用户名: 密码: 验证码:
隐写与隐写分析算法及实践研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术作为信息安全技术的一个重要分支,已经历了十余年的发展,隐写术与隐写分析构成了信息隐藏技术中矛与盾的关系,相互制约,互为动力。本文以基于图像和音频的隐写与隐写分析技术,以及隐写分析技术的实用化为研究内容,提出了一种应用于音频的隐写算法和两种基于音频与图像的隐写分析算法,在隐写分析技术的实用化研究方面,针对网络隐蔽通信,设计并实现了实用的隐藏信息检测与监控系统。本文工作主要包括以下5个方面:
     1.提出了针对WAV音频LSB替换隐写的隐写分析算法。通过分析LSB替换机制中音频采样点值的值对转换规律,构造了值对转换概率模型,借鉴卡方检测、RS(Regular and Singular)检测、DIH(Differential Image Histogram)检测的原理,针对音频信号的特点对算法进行改进。实验表明,本文经过对算法的改进,实现了对基于8比特和16比特WAV音频的LSB替换隐写的可靠检测,对两种编码方式当嵌入率分别高于3%和20%时,对载密音频判决的正确率可达100%;
     2.提出了一种基于DCT域QIM(Quantization Index Modulation)的音频隐写算法。基于QIM原理,构造DCT域的QIM量化器,建立量化区间序号与嵌入信息比特的映射关系,根据映射关系完成信息的嵌入和提取,可实现盲提取,通过对提取误码的分析,采用改进的QIM方案,在嵌入端与提取端分别采取容错处理,提高了算法的鲁棒性。实验证明本文的隐写算法隐藏容量大,可达357.6b/s,并具有良好的不可感知性,同时对于MP3压缩、低通滤波、重采用、重量化等攻击具有很强的鲁棒性:
     3.提出了一种针对图像空间域LSB匹配隐写的隐写分析算法。通过分析目前常见的LSB匹配算法,构造了LSB匹配机制中像素值的转移概率模型,针对基于局部区域像素平滑度的LSB匹配算法,提出了一种基于区域相关性的检测算法,以8邻域内像素与中心像素的像素值差值定义区域内像素之间的相关性,通过分析该相关性在嵌入信息前后的差异实现对LSB匹配的检测。与已有算法相比,本文的检测算法复杂度低,运算简单,并且误检率低,当嵌入率高于0.3时检测结果具有较高的可靠性;
     4.设计并实现了针对网络多媒体数据的隐写检测与监控系统。通过对基于网络通信的隐蔽通信模型的研究,分别针对以互联网的多媒体信息和MMS(Multimedia Message Service)通信网中的MMS消息为载体的隐蔽通信,设计并实现了隐写检测与监控系统,并结合常见的隐写软件与实际的网络通信环境,给出两种监测系统的应用实例,应用实例说明上述系统可对网络环境下的隐蔽通信实施有效监测,对于MMS通信网络满足实时性要求;
     5.提出了针对常见的具有标识特征的隐写软件的隐藏信息提取方法。基于对常见的具有明显的标识特征的隐写软件的分析,提出实用的隐藏信息提取方法,对标识特征的研究不仅可以确定所使用的隐写软件,更重要的是,对于嵌入规律可知的软件可进一步确定隐藏信息的嵌入位置,进而实现提取,这对于隐写分析技术的实用化具有重要意义。
Through more than 10 years' development, information hiding technology has become an important academic branch of information security. Battles between steganography and steganalysis have become an important issue in information hiding, which makes steganography and steganalysis restricts mutually, and promote mutually. This thesis is focused on the techniques of steganography and steganalysis in images and audios, and the practical applications of steganalysis techniques. Two steganalysis algorithms and one steganography algorithm are presented. Based on the study of practical applications of detection techniques, the detection and monitoring system against covered communication over networks is designed and implemented. The main content of this thesis is summarized as follows:
     1. A steganalysis method of LSB replacement in wav audio is proposed. The probability model of switch rule between sample values is constructed based on the analysis of the LSB (Least Significant Bit) replacement scheme in wav audio. By adopting the methods of Povs detection, RS detection and DIH detection, and making improvements to these methods, the reliable detection to LSB replacement in wav is achieved. Experimental results show that the three algorithms can detect LSB replacement in 8-bit and 16-bit coded wav audio reliablely. When the embedding ratio of these two coding manners is above 3% and 20% respectively, the correct rate of stego-audio's judgments can reach 100%.
