期刊文献+

高阶隐写直觉模糊集距离安全性测度

HIGH-ORDER STEGANOGRAPHY SECURITY EVALUATION BASED ON INTUITIONISTIC FUZZY SET DISTANCE
下载PDF
导出
摘要 在隐写安全性研究滞后于隐写算法发展的前提下,隐写安全性研究成为亟待解决的问题。根据隐写通信过程的模糊不确定性,对隐写数据采用n阶Markov链建模,提出了隐写系统直觉模糊集距离安全性测度,并证明了该安全性测度的有界性、交换性和一致性。仿真实验表明,该安全性测度具有对不同隐写算法的度量区分能力。与确定模式下安全性相比较,在相同数据统计模型下,直觉模糊集距离安全性测度获得了更全面的隐蔽性评价。 Given that the research on steganography security evaluation lags back the development of steganography algorithm,it is an urgent problem for the study of steganography security evaluation.In this paper,according to the indeterminacy of seteganographic communication,the stego data are modeled as n-order Markov model,and a novel security evaluation in terms of intuitionistic fuzzy set distance is introduced for stganographic system.Furthermore,the security evaluation is proved to have the properties of boundedness,symmetric and uniform.The experimental results show that the proposed security evaluation can distinguish the security of the different steganographies.In addition,compared with the deterministic security evaluations under the same distribution model,the proposed security evaluations obtain a better estimate of the divergence between the cover images and stego images.
作者 周宇 欧阳春娟 刘欢 ZHOU Yu;OUYANG Chun-juan;LIU Huan(Network Information Center,Jinggangshan University,Ji'an,Jiangxi 343009,China;School of Electronics and Information Engineering,Jinggangshan University,Ji'an,Jiangxi 343009,China)
出处 《井冈山大学学报(自然科学版)》 2023年第5期79-85,共7页 Journal of Jinggangshan University (Natural Science)
基金 国家自然科学基金项目(42061055) 江西省自然科学基金项目(20192BAB207021,20202BABL202047) 江西省教育厅科技计划项目(GJJ201008,GJJ219305)。
关键词 隐写安全性 马尔可夫链 直觉模糊集距离 有界性 steganography security Markov model intuitionistic fuzzy set distance boundedness
  • 相关文献

参考文献11

二级参考文献79

  • 1王向阳,杨红颖.基于视觉掩蔽特性的小波域彩色数字水印技术[J].计算机辅助设计与图形学学报,2004,16(9):1240-1243. 被引量:5
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3Luo X Y, Wang D S, Wang P, et al. A review on blind detection for image steganography[J]. Signal Processing, 2008, 88(9): 2138-2157. 被引量:1
  • 4Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis of spread spectrum data hiding exploiting cover memory[C]//Conference on Security, Steganography and Watermarking of Multimedia Contents VII: vol.5681. Bellingham, WA, USA: SPIE, 2005: 38-46. 被引量:1
  • 5Xuan G R, Shi Y Q, Gao J J, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[M]//Lecture Notes in Computer Science: vol.3727. Berlin, Germany: Springer, 2005: 262-277. 被引量:1
  • 6Cachin C. An information-theoretic model for steganography[J]. Information and Computation, 2004, 192(1): 41-56. 被引量:1
  • 7Wang Y, Moulin R Steganalysis of block-structured stegotext [C]//Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅵ: vol.5306. Bellingham, WA, USA: SPIE, 2004: 477-488. 被引量:1
  • 8Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis for Markov cover data with applications to images[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 275-287. 被引量:1
  • 9Arnbalavanan A, Chandramouli R. A Bayesian image steganalysis approach to estimate the embedded secret message length [C]//7th Workshop on Multimedia and Security. New York, NY, USA: ACM, 2005:33-38. 被引量:1
  • 10陈丹 王育民.基于图像模型的掩密安伞性定义.哈尔滨工业大学学报,2006,38:901-904. 被引量:1

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部