Unlock instant, AI-driven research and patent intelligence for your innovation.

A stealth method based on camera source anti-forensics

A source and camera technology, applied in the field of JPEG image concealment technology, can solve the problem of easy care and loss, and achieve the effect of improving security

Active Publication Date: 2019-05-14
DALIAN UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Phil Salle proposed the MB algorithm in the article "Model-based steganography", Digital watermarking. Springer Berlin Heidelberg, 2003, P154-167. It is a model-based information hiding framework. The main idea is to divide a JPEG image into The certain part and the non-deterministic part, when embedding the information, the certain part is guaranteed to remain unchanged, and only the non-deterministic part is changed. By estimating the model distribution, the position of the embedded information is determined. However, the hidden image using the MB algorithm will have a block effect in the airspace, which will are easily detected by corresponding steganographic analysis methods
The patent number of Yu Nenghai et al. is CN201310275158.5, "a high-security JPEG image steganography method", using quantized DCT coefficients xi and Xi before and after rounding to define the corresponding vertical distortion and horizontal distortion, and using quantization to obtain The optimal modification probability of each quantized DCT coefficient is calculated according to the minimized embedded distortion model of longitudinal distortion and the corresponding longitudinal distortion and horizontal distortion; each quantized DCT coefficient obtained is The optimal modification probability of is converted into ternary distortion, and the check grid code STC is called, and the rounded quantized DCT coefficient Xi is used as a carrier to embed the secret message, and then encapsulated into a complete JPEG image, which ensures the security of the embedded secret message and good image quality after embedding secret messages. Although this method tries to minimize image distortion, the features used by existing steganographic analysis methods have reached tens of thousands of dimensions. It is difficult to embedding distortion models in every aspect, and it is easy to lose sight of others.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A stealth method based on camera source anti-forensics
  • A stealth method based on camera source anti-forensics
  • A stealth method based on camera source anti-forensics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific embodiments of the present invention will be described in detail below in conjunction with the technical solutions and accompanying drawings.

[0035] The present invention combines camera source anti-forensics with a secret algorithm, and the flow of the method is as follows: figure 1 shown.

[0036] This process is divided into two stages: in the first stage, the images used by Alice when sending messages to Bob are all from the source camera A in Alice’s hand, and the watchman Wendy can also obtain these images during the process of sending messages between the two, as time goes by Wendy has obtained enough images belonging to source camera A to build a matching model for source camera A. If Alice still uses the images of source camera A to transmit information at this time, it can be easily detected by Wendy. After discovering this situation, Alice established a mismatching scheme for the watchman's matching model. In order not to make Wendy suspicious...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A steganography method based on camera source anti-forensics of the invention belongs to the technical field of signal and information processing, and relates to a source anti-forensics technology based on sensor mode noise and a JPEG image steganography technology. The steganography method combines a camera source anti-forensics algorithm and a steganography algorithm. Based on the fact that a steganalysis technology is of low steganographic image detection rate under the condition of camera model mismatch, the source of an image is forged first, then, a forged image is acquired using a fingerprint replacement algorithm in a source anti-forensics method based on sensor mode noise, and finally, the image is encrypted using an nsF5 steganography algorithm to get a steganographic image. The method improves the security of steganographic images, is applicable to the field of information security, effectively helps secret information transmission personnel to transmit secret information securely, and provides a technical support for important political, military and commercial confidential information transmitted in a network.

Description

technical field [0001] The invention belongs to the technical field of signal and information processing, and relates to a source anti-evidence collection technology based on sensor pattern noise and a JPEG image concealment technology. Background technique [0002] The advent of the information age has made information security a worldwide problem. Information security is the basic guarantee for the country's informatization process and the development of the information industry. The rapid development of the Internet has brought great convenience to our lives, but hackers and computer viruses The rampant Internet users' personal privacy is likely to be violated, political, military, commercial and other important confidential information transmitted on the network may be intercepted or changed by criminals during the transmission process, which will bring huge losses to the country . Stealth technology, which can realize the security of communication content through digit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T9/00
CPCG06T9/00
Inventor 王波赵美娟
Owner DALIAN UNIV OF TECH