     2. Audio signal has more information redundancy than image signal, but its randomicity is stronger. It is more challenge to extract embedded bit with non-error from audio. A novel audio steganography based on QIM (Quantization Index Modulation) in the DCT (Discrete Cosine Transform) domain is proposed. The QIM quantizer is constructed on the basis of QIM principle. The message is embedded and extracted by the mapping between message bit and the quantizer's quantization interval. The extraction is executed blindly. The robustness of the hidden message is ensured well by the improved QIM, which employs the error-tolerance operation during embedding and extracting. The experimental results show that the capacity of the proposed method is large as 357.6b/s and good imperceptivity is achieved. The embedded message has good robustness against MP3 compression, requantization, resampling and lowpass filtering.
     3. Based on the probability model of switch rule between pixel values in LSB matching scheme, we propose a new steganalysis technique which aims at LSB matching embedding based on the image's smoothness in local area. The detection method defines the correlation between regional pixels as the difference between the sum of 8-neighbor pixel values and the center pixel. The existence of embedded message can be detected by observing the change of the regional correlation before and after embedding. Compared with the existing algorithms, the advantages of the proposed method includes simplicity, computational efficiency and low false positive rate. The detection achieves better reliability when embedding rate is above 30%.
     4. Aiming at secret communication contained in multimedia message over Internet and MMS (Multimedia Message Service) networks, the detection and monitoring system is designed and implemented on the basis of covered communication model over networks. Two instances of system's applications are illustrated in actual network communications environment with the help of typical steganography software. The instances explain the system's effectivity to monitor the secret message transfered over networks. Moreover, the system meets the real time requirement of MMS communication.
     5. The practical extraction of hidden information is proposed on the basis of the signatures of typical steganography tools. Many steganography tools may result in obvious identifications in stego-objects. By locating these identifications, not only the tools used to hide information can be found, but also it will be made sure where the hidden information is to those tools whose embedding rules are known. This makes the extraction of the hidden message become realizable, which is meaningful to the practicality of steganalysis techniques.
引文
[1].曲成义.信息安全面临的新挑战和安全技术发展的新趋势,信息网络安全,2008年1月,1:11-12.
    [2].方滨兴,殷丽华.关于信息安全定义的研究,信息网络安全,2008年1月,1:8-9.
    [3].Steganography:Why it Matters in a "Post 911" World.Available at:http://www.sans.org/rr/whitepapers/covert/676.php.
    [4].Stefan Katzenbeisser,Fabien A.P.Petitcolas编.吴秋新,钮心忻,杨义先,罗守山,杨晓兵译.信息隐藏技术--隐写术与数字水印.北京:人民邮电出版社,2001.
    [5].Ross J.Anderson ed.,Proceedings of the 1st International Workshop on Information Hiding.LNCS Vol.1174,Cambridge,U.K.,May 30-June 1,1996.
    [6].Petitcolas FAP,Anderson RJ,Kuhn MG.Information hiding -- a survey.In Proc.of the IEEE,Vol.87,No.7,1999,pp.1062-1078.
    [7].B.Pfitzmann.Information Hiding Terminology.Proc.First Int'l Workshop Information Hiding,LNCS Vo.1,No.174,Springer-Verlag,Berlin,1996,pp.347-356.
    [8].N.F.Jonson,Sushil Jajodia.Exploring Steganography:Seeing the Unseen.IEEE Computer,Feb.1998,pp.26-34.
    [9].钮心忻主编,信息隐藏与数字水印,北京:北京邮电大学出版社,2004年.
    [10].C.Kurak and J.McHugh.A cautionary note on image downgrading.In Proc.of the 8th IEEE Annual Computer Security Applications Conference,1992,pp.153-159.
