基于图像的信息隐藏分析技术综述

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

Internet3SteganographyWatermarkHerodotus400Internet[11]Steganalysis11DNA(1)(2)LSB863(2001AA142170)(1975);2002-06-2211122(1.7100722.)ASurveyofInformationHidingAnalysisinImagesXIAYu1,LANGRongling1,DAIGuanzhong1,HUANGDianzhong2,QIANSijin2(1.NorthwesternPolytechnicalUniversity,xi'an710072;2.ChineseInformationTechnologySecurityCertificationCenter)AbstractInformationhidinganalysisisatechnologyattackingoninformationhidingsystem.Thispaperbrieflyintroducesthetechnologiesofinformationhidingandinformationhidinganalysis.Italsoanalysesthetechnologyofinformationhidinganalysisindigitalimages.Someanalysismethodsavailablenowarealsodiscussedindetail.KeywordsInformationhiding;Digitalwatermark;Steganography;Steganalysis297Vol.297ComputerEngineering20035May2003/TP39110003428(2003)07000103A11(DCT)3(1)(2)(3)6(1)(2)(3)(4)(5)(6)23(1)BMPPGMRASTIFF(2)GIFPNG(3)(JPEGWaveletFractalCompression)AndressWestfeldAndreasPfitzmann[2]256EzStegoLSBEzStegoS-ToolsSteganosJstegEzstegoPoVsPairsofValues01EzStegoJstegS-ToolsSteganosJessicaFridrichRQP(RawQuickPairs)[3]LSBGIFPNG30%50%JessicaFridrichLSB[4]LSBLSBLSBLSB334Yeuan-KuenLeeLing-HweiChenLSB[5](1)(2)kkk-10110TDPPWTDTDTD2,TDGuo-ShiangLinWen-NungLie[6]DCT90%HaryFarid[7]QMFs2FLDJPEGInternetJPEGJPEGNielsProvos,PeterHoneymanJPEG[8]JPEGJPEGJStegJSteg-ShellJPHideOutguess[2]x2DCTStegdetectCrawlStegBreakDistributedDictionaryAttack4StegdetectJPEGCrawlJPEGStegBreakJPEGStegBreakJessicaFridrichMiroslavGoljanRuiDuJPEG[9]JPEGJPEG88DCTQSS16JPEGnJPEGYsmailAvcybao[10]266(1)(2)(3)(4)(5)(6)31,,..:20012WestfeldA,PfitzmannA.AttacksonSteganographicSystems.InProcessingofInformationHiding,ThirdInternationalWorkshop,19993FridrichJ,DuR,MengL.SteganalysisofLSBEncodinginColorImages.Proc.IEEEInt'1Conf.MultimediaandExpo,CD-ROM,IEEEPress,Piscataway,NJ,20004FridrichJ,GoljanM,DuR.DetectingLSBSteganographyinColorandGray-scaleImages.MagazineofIEEEMultimediaSpecialIssueonSecurity,2001-10/11:22-285LeeYK,ChenLH.AnAdaptiveImageSteganographicModelBasedonMinimum-errorLSBReplacement.ProceedingsoftheNinthNationalConferenceonInformationSecurity,Taiwan,1999:8-156LinGS,LieWN.StudyonDetectingImageHidingByFeatureAnalysis.Proc.ofIEEEInternationalSymposiumonCircuitsandSystems,ISCAS-2001,Sydney,Australia,2001:149-1527FaridH.DetectingHiddenMessagesUsingHigher-orderStatisticalModels.InternationalConferenceonImageProcessing,Rochester,NY,20028ProvosN,HoneymanP.DetectingSteganographicContentontheInternet.TechnicalReportCITI01-1a,UniversityofMichigan,20019FridrichJ,GoljanM,DuR.SteganalysisBasedonJPEGCompatibility,SPIEMultimediaSystemsandApplicationsIV.SPIEPress,Bellingham,Wash.,200110YsmailAvcybao.ImageQualityStatisticsandTheirUseInSteganalysisandCompression.BoaziciUniversity,200111KelleyJ.TerrorGroupsHideBehindWebEncryption.

1 / 3
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功