schemes might be invalid,since those adaptive embedding mechanism would effectively reduce the embedding trace and thus increase the difficulty of steganalysis.Therefore,a novel steganalysis method is proposed in this paper to detect recent adaptive RDH schemes and provide a more effective detection tool for RDH.The contributions of this paper could be summarized as follows.(1)By analyzing the characteristics for those adaptive HS-RDH,an effective“flat ground”based detection method is designed to fast identify whether the given image is used to hide secret data;(2)According to the empirical statistical model,double check mechanism is provided to improve the detection accuracy;(3)In addition,to further improve detection ability,some detailed information for secret data,i.e.,its content and embedding location are further estimated.Compared with conventional steganalysis methods,experimental results indicate that our proposed algorithm could achieve a better detection accuracy and meanwhile acquire more detailed information on secret data. 展开更多
关键词 Reversible data hiding steganalysis DETECTION histogram shifting
在线阅读 下载PDF
A BLIND AUDIO STEGANALYSIS BASED ON FEATURE FUSION 被引量:1
14
作者 Wei Yifang Guo Li Wang Yujie Wang Cuiping 《Journal of Electronics(China)》 2011年第3期265-276,共12页
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cep... In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit em-bedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding. 展开更多
关键词 Feature fusion steganalysis Mel-cepstrum Second-order derivative Audio quality metrics Linear prediction
在线阅读 下载PDF
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis 被引量:1
15
作者 John Babu Sridevi Rangu Pradyusha Manogna 《Journal of Information Security》 2017年第3期186-202,共17页
Steganography is the process of hiding data into public digital medium for secret communication. The image in which the secret data is hidden is termed as stego image. The detection of hidden embedded data in the imag... Steganography is the process of hiding data into public digital medium for secret communication. The image in which the secret data is hidden is termed as stego image. The detection of hidden embedded data in the image is the foundation for blind image steganalysis. The appropriate selection of cover file type and composition contribute to the successful embedding. A large number of steganalysis techniques are available for the detection of steganography in the image. The performance of the steganalysis technique depends on the ability to extract the discriminative features for the identification of statistical changes in the image due to the embedded data. The issue encountered in the blind image steganography is the non-availability of knowledge about the applied steganography techniques in the images. This paper surveys various steganalysis methods, different filtering based preprocessing methods, feature extraction methods, and machine learning based classification methods, for the proper identification of steganography in the image. 展开更多
关键词 steganalysis STEGANOGRAPHY FEATURE EXTRACTION Classification
暂未订购
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences 被引量:1
16
作者 Xianyi Chen Guangyong Gao +1 位作者 Dandan Liu Zhihua Xia 《China Communications》 SCIE CSCD 2016年第7期66-73,共8页
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) ma... Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding methods.Many existing algorithms deal with steganalysis problems by using the dependencies between adjacent pixels.From another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego noises.We calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the image.Accordingly,we compute the DHCFMs as the discriminative features.We calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated features.Experimental results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching. 展开更多
关键词 information hiding steganalysis pixel differences nonadjacent pixels SVM
在线阅读 下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
17
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
在线阅读 下载PDF
Steganalysis of Low Embedding Rate CNV-QIM in Speech
18
作者 Wanxia Yang Miaoqi Li +3 位作者 Beibei Zhou Yan Liu Kenan Liu Zhiyu Hu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第8期623-637,共15页
To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM(complementary neighbor vertices-quantization index modulation)steganography in low bit-rate speech codec,the code-word correlation... To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM(complementary neighbor vertices-quantization index modulation)steganography in low bit-rate speech codec,the code-word correlation model based on a BiLSTM(bi-directional long short-term memory)neural network is built to obtain the correlation features of the LPC codewords in speech codec in this paper.Then,softmax is used to classify and effectively detect low embedding rate CNV-QIM steganography in VoIP streams.The experimental results show that for speech steganography of short samples with low embedding rate,the BiLSTM method in this paper has a superior detection accuracy than state-of-the-art methods of the RNN-SM(recurrent neural network-steganalysis model)and SS-QCCN(simplest strong quantization codeword correlation network).At an embedding rate of 20%and a duration of 3 s,the detection accuracy of BiLSTM method reaches 75.7%,which is higher than that of RNNSM by 11.7%.Furthermore,the average testing time of samples(100%embedding)is 0.3 s,which shows that the method can realize real-time steganography detection of VoIP streams. 展开更多
关键词 CNV-QIM STEGANOGRAPHY BiLSTM steganalysis VOIP SPEECH
在线阅读 下载PDF
Steganalysis of MSU Stego Video Based on Block Matching of Interframe Collusion and Motion Detection
19
作者 REN Yanzhen WANG Mingjie +2 位作者 ZHAO Yanbin WANG Lina CAI Tingting 《Wuhan University Journal of Natural Sciences》 CAS 2012年第5期441-446,共6页
MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis ... MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis method against MSU, which uses the chessboard character of MSU embedded video, proposes a down-sample block-based collusion method to estimate the original frame and checks the chessboard mode of the different frame between tested frame and estimated frame to detect MSU steganographic evidences. To reduce the error introduced by severe movement of the video content, a method that abandons severe motion blocks from detecting is proposed. The experiment results show that the false negative rate of the proposed algorithm is lower than 5%, and the false positive rate is lower than 2%. Our algorithm has significantly better performance than existing algorithms. Especially to the video that has fast motion, the algorithm has more remarkable performance. 展开更多
关键词 MSU Stego Video video steganalysis block-based matching chessboard pattern motion detection
原文传递
Color Image Steganalysis Based on Residuals of Channel Differences
20
作者 Yuhan Kang Fenlin Liu +2 位作者 Chunfang Yang Xiangyang Luo Tingting Zhang 《Computers, Materials & Continua》 SCIE EI 2019年第4期315-329,共15页
This study proposes a color image steganalysis algorithm that extracts highdimensional rich model features from the residuals of channel differences.First,the advantages of features extracted from channel differences ... This study proposes a color image steganalysis algorithm that extracts highdimensional rich model features from the residuals of channel differences.First,the advantages of features extracted from channel differences are analyzed,and it shown that features extracted in this manner should be able to detect color stego images more effectively.A steganalysis feature extraction method based on channel differences is then proposed,and used to improve two types of typical color image steganalysis features.The improved features are combined with existing color image steganalysis features,and the ensemble classifiers are trained to detect color stego images.The experimental results indicate that,for WOW and S-UNIWARD steganography,the improved features clearly decreased the average test errors of the existing features,and the average test errors of the proposed algorithm is smaller than those of the existing color image steganalysis algorithms.Specifically,when the payload is smaller than 0.2 bpc,the average test error decreases achieve 4%and 3%. 展开更多
关键词 Color channel channel difference color image steganalysis STEGANOGRAPHY
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部