    [11].C.Cachin.An Information-Theoretic Model for Steganography.In Proc.of 2nd International Workshop on Information Hiding,LCNS 1525,Springer-Verlag,1998,pp.306-318.
    [12].Miroslav Goljan.Lossless Data Embedding Methods for Digital Images and Detection of Steganography.PhD Dissertation.Binghamton University,State University of New York.2001.
    [13].Watermarking mailing list.http://www.watermarkingworld.org/faq.html.Design and Concept by Martin Kutter.
    [14].Jarno Mielikainen.LSB Matching Revisited.IEEE SIGNAL PROCESSING LETTERS,Vol.13,No.5,2006,pp.285-287.
    [15].陈铭,平西建.基于Arnold变换的图像信息伪装算法,计算机应用研究,第1期,2006年1月,pp.235-238.
    [16].陈铭,平西建.基于Arnold变换与改进LSB嵌入方案的信息伪装算法,计算机工程与应用,第28期,2005年,pp.37-40.
    [17].Eiji Kawaguchi,Richard O.Eason.Principle and applications of BPCS-Steganography.In Proc.of SPIE,Multimedia Systems and Application,Vol.3258,1998,pp.464-473.
    [18].HIOKI Hirohisa.A data embedding method using BPCS principle with new complexcity measures.In Proc.of Pacific Rim Workshop on Digital Steganography,Jul.2002,pp.30-47.
    [19].Jeremiah Spaulding,Hideki Noda,Mahdad N.Shirazi,Eij Kawaguchi.BPCS steganography using EZW lossy compressed images.Pattern Recognition Letters,Vol.:23,Issue:13,November 2002,pp.1579-1587.
    [20].Jeremiah Spaulding,Hideki Noda,Mahdad N.Shirzi etc.BPCS Steganography Using EZW Encoded Image.In Proc.of the Sixth Digital Image Computing Techniques and Applicaions Conference,Melbourne,Australia,January 21-22,2002,pp.157-162.
    [21].Hideki Noda,Jeremiah Spaulding,Eiji Kawaguchi etc.BPCS Steganography Combined with JPEG2000 Compression.In Proc.of Pacific Rim Workshop on Digital Steganography,Kitakyushu,July 11-12,2002,pp.98-107.
    [22].StegoDos - Black Wolf's Picture Encoder v0.90B.Available at:ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip.
    [23].H.Hastur."Mandelsteg",ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/steg.tar.z,1994.
    [24].R.Arachelian."White Noise Storm".ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/wns210.zip.1994.
    [25]. A. Brown, "S-Tools for Windows".ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip, 1996.
    [26]. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In Proc. of IEEE International Conference on Image Processing, Vol. 2, Austin,Texas, USA, 1994. pp. 86-90.
    [27]. T. Aura. Invisible Communication. EET 1995, Technical Report. Helsinki University of Technology, Finland, Nov. 1995.http://deadlock.hut.fi/ste/stehtml.html.
    [28]. Yeuan-Kuen Lee, Ling-Hwei Chen. An adaptive image steganographic model based on minimum-error LSB replacement. In Proc. of the Ninth National Conference on Information Security, Taichung, Taiwan, May 14-15,1999, pp.8-15
    [29]. Elke Franz. Steganography Preserving Statistical Properties. LNCS Vol. 2578,5th International Workshop on Information Hiding, Noordwijkerhout,Netherlands, October 7-9,2002.
    [30]. Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images, In Proc. of IH 2004, Fridrich J. ed., LNCS Vol. 3200, 2004, pp.97-115.
    [31]. Andreas Westfeld. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis. LNCS, Springer-Verlag, Vol. 2137, 2001, pp.289-302.
    [32]. Richard E. Newman, Ira S. Moskowitz, LiWu Chang etc. A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. LNCS Vol.2578, 5th International Workshop on Information Hiding, Noordwijkerhout,Netherlands, October 7-9,2002.
    [33]. Niels Provos. Defending Against Statistical Steganalysis. 10th USENIX Security Symposium. Washington, DC, August 2001.
    [34]. Jessica Fridrich. Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. In Proc. of IH 2004, Fridrich J. ed., LNCS, Vol. 3200, 2004, pp. 67-81.
