A security evaluation method of steganographic image carrier based on residual co-occurrence probability
A technology for security evaluation and image carrier, applied in the field of computer information hiding, which can solve the problems of steganographic algorithm security assurance, steganographic security impact, and steganographic algorithm adaptation differences.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0018] please see figure 1 , a method for evaluating the security of steganographic image carriers based on residual co-occurrence probability provided by the present invention is characterized in that it comprises the following steps:
[0019] Step 1: Step 1: Filter the grayscale image of the sample image in the training set, extract the noise residual in the image, and obtain the residual matrix D of the sample image;
[0020] In this embodiment, the grayscale image I of the sample image is processed by convolution operation g Perform filtering to extract...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


