CN103971321B - Method and system for steganalysis of JPEG compatibility - Google Patents

Method and system for steganalysis of JPEG compatibility Download PDF

Info

Publication number
CN103971321B
CN103971321B CN201410195302.9A CN201410195302A CN103971321B CN 103971321 B CN103971321 B CN 103971321B CN 201410195302 A CN201410195302 A CN 201410195302A CN 103971321 B CN103971321 B CN 103971321B
Authority
CN
China
Prior art keywords
embedded
rate
observation
jpeg
embedded rate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410195302.9A
Other languages
Chinese (zh)
Other versions
CN103971321A (en
Inventor
马晓静
金海�
刘姣姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201410195302.9A priority Critical patent/CN103971321B/en
Publication of CN103971321A publication Critical patent/CN103971321A/en
Application granted granted Critical
Publication of CN103971321B publication Critical patent/CN103971321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method for steganalysis of JPEG compatibility. The method comprises the steps that the observation insertion rate r' of each JPEG steganography image JS in a steganography image training base is calculated; according to the observation insertion rate r' and the real insertion rate r of each JPEG steganography image in the steganography image training base, a relation model between the observation insertion rate r' and the real insertion rate r is established; the observation insertion rate of the steganography image to be detected is calculated and the detected insertion rate of the steganography image to be detected is calculated according to the relation model between the observation insertion rate and the real insertion rate. The invention further discloses a system for steganalysis of JPEG compatibility. The similarity of two images is measured through a self-defined similarity function in the JPEG quantization table extraction process, compression distortion and insertion distortion are differentiated on the basis of the pixel variation amplitude characteristic in the insertion estimation process, and estimation of the insertion rate of the non-self-adaptation steganography algorithm and the insertion rate of the self-adaptation steganography algorithm is accurate.

