Computer Science ›› 2014, Vol. 41 ›› Issue (7): 206-209.doi: 10.11896/j.issn.1002-137X.2014.07.043

Previous Articles     Next Articles

Game Analysis on Statistical Characteristics Preserving Steganography

GAO Zhan-zhan,TANG Guang-ming and ZHANG Wei-wei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to analyze security of statistical characteristics preserving steganography,two game models were established.They are different in strategies.One takes feature subsets as its strategies while the other’s strategies are steganography or steganalysis algorithms.In these two game models,payoff is the detection rate of steganalysis,and the divergence between feature subsets of two confrontation sides is used to reflect steganography algorithm's ability to resist statistical analysis.By equilibrium analysis on the models,optimal strategies to improve steganography system security were given in each case,and the expected payoff in equilibrium situations was also proposed.

Key words: Steganography,Statistical characteristics preserving,Game analysis,Security

[1] 奚玲,平西建,张涛.基于相邻灰度值互补嵌入的LSB匹配隐写改进算法[J].计算机科学,2010,37(9):101-104
[2] Agaian S S,Sifuentes R R.Adaptive Steganography with In-creased Embedding Capacity for New Generation of Steganographic Systems [C]∥Proc of SPIE-IS&T Electronic Imaging.Bellingham:SPIE Press,2005:257-268
[3] Lou D C,Wu N I,Wang C M,et al.A Novel adaptive steganography based on local complexity and human vision sensitivity[J].Journal of Systems and Software,2010,83(7):1236-1248
[4] 张湛,刘光杰,戴跃伟,等.基于隐写编码和Markov模型的自适应图像隐写算法[J].计算机研究与发展,2012,49(8):1668-1675
[5] Filler T,Fridrich J.Design of Adaptive Steganographic Schemes for Digital Images[C]∥Proc of Media Watermarking,Security,and Forensics III.Bellingham:SPIE Press,2011,7880:1-14
[6] Kodovsky J,Holub V.On Dangers of Overtraining Steganography to Incomplete Cover Model[C]∥Proc of ACM Multimedia & Security Workshop.New York:ACM Press,2011:69-76
[7] Kodovsky J,Fridrich J.Steganalysis of JPEG Images Using Rich Model[C]∥Proc of Media Watermarking,Security,and Forensics XIV.Bellingham:SPIE Press,2012,8303:1-13
[8] Fridrich J,Pevny T,Kodovsky J.Statistically UndetectableJPEG Stenanography:Dead Ends,Challenges,and Opportunities[C]∥Proc of the 9th ACM Multimedia & Security Workshop.New York:ACM Press,2007:3-14
[9] 刘春庆,李忠新,王执铨.隐秘通信系统的对策论模型[J].通信学报,2004,25(5):160-165
[10] 刘光杰,戴跃伟,赵玉鑫,等.隐写对抗的博弈论建模[J].南京理工大学学报:自然科学版,2008,32(2):199-204
[11] Schottle P,Bohme R.A Game-Theoretic Approach to Content-Adaptive Steganography[C]∥Proc of Inforamtion Hiding.Berlin:Springer-Verlag,2012:125-141
[12] Fridrich J,Goljan M.Practical Steganalysis of Digital images:State of the Art[C]∥Proc of SPIE Photonics Imaging 2002,Security and Watermarking of Multimedia Contents IV.Bellingham:SPIE Press,2002,4675:1-13
[13] Pevny T,Bas P,Fridrich J.Steganalysis by Subtracting PixelAdjacency Matrix[J].IEEE Transactions on Information Forensics Security,2010,5(2):215-224
[14] Nash J.Equilibrium Points in n-Person Games[J].Proceedings of the National Academy of Sciences of the United States of America,1950,36:48-49
[15] Kodovsky J,Fridrich J.On Completeness of Feature Spaces in Blind Steganalysis[C]∥Proc of the 10th ACM Multimedia & Security Workshop.New York:ACM Press,2008:123-132
[16] Lyu S,Farid H.Steganalysis Using Higher-Order Image Statistics[J].IEEE Transactions on Information Forensics and Security,2006,1(1):111-119
[17] Orsdemir A,Altun H O,Sharna G,et al.Steganalysis Aware Steganography:Statistical Indistinguishability Despite High Distortion [C]∥Proc of Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.Bellingham:SPIE Press,2008,6819:9-18
[18] Schaefer G,Stich M.UCID:An Uncompressed Color Image Database [C]∥Proc of SPIE Electronic Imaging,Storage and Retrieval Methods and Applications for Multimedia.Bellingham:SPIE Press,2003,5307:472-480
[19] 陈园园,朱孝成,叶甬渝.一种改进的DCT信息隐藏算法[J].重庆理工大学学报:自然科学版,2011,25(12):100-105

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!