信号与信息处理

一种基于图像内容的隐写分析方法

展开
  • 解放军信息工程大学信息工程学院,郑州450002
平西建,教授,博导,研究方向:图像处理、模式识别、信息隐藏,E-mail: pingxijian@yahoo.com.cn

收稿日期: 2011-12-12

  修回日期: 2012-04-11

  网络出版日期: 2012-04-11

基金资助

国家自然科学基金(No.60970142)资助

Steganalysis Based on Image Contents

Expand

  • Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China

Received date: 2011-12-12

  Revised date: 2012-04-11

  Online published: 2012-04-11

摘要

数字图像已成为信息隐藏的一类重要载体,然而不同内容的图像对隐写分析呈现出不同的检测性能. 该文基于图像信源区域平稳马尔可夫特性,用方差度量图像的区域复杂度,运用四叉树分割方法对图像进行递归分解,提取对数字隐写较为敏感的平坦区域,并从这些区域提取游程长度直方图统计矩特征,最后结合支持向量机实现隐藏信息检测. 实验结果表明,依据图像内容分割出敏感区域进行隐写分析可有效改善检测性能.

本文引用格式

李韬, 平西建 . 一种基于图像内容的隐写分析方法[J]. 应用科学学报, 2013 , 31(4) : 394 -401 . DOI: 10.3969/j.issn.0255-8297.2013.04.010

Abstract

 Digital images are important covers in information hiding. It has been shown that steganalytic methods perform differently on images with different contents. Based on regionally stationary Markov characteristics of natural images, a new steganalysis method based on image segmentation is proposed. Quad-tree
segmentation based on local Variance is used to locate areas sensitive to message embedding. Features based on run length histogram are then extracted and optimized. Finally, detection of steganography is done using support vector machine. Experimental results show that the proposed steganalysis method outperforms previous methods in detection accuracy.

参考文献

[1] KER A. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.

[2] CANCELLI G, DOËRR G, BARNI M, Ingemar J. COX I J. A comparative study of ±1 steganalyzers [C]//IEEE Workshop on Multimedia Signal Processing, 2008:791-796.

[3] 郭艳卿,何德全,尤新刚,孔祥维,王波. 基于整体性的隐密分析特征提取和融合方法研究 [J].电子学报,2006, 34 (12A): 2443-2446.

GUO Yanqing, HE Dequan,YOU Xingang, KONG Xiangwei, WANG Bo. Research on holism-based feature extraction and fusion for steganalysis [J]. Acta Electronica Sinica, 2006, 34 (12A): 2443-2446.

[4] 钮心忻,杨义先. 信息隐写与隐写分析研究框架探讨 [J]. 电子学报,2006, 34(12A): 2421-2424.

NIU Xinxin,YANG Yixian. Study on the frame of information steganography and steganalysis [J]. Acta Electronica Sinica, 2006, 34(12A): 2421-2424.

[5] LIU Q, SUNG A H, RIBEIRO B, WEI M , CHEN Z , XU J. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1): 21-36.

[6] CHO S, CHA B H, WANG JINGWEI, JAY K. Block-based image steganalysis: algorithm and performance evaluation [C]//IEEE International Symposium on Circuits and Systems, 2010: 1679-1682.

[7] WONG Ping Wah, CHEN Hong, TANG Zhong Jue. On steganalysis of plus-minus one embedding of continuous tone images [C]//Proceedings of SPIE-IS&T Electronic Imaging, 2005, 5681: 643-652.

[8] HARMSEN J, PEARLMAN W A. Steganalysis of additive noise modelable information hiding [C]//SPIE International Conference on Security, Steganography, and Wartermarking of Multimedia Contents, 2003: 131-142.

[9] ZHANG J, COX I J, DOЁRR G. Steganalysis for LSB matching in images with high-frequency noise [C]//IEEE Workshop on Multimedia Signal Processing, 2007: 385-388.

[10] FRIDRICH J, KODOVSKÝ J, HOLUB V, GOLJAN M. Steganalysis of content-adaptive steganography in spatial domain [C]//Information Hiding 13th International Conference, 2011, 6958: 102-117.

[11] JACOBS E W, FISHER Y, BOSS R D.Image compression:a study of the iterated transformation method [J]. Signal Process, 1992, 29: 页码。

[12] WANG Ying, PIERRE M. Optimized feature extraction for learning-based image steganalysis [J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1): 31-45.

[13] 高建炯,宣国荣,施云庆,柴佩琪,杨志强. 基于直方图频域统计矩的图像隐写分析 [J]. 计算机应用,2005, 25(10): 2371-2373.

GAO Jianjiong, XUAN Guorong, SHI Yunqing, CAI Peiqi, YANG Zhiqiang. Image steganalysis based on statistical moments in the frequency domain of the histogram [J]. Computer Applications, 2005, 25(10): 2371-2373. ( in Chinese)

[14] DONG Jing, TAN Tieniu. Blind image steganalysis based on run-length histogram analysis [C]//IEEE International Conference on Image Processing, 2008: 2064-2067.

[15] YU Xiao Yi, BABAGUHCI N. Run length based steganalysis for LSB matching steganography [C]//International Conference on Multimedia and Expo, 2008: 353-356.

[16] DOЁRR G. Image database for steganalysis studies [DB/OL]. Available: http://www.cs.ucl.ac.uk/staff /I.Cox/Content/Downloads.html.

[17] CHANG C C, LIN C J. LIBSVM: a library for support vector machines [OL]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm.

[18] BAS P, FURON T. BOWS-2 Jul. 2007 [DB/OL]. Available: http://bows2.gipsa-lab.inpg.fr

[19] LUO Weiqi, HUANG Fangjun, HUANG Jiwu. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions Information Forensics and Security, 2010, 5( 2): 201-214.

[20] PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3 ): 215-224.

[21] FRIDRICH J.Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes [C]//Proceedings of 6th Information Hiding Workshop. 2004. Springer LNCS, 3200: 67-81.
文章导航

/