    [35]. P. Sallee. Model Based Steganography. In T. Kalker, I.J. Cox, and Y.M. Ro,ed., In Proc. of 2nd International Workshop on Digital Watermarking, Seoul,Korea, October 2003, LNCS, Vol. 2939, Springer-Verlag, New York, 2004, pp.154-167.
    [36].P.Sallee.Model-based methods for steganography and steganalysis.International Journal of Image Graphics,Vol.5,No.1,2005,pp.167-190.
    [37].J.Fridrich,T.Pevny,and J.Kodovsky,.Statistically Undetectable JPEG Steganography:Dead Ends,Challenges,and Opportunities.In Proc.of ACM Multimedia and Security Workshop,Dallas,TX,September 20-21,2007.
    [38].J.Fridrich,M.Goljan,D.Soukal.Perturbed quantizationsteganography with wet paper codes.In Proc.of ACM Multimedia Security Workshop,Magdeburg,Germany,Sep.20-21,2004,pp.4-15.
    [39].Y.Kim,Z.Duric,and D.Richards.Modified matrix encoding technique for minimal distortion steganography.In N.Johnson and J.Camenisch ed.,In Proc.of 8th International Workshop on Information Hiding,LNCS,Vol.4437.Springer-Verlag,New York,2006.
    [40].Jan Kodovsky,Jessica Fridrich.Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain.In Proc.of SPIE,Electronic Imaging,Security,Forensics,Steganography,and Watermarking of Multimedia Contents X,San Jose,CA,January 28,2008.
    [41].Tomonori Furuta,Hideki Noda,Michiharu Niimi etc.BPCS Steganograp Integrated with 3-D SPIHT Video Compression.In Proc.of Pacific Rim Workshop on Digital Steganography,Kitakyushu,Japan,July 3-4,2003,pp.90-95.
    [42].张雷,一阶统计特征保持的信息伪装算法研究,郑州,解放军信息工程大学硕士学位论文,2004年6月.
    [43].L.M.Marvel,C.G.Boncelet,and C.T.Retter.Spread spectrum image steganography.IEEE Transactions on Image Processing,Vol.8,No.8,August 1999,pp.1075-1083.
    [44].I.J.Cox,J.Kilian,T.Leighton etc.Secure spread spectrum watermarking for multimedia.IEEE Transactions on Image Processing,Vol.6,No.12,1997,pp.1673-1687
    [45].Widadi,K.C.,Ainianta,P.H.,and Chan Choong Wah.Blind Steganography using Direct Sequence/Frequency Hopping Spread Spectrum Technique.In Proc.of 5th International Conference on Information,Communications and Signal Processing,Dec.2005,pp.1125-1129.
    [46].同鸣,刘晓军,郝重阳.基于混沌序列的音频信息隐藏方法研究,计算机工程与应用,第22期,2004年,pp.25-27.
    [47].Nedeljko Cvejic,Tapio Seppben.Increasing the capacity of LSB-based audio steganography.In Proc.of IEEE Workshop on Multimedia Signal Processing,Dec.2002,pp.336-338.
    [48].Cvejic,N.,Seppanen,T.Reduced distortion bit-modification for LSB audio steganography.In Proe.of 7th International Conference on Signal Processing,Vol.3,31 Aug.-4 Sept.2004,pp.2318-2321.
    [49].Hyen O Oh,Jong Won Seok,and Jin Woo Hong.New echo embedding technique for robust and imperceptible audio watermarking.In Proc.of IEEE International Conference on Acoustics,Speech,and Signal Processing,Vol.3,May 2001,pp.1341-1344.
    [50].Bin Yan,Sheng-He Sun,and Zhe-Ming Lu.Improved echo hiding using power cepstrum and simulated annealing based synchronization technique.In Proc.of International Conference on Machine Learning and Cybernetics,Vol.4,Nov.2003,pp.2142-2147.
    [51].杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现,中山大学学报(自然科学版),第43卷,2004年11月,pp.50-52.
    [52].赵朝阳,刘振华,王挺.数字音频信号的回声数据隐藏技术,计算机应用研究,第7期,2000年,pp.42-44.
