X,,,(,510275):,,,,,3,,:;;;;:TP391:A:052926579(2004)0620093204,,,,,,,,,10Internet,,,Internet[1],,,,,,,,,,,1111:S=S+f(S,M)(1)SS,MSMM,,;,,,,X:2004-08-30:(60172067):(1977),,,;:,;E-mail:isshjw@zsu1edu1cn436200411()ACTASCIENTIARUMNATURALIUMUNIVERSITATISSUNYATSENIVol143No16Nov12004,,,,,,112P,,4:1ROCFig11DetectorROCplane,,,1(detectorpsreceiveroperatingcharacteristic,ROC),=P(|);,=P(|),,=1-=P(|),Pr=1-Pe,Pe:Pe=(1-)P()+P()=P()+P()(2)=(,)145,50%,,,85%,,,,,,,1132,2Fig12Generalprototypesystemofimagesteganalysis,,,;,,,,,,,,,49()432211,LSB,EzStegoS-ToolsStashSteghideGifshuffleStaganoBPCS,Westfeld[2]Chi-square,,Fridrich[3]RS(regulargroupsandsingulargroups),LSB,Dumitrescu[4]RS4,,,,[5]LSB,RS,,,DCT,JStegJsteg-ShellJPHideF5OutguessMB,Westfeld[2]Chi-squareJstegJPEG,Fridrich[6]DCT,F510%,Fridrich[7]Outguess,Outguess,DCTPDCTDCT,DCT,,DWT,ShaohuiLiu[8]DWTQIM,DFT,90%DWT212,Avcibas[9]IQMps(imagequalitymetrics),,,,Farid[10]QFM,Fisher,DCT,OutGuess,,,,,3,,596:,,,,,,,,:;;;,,,:[1]KELLEYJ.TerrorgroupshidebehindWebencryption[N].USAToday,Feb.2001,http:PP[2]WESTFELDA,PFITZMANNA.Attacksonsteganographicsystems[C].Proc.3rdIntplWorkshopinInformationHiding.SpringerVerlag,1999:61-76.[3]FRIDRICHJ,GOLJANM,DUR.ReliabledetectionofLSBsteganographyingrayscaleandcolorimages[C].Proc.ACM,SpecialSessiononMultimediaSecurityandWatermarking.OttawaCA,2001:27-30.[4]DUMITRESCUS,WUXL,WANGZ.DetectionofLSBsteganographyviasamplepairanalysis[J].IEEETransactionsonSignalProcessing,2003,51(7):1995-2007.[5],.LSB[J]..2004,15(1):151-158.[6]FRIDRICHJ,GOLJANM,HOGEAD.SteganalysisofJPEGimages:breakingtheF5algorithm[J].5thInformationHidingWorkshop.NoordwijkerhoutNetherlands,2002:10-323.[7]FRIDRICHJ,GOLJANM,HOGEAD.AttackingtheOutGuess[C].Proc.ACMWorkshopMultimediaandSecurity.Juan-les-Pins,France,2002.[8]LIUSH,YAOHX,GAOW.Steganalysisofdatahidingtechniquesinwaveletdomain[C].InternationalConferenceonInformationTechnology:CodingComputing,ITCC.LasVegasUSA,2004(1):751-754.[9]AVCIBASI,MEMONN,SANKURB.Steganalysisusingimagequalitymetrics[J].IEEETransactionsonImageProcessing,2003,12(2):221-229.[10]LYUS,FARIDH.Steganalysisusingcolorwaveletstatisticsandone-classsupportvectormachines[C].SPIESymposiumonElectronicImaging.SanJoseCA,2004.SteganalysisPrinciple,ActualityandProspectLIANGXiao-ping,HEJun-hui,LIJian-qian,HUANGJi-wu(DepartmentofElectronicsandCommunicationEngineering,SunYat-senUniversity,Guangzhou510275,China)Abstract:Informationhidinghasbecometheforefrontofinformationsecurityandmultimediaimageprocessing.Steganographyandsteganalysisareimportantresearchcontentofinformationhiding.Steganalysisprinciple,givesfourestimatedvaluesforsteganalysismethodandgeneralprototypesystemofimagesteganalysisbasedontypesofsteganalysisfromtheviewofwardenareintroduced.Methodsofsteganalysisresearchhomeandabroadaredividedintotwotypes,specialanduniversalsteganalysis.Researchactualityofeithertypeispresentedandrepresentativemethodsofeithertypeareevaluated.Threemainproblemsexistedinsteganalysisarediscussed,futuredirectioninsteganalysisdevelopmentispointedout,andprospectofsteganalysisisexpected.Keywords:informationsecurity;multimediasignalprocessing;informationhiding;steganography;steganalysis69()43