• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于混沌系统的三种隐写方法及其基于三种特征向量的通用隐写分析的比较研究

Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.

作者信息

Battikh Dalia, El Assad Safwan, Hoang Thang Manh, Bakhache Bassem, Deforges Olivier, Khalil Mohamad

机构信息

LASTRE Laboratory, Lebanese University, 210 Tripoli, Lebanon.

Institut d'Electronique et des Télécommunications de Rennes (IETR), UMR CNRS 6164, Université de Nantes-Polytech Nantes, Rue Christian Pauc CS 50609, CEDEX 3, 44306 Nantes, France.

出版信息

Entropy (Basel). 2019 Jul 30;21(8):748. doi: 10.3390/e21080748.

DOI:10.3390/e21080748
PMID:33267462
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7515277/
Abstract

In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size.

摘要

在本文中,我们首先利用一种提出的混沌系统研究了三种隐写方法的安全性增强。第一种方法,即基于重新审视的最低有效位匹配的增强边缘自适应图像隐写术(EEALSBMR),存在于空间域。另外两种方法,增强离散余弦变换(EDCT)和增强离散小波变换(EDWT),存在于频域。该混沌系统极其健壮,由一个强大的混沌发生器和一个二维猫映射组成。其主要作用是在检测到消息时保护消息内容的安全。其次,使用基于多分辨率小波分解的三种盲隐写分析方法来检测嵌入的消息是否隐藏在测试图像(隐写图像)中或未隐藏在测试图像(载体图像)中。隐写分析方法基于这样的假设,即消息嵌入方案会在图像中留下可用于检测的统计证据或结构。仿真结果表明,如果在EEALSBMR隐写方法中消息大小小于20%,以及在EDCT隐写方法中消息大小小于15%,支持向量机(SVM)分类器和Fisher线性判别(FLD)无法区分载体图像和隐写图像。然而,在EDWT隐写方法中,无论消息大小如何,SVM和FLD都能以合理的准确率区分载体图像和隐写图像。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/3bd7b66fefc3/entropy-21-00748-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/d4a774ccde83/entropy-21-00748-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/4353a5e3e2d4/entropy-21-00748-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/4cbc470dd2da/entropy-21-00748-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/80a2d9af821b/entropy-21-00748-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/8e3b69f1f3e4/entropy-21-00748-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/5c98eac908e2/entropy-21-00748-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/1ef80b1389b5/entropy-21-00748-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/1257d22992c3/entropy-21-00748-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/fdda8098b1f0/entropy-21-00748-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/89251b6c5acc/entropy-21-00748-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/c1e3eba65f4b/entropy-21-00748-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/87aadb1d7915/entropy-21-00748-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/3c724da9a8c1/entropy-21-00748-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/0cb107f26a04/entropy-21-00748-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/3bd7b66fefc3/entropy-21-00748-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/d4a774ccde83/entropy-21-00748-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/4353a5e3e2d4/entropy-21-00748-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/4cbc470dd2da/entropy-21-00748-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/80a2d9af821b/entropy-21-00748-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/8e3b69f1f3e4/entropy-21-00748-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/5c98eac908e2/entropy-21-00748-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/1ef80b1389b5/entropy-21-00748-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/1257d22992c3/entropy-21-00748-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/fdda8098b1f0/entropy-21-00748-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/89251b6c5acc/entropy-21-00748-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/c1e3eba65f4b/entropy-21-00748-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/87aadb1d7915/entropy-21-00748-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/3c724da9a8c1/entropy-21-00748-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/0cb107f26a04/entropy-21-00748-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a082/7515277/3bd7b66fefc3/entropy-21-00748-g015.jpg

相似文献

1
Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.基于混沌系统的三种隐写方法及其基于三种特征向量的通用隐写分析的比较研究
Entropy (Basel). 2019 Jul 30;21(8):748. doi: 10.3390/e21080748.
2
Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization.随机嵌入式校准统计盲隐写分析,使用交叉验证支持向量机和支持向量机与粒子群优化算法。
Sci Rep. 2023 Feb 9;13(1):2359. doi: 10.1038/s41598-023-29453-8.
3
Steganalysis using image quality metrics.利用图像质量指标进行隐写分析。
IEEE Trans Image Process. 2003;12(2):221-9. doi: 10.1109/TIP.2002.807363.
4
SABMIS: sparse approximation based blind multi-image steganography scheme.SABMIS:基于稀疏逼近的盲多图像隐写术方案。
PeerJ Comput Sci. 2022 Nov 28;8:e1080. doi: 10.7717/peerj-cs.1080. eCollection 2022.
5
Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.基于小波变换和多区域覆盖的双矩阵分解图像隐写术方案
Entropy (Basel). 2022 Feb 7;24(2):246. doi: 10.3390/e24020246.
6
Locating secret messages based on quantitative steganalysis.基于定量隐写分析的秘密信息定位。
Math Biosci Eng. 2019 May 30;16(5):4908-4922. doi: 10.3934/mbe.2019247.
7
Security-oriented steganographic payload allocation for multi-remote sensing images.面向安全的多遥感图像隐写载荷分配
Sci Rep. 2024 Feb 28;14(1):4826. doi: 10.1038/s41598-024-55474-y.
8
Interval type-2 fuzzy logic system based similarity evaluation for image steganography.基于区间二型模糊逻辑系统的图像隐写术相似性评估
Heliyon. 2020 May 7;6(5):e03771. doi: 10.1016/j.heliyon.2020.e03771. eCollection 2020 May.
9
A convolutional neural network-based linguistic steganalysis for synonym substitution steganography.基于卷积神经网络的同义词替换隐写分析。
Math Biosci Eng. 2019 Nov 11;17(2):1041-1058. doi: 10.3934/mbe.2020055.
10
LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.基于最低有效位的预嵌入视频隐写术与旋转和移位多模式块矩阵。
PeerJ Comput Sci. 2022 Jan 6;8:e843. doi: 10.7717/peerj-cs.843. eCollection 2022.

引用本文的文献

1
Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos.基于扰动数字混沌的图像置换与扩散新模型
Entropy (Basel). 2020 May 13;22(5):548. doi: 10.3390/e22050548.

本文引用的文献

1
An Adaptive and Secure Holographic Image Watermarking Scheme.一种自适应且安全的全息图像水印方案。
Entropy (Basel). 2019 May 2;21(5):460. doi: 10.3390/e21050460.
2
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.现代文本隐藏、文本隐写分析及应用:比较分析
Entropy (Basel). 2019 Apr 1;21(4):355. doi: 10.3390/e21040355.
3
Entropy-Based Video Steganalysis of Motion Vectors.基于熵的运动矢量视频隐写分析
Entropy (Basel). 2018 Apr 2;20(4):244. doi: 10.3390/e20040244.
4
An overview of statistical learning theory.统计学习理论概述。
IEEE Trans Neural Netw. 1999;10(5):988-99. doi: 10.1109/72.788640.