    [53].Gui-jun Nian,Shu-xun Wang,Yun-lu Ge.Research of Improved Echo Data Hiding:Audio Watermarking Based on Reverberation.IEEE International Conference on Acoustics,Speech and Signal Processing,April 2007 Vol.2:Ⅱ-177-Ⅱ-180.
    [54].赵春晖,李富昌.一种DWT与DCT结合的盲音频水印算法,电子与信息学报,第25卷,第11期,2003年11月,pp.1570-1574.
    [55].胡金艳,张太镒,陆从德等.一种基于神经网络的小波域音频水印算法,西安交通大学学报,第37卷,第4期,2003年4月,pp.355-358.
    [56].高海英,钮心忻,杨义先.基于量化的小波域自同步数字音频水印算法,北京邮电大学学报,第28卷,第6期,2005年12月,pp.102-105.
    [57].王秋生,孙圣和.基于量化数字音频信号频域参数的水印嵌入算法,声学 学报,第27卷,第4期,2002年7月,pp.379-385.
    [58].王向阳,杨红颖,赵红.一种新的自适应量化数字音频水印算法,声学学报,第23卷,第2期,2004年6月,pp.117-127.
    [59].Litao Gang,Akansu A.N.,and Ramkumar,M.MP3 resistant oblivious steganography.In Proc.of IEEE International Conference on Acoustics,Speech,and Signal Processing,Vol.3,May 2001,pp.1365-1368.
    [60].Bao,P.,Xiaohu Ma.MP3-resistant music steganography based on dynamic range transform.Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems,Nov.2004,pp.266-271.
    [61].Xiaoxiao Dong,Bocko M.F.,and Ignjatovic Z.Data hiding via phase manipulation of audio signals.In Proc.of IEEE International Conference on Acoustics,Speech,and Signal Processing,Vol.5,17-21 May 2004,pp.V-377-80.
    [62].Kirovski D.,Malvar H.Robust spread-spectrum audio watermarking.In Proc.of IEEE International Conference on Acoustics,Speech,and Signal Processing,Vol.3,7-11 May 2001,pp.1345-1348.
    [63].Kirovski D.,Malvar H.Spread-spectrum audio watermarking requirements applications and limitations.In Proc.of IEEE 4th Workshop on Multimedia Signal Processing,Oct.2001,pp.219-224.
    [64].Kirovski D.,Malvar H.Spread-spectrum watermarking of audio signals.IEEE Transactions on Signal Processing,Volume 51,Issue 4,April 2003,pp.1020-1033.
    [65].Neil F.Johnson,Sushil Jajodia.Steganalysis of Images Created Using Current Steganography Software.In Proc.of 2nd Information Hiding Workshop.LNCS vol.1525.Springer-Verlag,1998.
    [66].Faisal T.Alturki,Russell M.Mersereau.Secure image transform domain technique for steganographic applications.In Proceedings of SPIE,Security and Watermarking of Multimedia Contents Ⅲ,Vol.4314,2001,pp.300-308.
    [67].S.Voloshynovskiy,T.Pun.Capacity-security analysis of data hiding technologies.In Proc.of IEEE Int.Conf.on Multimedia and Expo,ICME 2002,Lausanne,Switzerland,August 26-29,2002.
    [68].R.Chandramouli,N.D.Memon.Steganography capacity:A steganalysis perspective.In Proc.of SPIE Security and Watermarking of Multimedia Contents V,2003.
    [69].S.Voloshynovskiy,O.Koval,F.Deguillaume etc.Data Hiding Capacity Analysis for Real Images Based on Stochastic Non-stationary Geometrical Models.In SPIE Photonics West,Electronic Imaging 2003,Security and Watermarking of Multimedia Contents V,Santa Clara,CA,USA,January 20-24,2003.
    [70].Westfeld A,Pfitzmann A.Attacks on steganographic systems.In:Pfitzmann A ed.Proc.of 3rd International Workshop on Information Hiding,Lecture Notes on Computer Science 1768,Berlin:Springer-Verlag,1999,pp.61-76.