Description

A kind of steganalysis method and system of JPEG compatibilities
Technical field
The invention belongs to multi-media safety technical field, more particularly, to a kind of compatible steganalysis methods of JPEG With system.
Background technology
With cyber-net continuous popularization and develop rapidly, the Internet becomes indispensable one in people's life Part, at the same time, the Internet also becomes the important channel of people's transmission information, the letter that daily on the internet face is transmitted Breath occupies most of flow of the Internet.Information of these transmission are related to national security, army secret, trade secret and individual How people's privacy etc., protect these confidential information not stolen by the illegal molecule such as terrorist and distort even destruction, during to information The information safety protection in generation brings greatly challenge.The Internet has become countries in the world and has obtained economic, military and scientific and technological information Important battlefield.Information Hiding Techniques have obtained huge development and attention as a kind of emerging technology of information security field.
It has been recognized that protection information can be completed safely by cryptographic technique, cryptographic technique is the letter that will be transmitted Breath (plaintext) forms unrecognizable mess code form (ciphertext) by AES, and the file after the encryption for being becomes indigestion (failing to understand).From for the angle of attacker, if seeming rambling ciphertext in the face of a pile, from being in a certain respect to tell him Secret communication is carried out, and can more cause his vigilance, if attacker cuts off communication port and causes communication failure, password Safety be constantly on the hazard.
Steganography (Digital Steganography) is an important branch of Information hiding.It is mainly sharp With all kinds of Digital Medias (including picture, video, the audio frequency, text etc.) redundancy of itself, and the psychology and physiology of human perception Characteristic, the classified information after encryption is embedded in disclosed Digital Media and is transmitted, to reach the mesh of secret transmission message 's.Steganography has been the important means for becoming human information safe transmission, while also bringing threat:It both can be with For transmission military affairs, information, national security information of safety etc. in open internet, it is also possible to by terrorist and hostile Force is utilized, and endangers country and public safety.In succession terroristic organization of the report headed by this Laden can for each medium of the U.S. The steganography software based on image can be adopted to issue action order, the base terroristic organization headed by this Laden adopts and is based on image Steganography software issue action instruction.After 9.11 events occur, including《The New York Times》With《Washington Post》Interior Duo Jia U.S. newpapers and periodicals are reported on famous shopping website e-Bay and are found that the concealed information stayed suspected of terrorist.Although These reports are not confirmed, but they demonstrate the behavior that steganography be used to constituting a threat to social safety Probability.
Therefore, attack of the research to Steganography, it is national and public for safeguarding to detect and find hiding information Safety is most important.Under this situation, steganalysis (Steganalysis) technology is arisen at the historic moment, and its objective is that detection is suspicious The presence of information, estimates message embedded quantity, then extracts, destroys or further reduce secret information.Steganalysis into For an important research direction in Information hiding field:Research steganalysis not only have critically important using value, With very important academic significance.On the one hand the illegal application of Steganography can be prevented, prevents lawless person from utilizing Steganography Criminal activity is carried out, national security is endangered.On the other hand it can also promote the raising of steganographic algorithm safety, promote steganography to calculate Method it is practical.
Most camera exports the photo of jpeg format, and picture major part on internet is also JPEG lattice Formula.Although also there is many steganographic algorithms such as Jsteg, Outguess, Model-based steganography, JPHide, And F5, there is provided directly carry out steganography on the picture of jpeg format, but embedding capacity well below it is vacant carry out it is embedded Capacity.The steganography instrument major part provided on network is for vacant embedded, and the steganographic algorithm for being used is not accounted for The problem of JPEG compatibility.So can have many consumers to select to carry out vacant being embedded on the picture of jpeg decompression contracting.
Existing program accuracy rate in terms of quantization table is extracted is not high, in terms of embedded rate estimation, some steganalysis methods The steganographic algorithm of non-self-adapting is confined to, the accuracy rate extracted to adaptive steganographic algorithm is not high.
The content of the invention
For the disadvantages described above or Improvement requirement of prior art, the invention provides a kind of JPEG compatible steganalysis side Method and system, it is intended that solving to quantify table and the inaccurate technical problem of embedded rate estimation present in existing method.
For achieving the above object, according to one aspect of the present invention, there is provided a kind of JPEG compatible steganalysis method, Comprise the following steps:
(1) the embedded rate r ' of observation of each JPEG hidden image JS in hidden image training storehouse is calculated;
(2) the embedded rate r ' of the observation of each JPEG hidden image JS in storehouse is trained according to hidden image and its is truly embedded in rate R, the relational model set up between the embedded rate of observation and true embedded rate;
(3) the embedded rate of observation of hidden image to be detected is calculated, and according between the embedded rate of observation and true embedded rate Relational model calculates the embedded rate of detection of hidden image to be detected.
Preferably, embedded rate r' of observation that JPEG hidden image JS are calculated in the step (1) is specifically included:
(1.1) its quantization table QF is obtained according to JPEG steganography picture JS;
(1.2) JPEG compression again is carried out to steganography picture JS with the quantization table QF obtained in step (1.1) step, is obtained The carrier picture JS ' for estimating, calculate the difference image D of JS and JS ';
