Internet3SteganographyWatermarkHerodotus400Internet[11]Steganalysis11DNA(1)(2)LSB863(2001AA142170)(1975);2002-06-2211122(1.7100722.)ASurveyofInformationHidingAnalysisinImagesXIAYu1,LANGRongling1,DAIGuanzhong1,HUANGDianzhong2,QIANSijin2(1.NorthwesternPolytechnicalUniversity,xi'an710072;2.ChineseInformationTechnologySecurityCertificationCenter)AbstractInformationhidinganalysisisatechnologyattackingoninformationhidingsystem.Thispaperbrieflyintroducesthetechnologiesofinformationhidingandinformationhidinganalysis.Italsoanalysesthetechnologyofinformationhidinganalysisindigitalimages.Someanalysismethodsavailablenowarealsodiscussedindetail.KeywordsInformationhiding;Digitalwatermark;Steganography;Steganalysis297Vol.297ComputerEngineering20035May2003/TP39110003428(2003)07000103A11(DCT)3(1)(2)(3)6(1)(2)(3)(4)(5)(6)23(1)BMPPGMRASTIFF(2)GIFPNG(3)(JPEGWaveletFractalCompression)AndressWestfeldAndreasPfitzmann[2]256EzStegoLSBEzStegoS-ToolsSteganosJstegEzstegoPoVsPairsofValues01EzStegoJstegS-ToolsSteganosJessicaFridrichRQP(RawQuickPairs)[3]LSBGIFPNG30%50%JessicaFridrichLSB[4]LSBLSBLSBLSB334Yeuan-KuenLeeLing-HweiChenLSB[5](1)(2)kkk-10110TDPPWTDTDTD2,TDGuo-ShiangLinWen-NungLie[6]DCT90%HaryFarid[7]QMFs2FLDJPEGInternetJPEGJPEGNielsProvos,PeterHoneymanJPEG[8]JPEGJPEGJStegJSteg-ShellJPHideOutguess[2]x2DCTStegdetectCrawlStegBreakDistributedDictionaryAttack4StegdetectJPEGCrawlJPEGStegBreakJPEGStegBreakJessicaFridrichMiroslavGoljanRuiDuJPEG[9]JPEGJPEG88DCTQSS16JPEGnJPEGYsmailAvcybao[10]266(1)(2)(3)(4)(5)(6)31,,..:20012WestfeldA,PfitzmannA.AttacksonSteganographicSystems.InProcessingofInformationHiding,ThirdInternationalWorkshop,19993FridrichJ,DuR,MengL.SteganalysisofLSBEncodinginColorImages.Proc.IEEEInt'1Conf.MultimediaandExpo,CD-ROM,IEEEPress,Piscataway,NJ,20004FridrichJ,GoljanM,DuR.DetectingLSBSteganographyinColorandGray-scaleImages.MagazineofIEEEMultimediaSpecialIssueonSecurity,2001-10/11:22-285LeeYK,ChenLH.AnAdaptiveImageSteganographicModelBasedonMinimum-errorLSBReplacement.ProceedingsoftheNinthNationalConferenceonInformationSecurity,Taiwan,1999:8-156LinGS,LieWN.StudyonDetectingImageHidingByFeatureAnalysis.Proc.ofIEEEInternationalSymposiumonCircuitsandSystems,ISCAS-2001,Sydney,Australia,2001:149-1527FaridH.DetectingHiddenMessagesUsingHigher-orderStatisticalModels.InternationalConferenceonImageProcessing,Rochester,NY,20028ProvosN,HoneymanP.DetectingSteganographicContentontheInternet.TechnicalReportCITI01-1a,UniversityofMichigan,20019FridrichJ,GoljanM,DuR.SteganalysisBasedonJPEGCompatibility,SPIEMultimediaSystemsandApplicationsIV.SPIEPress,Bellingham,Wash.,200110YsmailAvcybao.ImageQualityStatisticsandTheirUseInSteganalysisandCompression.BoaziciUniversity,200111KelleyJ.TerrorGroupsHideBehindWebEncryption.