    [71].Jessica Fridrich,Miroslav Goljan,Rui Du.Detecting LSB Steganography in Color and Gray-Scale Images.IEEE Multimedia and Security,2001,8(4):22-28.
    [72].Jessica Fridrich,Miroslav Goljan,Rui Du.Reliable Detection of LSB Steganography in Color and Grayscale Images.In Proc.of ACM Workshop on Multimedia and Security,2001,pp.27-30.
    [73].Sorina Dumitrescu,Xiaolin Wu,and Zhe Wang.Detection of LSB Steganography via Sample Pair Analysis.IEEE Transactions on Signal Processing,Vol.51,No.7,July 2003.pp.1995-2007.
    [74].S.Dumitrescu,Xiaolin Wu,Nasir Memon.On steganalysis of random LSB embedding in continuous-tone images.Proc.of IEEE ICIP 2002,Vol Ⅲ,New York,USA,Sep.22-25,2002,pp.641-644.
    [75].张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测,软件学报,第15卷,第1期,2004年4月,pp.151-158.
    [76].Tao Zhang,Xijian Ping.Reliable detection of LSB steganography based on the difference image histogram.In Proc.of IEEE International Conference on Acoustics,Speech,and Signal Processing,Vol.3,6-10 April 2003,pp.Ⅲ-545-8.
    [77].Ismail Avclbas,Nasir Memon,and Bülent Sankur.Steganalysis Using Image Quality Metries.IEEE Transactions on Image Processing,Vol.12,No.2,Feb.2003,pp.2221-229.
    [78].Jiri Fridrich,Rui Du,Meng Long.Steganalysis of LSB Encoding in Color Images. In Proc. of IEEE International Conference on Multimedia and Expo (ICME), NY, USA, 30 July - 2 August 2000, pp.1279-1282.
    [79]. Jessica Fridrich, Miroslav Goljan, Rui Du. Steganalysis Based on JPEG Compatibility. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia System and Applications IV, Denver, CO, August 20-24,2001, pp.275-280.
    [80]. Jessica Fridrich, Miroslav Goljan, Dorin Hogea. Steganalysis of JPEG Images: Breaking the F5 Algorithm. In Proc. of 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002.
    [81]. Jessica Fridrich, Miroslav Goljan, Dorin Hogea. New methodology for breaking steganographic techniques for JPEGs. In Proc. of EI SPEI Santa Clara, Security and Watermarking of Multimedia Contents V, CA, Jan 2003.
    [82]. Tao Zhang, Xijian Ping. A New Approach to Reliable Detection of LSB Steganography in Natural Images. Signal Processing, Elsevier Science, Vol.83, No. 10, 2003, pp. 2085-2093.
    [83]. Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images. In Proc. of 4th International Workshop on Information Hiding, LNCS 3727,2004,pp.97-115.
    [84]. Xiangyang Luo, Bin Liu, Fenlin Liu. Detecting LSB Steganography Based on Dynamic Masks. In Proc. of the 5th International Conference on Intelligent Systems Design and Applications (ISDA'05), 2005.
    [85]. Xiangyang Luo, Qingxian Wang, Chunfang Yang, Fenlin Liu. Detection of LTSB Steganography Based on Quartic Equation. In Proc. of the 8th International Conference on Advanced Communication Technology.Feb.20-22, 2006, pp.1199 - 1204.
    [86]. Peizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen. An Improved Sample Pairs Method for Detection of LSB Embedding. In Proc. of 4th International Workshop on Information Hiding, LNCS Vol. 3200, 2004, pp.116-127.
    [87]. Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement. In Proc. of 5th International Workshop on Information Hiding,2005, pp.296-311.
    [88]. Tao Zhang, Yan Zhang, Xijian Ping. Detection of LSB Steganography based on Image Smoothness.In Proc.of IEEE International Conference on Multimedia and Expo,July 2006,pp.377-1380.
    [89].张涛,平西建,徐长勇.基于图像平滑度的空域LSB嵌入的检测算法,计算机辅助设计与图形学学报,第18卷,第101期,2006年,pp.1607-1612.
    [90].N.Provos,P.Honeyman.Detecting Steganographic Content on the Internet.ISOC NDSS'02,San Diego,CA,February 2002.
