共查询到18条相似文献,搜索用时 248 毫秒
1.
2.
为了能够对掩密后图像进行有效的检测,首先从分类特征维数、单个特征的有效性和特征相关性等3个方面对Farid泛盲掩密分析算法的缺陷进行了分析,然后提出了采用主成分分析技术对分类特征进行降维处理的方法。并基于RBF(radial basis function)网络构造了新的泛盲掩密分析方案。该方案不但大大降低了用于分类的图像特征的维数,而且提高了掩密分析的检测性能。利用该方案和Farid的方案分别对用JSteg等软件掩密后的图像进行的检测比较实验表明。经主成分分析预处理后。该方案的样本集特征矢量维数比Farid方案分别减少了174(Jsteg)维、163(EzStego)维和180(S-Tools)维,而特征数目的减少又大大简化了分类器的设计。而且。该方案能够有效检测嵌入消息占可嵌容量的比例达60%(Jsteg)、80%(EzStego)、50%(S-Tools)以上的掩密图像。并获得了比Farid算法更高的检测率。 相似文献
3.
4.
5.
6.
马丁 《网络安全技术与应用》2007,(6):36-37
本文简单介绍了掩密技术,提出基于DCT变换的掩密框架,并详细讨论了一种以JPEG格式的图像为信息载体的基于DCT的掩密算法,提高了掩密信息的安全保密性,大大改善了空域掩密算法的脆弱性问题,结果显示该算法可有效的实现信息的安全传输。 相似文献
7.
由于通过RS统计分析和Chi—square统计分析,可以察觉以LSB方法密写的秘密信息的存在,因此为提高密写方案的安全性,提出了一种改进的LSB密写方案,即如果被嵌入的秘密比特与原始灰度的最低位相同,便不作改动;否则根据周围像素作增1或减1的调整,而在接收方,只需将载体图象的最低位取出即可恢复秘密信息.大量图象的模拟实验结果说明,该方案不仅可以抵抗RS分析和Chi—square分析,而且不增加失真度.并可保持计算量小、提取方便的优点.并表明改进方案对抵抗这两种密写分析是有效的. 相似文献
8.
9.
本文提出了一种新的LSB掩密算法。该算法采用基于线性同余算法的伪随机数发生器生成掩密和提取所需的密钥,通过该密钥在GIF图像中随机选取所要嵌入信息的位置来实现秘密信息比特的嵌入。实验结果表明该掩密算法可有效地抵御可视攻击和χ^2攻击。 相似文献
10.
基于Arnold变换与改进LSB嵌入方案的信息伪装算法 总被引:4,自引:0,他引:4
文章提出了一种基于二维Arnold变换与改进LSB嵌入方案的图像信息伪装算法,在对图像进行二维Arnold变换的基础上,采用改进的LSB嵌入方案嵌入数据,提取时只需提取Arnold变换图像的LSB即可。该算法结合了图像置乱技术和改进的LSB嵌入方案,对嵌入的数据形成了双层保护。实验结果表明,该算法的数据嵌入量及失真度与传统的LSB嵌入方式一致,同时能够有效地抵抗RS(RegularSingular)和SPA(SamplePairAnalysis)隐写分析,并保持了图像的直方图统计特征,此外,该方法适用于灰度图像和彩色图像,易于实现。 相似文献
11.
12.
一种改进的LSB音频信息隐藏算法。该算法首先将音频信号分帧,选择了能量相对较大的帧进行嵌入;另一方面,在进行LSB嵌入时,采用的嵌入算法能够扰乱传统LSB算法所导致的对称性,破坏了统计检测的基础。 相似文献
13.
一种改进的LSB音频信息隐藏算法。该算法首先将音频信号分帧,选择了能量相对较大的帧进行嵌入;另一方面,在进行LSB嵌入时,采用的嵌入算法能够扰乱传统LSB算法所导致的对称性,破坏了统计检测的基础。 相似文献
14.
15.
16.
为减少汉明纠错译码时出现的错误,以减少错纠和乱纠的可能和提高恢复图像的质量,提出了一种改进的基于汉明纠错码的图像恢复算法。该算法首先将灰度图像的最高位平面(MSB)分成4大块;然后再将每大块分成4小块,并进行小块的垂直对调,同时对处理后的4大块中相同像素位置处的二进制位进行(7,4)汉明编码;最后将产生的3个监督位平面各自进行大块内小块的对角对调,再将处理后的3个大块按监督位顺序依次嵌入到原始图像的前面3大块的对应像素的最低位(LSB)。第2重要位平面(2MSB)和第3重要位平面(3MSB)也进行同样处理,并分别嵌入到次低位(2LSB)和再次低位(3LSB)。实验结果表明,该改进方法比原方法在剪切、替换、均值和中值滤波以及JPEG有损压缩情况下,可取得更好的图像恢复效果,且恢复算法带来的噪声大大减少。 相似文献
17.
One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such
as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we
aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm
called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to
notice that some text has been hidden in the original cover image.
As most of the researchers and practitioners in security field argue, stenographic techniques alone are not sufficient for protecting sensitive information and thus must be used together with encryption algorithms. Therefore, the proposed approach integrates E-LSB with an encryption algorithm. E-LSB does not modify the file size and allows the flexibility of choosing one of well-known encryption algorithms including RSA, AES and CAESAR, but others can be implemented in it. With a set of experiments, the proposed approach is compared with the traditional LSB based embedding approach, and its efficiency and usability is analyzed. A set of performance evaluations realized with the developed software tool based on E-LSB algorithm show that E-LSB is better than the traditional LSB algorithm from security point of view. 相似文献
As most of the researchers and practitioners in security field argue, stenographic techniques alone are not sufficient for protecting sensitive information and thus must be used together with encryption algorithms. Therefore, the proposed approach integrates E-LSB with an encryption algorithm. E-LSB does not modify the file size and allows the flexibility of choosing one of well-known encryption algorithms including RSA, AES and CAESAR, but others can be implemented in it. With a set of experiments, the proposed approach is compared with the traditional LSB based embedding approach, and its efficiency and usability is analyzed. A set of performance evaluations realized with the developed software tool based on E-LSB algorithm show that E-LSB is better than the traditional LSB algorithm from security point of view. 相似文献