计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 206-209.doi: 10.11896/j.issn.1002-137X.2014.07.043

• 信息安全 • 上一篇    下一篇

特征保持隐写的博弈分析

高瞻瞻,汤光明,张伟伟   

  1. 解放军信息工程大学 郑州450001;解放军信息工程大学 郑州450001;解放军信息工程大学 郑州450001
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61101112),河南省科技攻关项目(122102210047)资助

Game Analysis on Statistical Characteristics Preserving Steganography

GAO Zhan-zhan,TANG Guang-ming and ZHANG Wei-wei   

  • Online:2018-11-14 Published:2018-11-14

摘要: 为了分析基于统计特征保持的隐写算法的安全性,将隐写对抗分为以特征子集作为策略和以隐写、隐写分析算法作为策略两种情况建立了两种隐写博弈模型。模型将隐写分析方的检测率作为支付函数,用隐写对抗双方特征子集间的差异反映算法抗统计分析的能力。通过对模型进行均衡分析,给出了各种情况下基于统计特征保持的方式提高隐写系统安全性的最优策略,并得到了均衡局势下的期望支付。

关键词: 隐写,统计特征保持,博弈分析,安全性 中图法分类号TP309文献标识码A

Abstract: In order to analyze security of statistical characteristics preserving steganography,two game models were established.They are different in strategies.One takes feature subsets as its strategies while the other’s strategies are steganography or steganalysis algorithms.In these two game models,payoff is the detection rate of steganalysis,and the divergence between feature subsets of two confrontation sides is used to reflect steganography algorithm's ability to resist statistical analysis.By equilibrium analysis on the models,optimal strategies to improve steganography system security were given in each case,and the expected payoff in equilibrium situations was also proposed.

Key words: Steganography,Statistical characteristics preserving,Game analysis,Security

[1] 奚玲,平西建,张涛.基于相邻灰度值互补嵌入的LSB匹配隐写改进算法[J].计算机科学,2010,37(9):101-104
[2] Agaian S S,Sifuentes R R.Adaptive Steganography with In-creased Embedding Capacity for New Generation of Steganographic Systems [C]∥Proc of SPIE-IS&T Electronic Imaging.Bellingham:SPIE Press,2005:257-268
[3] Lou D C,Wu N I,Wang C M,et al.A Novel adaptive steganography based on local complexity and human vision sensitivity[J].Journal of Systems and Software,2010,83(7):1236-1248
[4] 张湛,刘光杰,戴跃伟,等.基于隐写编码和Markov模型的自适应图像隐写算法[J].计算机研究与发展,2012,49(8):1668-1675
[5] Filler T,Fridrich J.Design of Adaptive Steganographic Schemes for Digital Images[C]∥Proc of Media Watermarking,Security,and Forensics III.Bellingham:SPIE Press,2011,7880:1-14
[6] Kodovsky J,Holub V.On Dangers of Overtraining Steganography to Incomplete Cover Model[C]∥Proc of ACM Multimedia & Security Workshop.New York:ACM Press,2011:69-76
[7] Kodovsky J,Fridrich J.Steganalysis of JPEG Images Using Rich Model[C]∥Proc of Media Watermarking,Security,and Forensics XIV.Bellingham:SPIE Press,2012,8303:1-13
[8] Fridrich J,Pevny T,Kodovsky J.Statistically UndetectableJPEG Stenanography:Dead Ends,Challenges,and Opportunities[C]∥Proc of the 9th ACM Multimedia & Security Workshop.New York:ACM Press,2007:3-14
[9] 刘春庆,李忠新,王执铨.隐秘通信系统的对策论模型[J].通信学报,2004,25(5):160-165
[10] 刘光杰,戴跃伟,赵玉鑫,等.隐写对抗的博弈论建模[J].南京理工大学学报:自然科学版,2008,32(2):199-204
[11] Schottle P,Bohme R.A Game-Theoretic Approach to Content-Adaptive Steganography[C]∥Proc of Inforamtion Hiding.Berlin:Springer-Verlag,2012:125-141
[12] Fridrich J,Goljan M.Practical Steganalysis of Digital images:State of the Art[C]∥Proc of SPIE Photonics Imaging 2002,Security and Watermarking of Multimedia Contents IV.Bellingham:SPIE Press,2002,4675:1-13
[13] Pevny T,Bas P,Fridrich J.Steganalysis by Subtracting PixelAdjacency Matrix[J].IEEE Transactions on Information Forensics Security,2010,5(2):215-224
[14] Nash J.Equilibrium Points in n-Person Games[J].Proceedings of the National Academy of Sciences of the United States of America,1950,36:48-49
[15] Kodovsky J,Fridrich J.On Completeness of Feature Spaces in Blind Steganalysis[C]∥Proc of the 10th ACM Multimedia & Security Workshop.New York:ACM Press,2008:123-132
[16] Lyu S,Farid H.Steganalysis Using Higher-Order Image Statistics[J].IEEE Transactions on Information Forensics and Security,2006,1(1):111-119
[17] Orsdemir A,Altun H O,Sharna G,et al.Steganalysis Aware Steganography:Statistical Indistinguishability Despite High Distortion [C]∥Proc of Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.Bellingham:SPIE Press,2008,6819:9-18
[18] Schaefer G,Stich M.UCID:An Uncompressed Color Image Database [C]∥Proc of SPIE Electronic Imaging,Storage and Retrieval Methods and Applications for Multimedia.Bellingham:SPIE Press,2003,5307:472-480
[19] 陈园园,朱孝成,叶甬渝.一种改进的DCT信息隐藏算法[J].重庆理工大学学报:自然科学版,2011,25(12):100-105

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!