Unlock instant, AI-driven research and patent intelligence for your innovation.

A security evaluation method of steganographic image carrier based on residual co-occurrence probability

A technology for security evaluation and image carrier, applied in the field of computer information hiding, which can solve the problems of steganographic algorithm security assurance, steganographic security impact, and steganographic algorithm adaptation differences.

Active Publication Date: 2020-05-12
WUHAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the steganographic algorithm is embedded in actual samples, its security cannot be fully guaranteed by the security of the steganographic algorithm
During the experiment, it was found that the sample carrier will have a greater impact on the security of steganography: when the steganographic algorithm is applied to different sample carriers, the algorithm's anti-detection ability will have a large deviation
After in-depth analysis, it is concluded that the reason for this phenomenon is that there are differences in the adaptability of the characteristics of the sample carrier to the steganography algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security evaluation method of steganographic image carrier based on residual co-occurrence probability
  • A security evaluation method of steganographic image carrier based on residual co-occurrence probability
  • A security evaluation method of steganographic image carrier based on residual co-occurrence probability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0018] please see figure 1 , a method for evaluating the security of steganographic image carriers based on residual co-occurrence probability provided by the present invention is characterized in that it comprises the following steps:

[0019] Step 1: Step 1: Filter the grayscale image of the sample image in the training set, extract the noise residual in the image, and obtain the residual matrix D of the sample image;

[0020] In this embodiment, the grayscale image I of the sample image is processed by convolution operation g Perform filtering to extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for evaluating the security of a steganographic image carrier based on residual co-occurrence probability. From the perspective of the security of the steganographic carrier, by studying the influence of the characteristic distribution of the co-occurrence probability of noise in the carrier image on the security of steganography, using Carrier clustering center distance measure proposes a method for evaluating the security of steganographic carriers. The invention can effectively enhance the anti-detection ability of the steganographic algorithm when it is used for the screening of the sample steganographic carrier. Experiments have proved that the steganographic samples screened based on the evaluation method of the present invention have significantly improved anti-detection ability compared with randomly selected carriers in multiple image databases, steganographic methods, embedding rates and steganalysis tests, and the average error rate An increase of about 3.8 to 11.8 percentage points.

Description

technical field [0001] The invention belongs to the technical field of computer information hiding, and relates to a method for evaluating the safety of a steganographic image carrier, in particular to a method for evaluating the safety of a steganographic image carrier based on residual co-occurrence probability. Background technique [0002] Steganography is a technology that embeds secret information by slightly modifying the values ​​in text, images and other carriers. Its purpose is to hide the actual communication content of the two parties. The steganalysis technology corresponding to the steganography technology makes full use of signal processing, mathematical statistics, machine learning and other theories to discover and excavate the secret information hidden in the carrier by analyzing the statistical difference of the carrier before and after the secret information is embedded. The research goal of steganography is how to embed as much secret information as poss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62
CPCG06F18/213G06F18/23G06F18/22G06F18/214
Inventor 王丽娜王凯歌徐一波谭选择唐奔宵
Owner WUHAN UNIV