    [91].张新鹏,王朔中.对空域BPCS密写的统计分析,计算机辅助设计与图形学学报,第18卷,第7期,2005年7月,pp.1625-1629.
    [92].A.Westfeld.Detecting low embedding rates.In Proc.of 5th International Workshop on Information Hiding,Springer LNCS,vol.2578,Noordwijkerhout,The Netherlands,2002,pp.324-339.
    [93].A.Ker.Resampling and the detection of LSB matching in color bitmaps.In Proc.of Security,steganography,and watermarking of multimedia contents Ⅶ,SPIE Vol.5681,January,2005,San Jose,California,USA,pp.1-15.
    [94].A.Ker.Steganalysis of LSB matching in grayscale images.IEEE Signal Processing Letters,Volume 12,Issue 6,June 2005,pp.441-444.
    [95].Taras Holotyak,Jessica Fridrich,and David Soukal.Stochastic approach to secret message length estimation in ±k embedding steganography,In Proc.of Security,steganography,and watermarking of multimedia contents Ⅶ,SPIE Vol.5681,January,2005,San Jose,California,USA,pp.673-684.
    [96].Qingzhong Liu,A.H.Sung,Sung,A.H.,Ribeiro,B.M.Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography.In Proc.of 18th International Conference on Pattem Recognition,Volume 2,2006,pp.267-270.
    [97].Qingzhong Liu,Andrew H.Sung,Jianyun Xu.Resampling operations as features for detecting LSB replacement and LSB matching in color images.In Proc.of MRCS 2006,In Gunsel et al.(Eds.),LNCS Vol.4105,Berlin Heidelberg,2006,pp.249-256.
    [98].Qingzhong Liu,Andrew H.Sung,Zhongxue Chen.Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images.Pattern Recognition,Vol.41,No.1,2008,pp.56-66.
    [99]. Wu MY, Ho YK, Lee J H. An iterative method of palette-based image steganography. Pattern Recognition Letters, Vol. 25,2004, pp.301-309.
    [100]. Brisbane G., Safavi-Naini R., Ogunbona P. High-capacity steganography using a shared colour palette. In Proc. of IEE Vision, Image and Signal Processing, Volume 152, Issue 6, Dec. 2005, pp.787-792.
    [101]. Fridrich J, Rui D. Secure steganographic methods for palette images. Lecture Notes in Computer Science, Vol. 1768,2000, pp. 47-60.
    [102]. Jessica Fridrich, Miroslav Goljan, David Soukal. Higher-order statistical steganalysis of palette images. In Proc. of EI SPIE Santa Clara,2003:178-190.
    [103]. Shi Y.Q., Chunhua Chen, Wen Chen. Effect of Recompression on Attacking JPEG Steganographic Schemes - An Experimental Study. In Proc. of IEEE International Symposium on Circuits and Systems, May 2007 pp. 1265-1268.
    [104].Guorong Xuan, Xia Cui, Shi Y.Q. JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. In Proc. of IEEE International Conference on Multimedia and Expo, July 2007,pp. 903-906.
    [105]. Gul G., Dirik A.E., Avcibas I. Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters,Volume 14, Issue 3, March 2007, pp. 205-208.
    [106]. Ismail Avcibas, Nasir Memon and Bulent Sankur. Steganalysis Using Image Quality Metrics. IEEE Transactions on Image Processing, Vol. 12, No. 2, Feb.2003,pp.2221-229.
    [107].Siwei Lyu, Hany Farid. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. LNCS Vol. 2578, 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands,October 7-9,2002.
    [108]. Ismail Avcibas. Audio Steganalysis With Content-Independent Distortion Measures. IEEE Signal Processing Letters, Vol. 13, No. 2, Feb. 2006,pp.92-95.
    [109]. Johnson M.K., Lyu S., and FaridH. Steganalysis of Recorded Speech. In Proc.of Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE San Jose, Vol. 5681, CA, USA, Mar.2005, pp.664-672.
    [110].Geetha S., Sivatha Sindhu, Gobi S. Evolving GA Classifiler for Audio Steganalysis based on Audio Quality Metrics. In Proc. of Fourth International Conference on Intelligent Sensing and Information Processing, Oct.l5-Dec.18,2006, pp. 105-108.
    [111].Ismail Avcibas. Audio steganalysis with content-independent distortion measures, IEEE signal processing letters, Vol. 13, No. 2, 2006, pp.92-95.
    [112]. S. Geetha, Siva S., A. Kannan. StegoBreaker: Audio Steganalysis using Ensemble Autonomous Multi-Agent and Genetic Algorithm. In Proc. of Annual India Conference, 2006, pp.1-6.
    [113]. Brian Chen, Gregory W. Wornell. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE TRANSACTION ON INFORMATION THEORY, Vol. 47,No. 4, MAY 2001, pp.1423-1443.
    [114].Solanki K., Sullivan K., Madhow U.etc. Statistical restoration for robust and secure steganography. In Proc. of 2005 IEEE International Conference on Image Processing, Vol. 2, Sept. 2005 Page(s): II-1118-21.
    [115].Shterev I.D., Lagendijk R.L. Amplitude Scale Estimation for Quantization-Based Watermarking. IEEE Transactions on Signal Processing,Volume 54, Issue 11, Nov. 2006, Page(s):4146 - 4155.
    [116].Hogan M.T., Balado F., Silvestre, G.C.M. etc. Secure and robust steganography using side information at the encoder. In Proc. of IEE Proceedings Information Security, Vol. 153, Issue 3, Sept. 2006, Page(s):87-95.
    [117].Yi-Wen Liu, Smith J.O. Watermarking sinusoidal audio representations by quantization index modulation in multiple frequencies. In Proc. of 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume 5, May 2004, Page(s):V - 373-376.
    [118].Soroosh Rezazadeh, Ali RafieiA. Secure Quantization-Based Watermarking Scheme Using An Improved Statistical Model in the WAVelet Domain. In Proc. of International Conference on Information and Communication Technology, 7-9 March 2007, Dhaka, Bangladesh, pp.242-245.
    [119]. 2005.Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain
    [120]. Jun Zhang, Cox I.J., Doerr G. Steganalysis for LSB Matching in Images with High-frequency Noise. In Proc. of IEEE 9th Workshop on Multimedia Signal Processing, 1-3 Oct. 2007, Page(s):385 - 388.
    [121]. M Goljan, J Fridrich, T Holotyak. New blind steganalysis and its implications. In Proc.of SPIE Electronic Imaging, Photonics West, January 2006.
    [122]. L Marvel, B Henz, C Boncelet. A Performance Study of ±1 Steganalysis Employing a Realistic Operating Scenario. In Proc. of IEEE Military Communications Conference, 2007.
    [123]. Niels Provos, "StegDetect". available at http://www.outguess.org/detection.php, 2004.
    [124].WAPTM MMS Architecture Overview, Version 25-April-2001, available at http://www.wapforum.org/.
    [125].WAPTM MMS Client Transactions, Version 15-Jan-2002, available at http://www.wapforum.org/.
    [126]. Wireless Application Protocol MMS Encapsulation Protocol, Version05-Jan-2002, available at http://www.wapforum.org/.
    [127]. Digital Image Steganographyand Digital Watermarking Tool Table, Collected by Neil F. Johnson. http://www.jjtc.com/Steganography/toolmatrix.htm.
    [128]. Hide and Seek v4.1, available at http://cypherpunks/steganography/hdsk41b.zip.
    [129]. Michael Bauer, AppendX v0.4, available at http://www.unet.univie.ac.at/~a9900470/appendX/.
    [130]. Frederic Peters, JpegX 2.1.1 available at www.geocities.com/free2all4free/free-jpgx.htm.
    [131]. FredericPeterS,Camouflagevl .2.1 ,availableat http://camouflage.unfiction.com/
    
    [132]. Steganography 1.50, available at http://www.pipisoft.com/.
    [133]. Masker 7.0.5.4, available at http://www.softpuls.com/masker/.
    [134]. Invisible Secrets 4 (TM), Version 4.0.6 August 30, 2003, available at www.neobytesolutions.com

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700