(1.3) in the difference image obtained in (1.2), the pixel according to caused by embedded change and recompression distortion becomes Change amplitude is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation.
Preferably, obtain its quantization table QF according to JPEG steganography picture JS in the step (1.1) to specifically include:
(1.1.1) to JPEG steganography picture JS, JPEG compression is carried out with all of quantization table QF, wherein quantifying corresponding to table Quality factor be 1 to 95, obtain 95 compression after picture JSi(i=1,2 ..., 95);
(1.1.2) similarity function Sim is utilizedi(JS,JSi) calculate JS and JSi(i=1,2 ..., 95) between it is similar Degree:
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents limited The element number of set, the number of pixels that card (E) does not change after recompressing, m, n is respectively picture length and cross direction On number of pixels;
(1.1.3) curve of similarity function is drawn, it is described hidden to take the quantization table corresponding to first peak value of curve Write the quantization table QF corresponding to picture JS.
Preferably, the step (1.3) specifically includes:
In the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
Preferably, the step (2) specifically includes:
Using libsvm, the embedded rate r ' of observation of each JPEG hidden image JS in storehouse and its true is trained to hidden image Embedded rate r is trained, and obtains the relational model observed between embedded rate and true embedded rate.
It is another aspect of this invention to provide that a kind of compatible steganalysis systems of JPEG are additionally provided, including:Observation is embedded Rate computing module, embedded rate relational model set up module and the embedded rate computing module of detection, wherein:
The embedded rate computing module of observation, trains the observation of each JPEG hidden image JS in storehouse embedding for calculating hidden image Enter rate r ';
Embedded rate relational model sets up module, for training the sight of each JPEG hidden image JS in storehouse according to hidden image Embedded rate r ' and its truly embedded rate r are surveyed, the relational model set up between the embedded rate of observation and true embedded rate;
The embedded rate computing module of detection, the embedded rate of the observation for calculating hidden image to be detected, and it is embedded according to observation Relational model between rate and true embedded rate calculates the embedded rate of detection of hidden image to be detected.
Preferably, the embedded rate computing module of the observation specifically includes quantization table acquisition module, difference image computing module And the embedded rate calculating sub module of observation, wherein:
The quantization table acquisition module, for obtaining its quantization table QF according to JPEG steganography picture JS;
The difference image computing module, for the quantization table QF that obtained with the quantization table acquisition module to steganography picture JS carries out JPEG compression again, obtains the carrier picture JS ' for estimating, and calculates the difference image D of JS and JS ';
The observation is embedded in rate calculating sub module, for the difference image to the acquisition, presses according to embedded change and again Pixel amplitude of variation caused by contracting distortion is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation.
Preferably, the quantization table acquisition module specifically includes JPEG compression module, similarity calculation module and quantization Table acquisition submodule, wherein:
The JPEG compression module, for JPEG steganography picture JS, with all of quantization table QF JPEG compression being carried out, its Quality factor corresponding to middle quantization table is 1 to 95, obtains the picture JS after 95 compressionsi(i=1,2 ..., 95);
The similarity calculation module, for using similarity function Simi(JS,JSi) calculate JS and JSi(i=1, 2 ..., 95) between similarity:
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents limited The element number of set, the number of pixels that card (E) does not change after recompressing, m, n is respectively picture length and cross direction On number of pixels;
The quantization table acquisition submodule, for drawing the curve of similarity function, the first peak value institute for taking curve is right The quantization table answered is the quantization table QF corresponding to the steganography picture JS.
Preferably, the embedded rate calculating sub module of the observation specifically for:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
Preferably, the embedded rate relational model set up module specifically for:
Using libsvm, the embedded rate r ' of observation of each JPEG hidden image JS in storehouse and its true is trained to hidden image Embedded rate r is trained, and obtains the relational model observed between embedded rate and true embedded rate.
In general, by the contemplated above technical scheme of the present invention compared with prior art, can obtain down and show Beneficial effect:
(1) present invention quantifies table extraction accuracy rate height:As a result of new similarity function, and using similarity letter Quantization table corresponding to first peak value of number curve solves what original method quantization table was extracted by mistake as the quantization table for extracting Shortcoming.Therefore, the extraction accuracy rate of the present invention is high compared with existing scheme.Experimental Comparison is carried out on matlab, the present invention Quantization table extract accuracy rate major part be higher than original method.
(2) the embedded rate of the present invention estimates that accuracy rate is high:Distortion and recompression distortion are embedded in due to having distinguished difference image, Recompression distortion is removed in difference image, embedded distortion is only considered, embedded rate is more accurately have estimated.Enter on matlab Row Experimental comparison, the embedded rate of the present invention estimates more accurate.
Description of the drawings
Fig. 1 is the flow chart that the present invention is applied to the compatible steganalysis methods of JPEG.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and It is not used in the restriction present invention.As long as additionally, technical characteristic involved in invention described below each embodiment Not constituting conflict each other just can be mutually combined.
Present invention is generally directed to JPEG compatible steganalysis, have detected whether that secret disappears on the picture of jpeg decompression contracting Cease the length of embedded and embedded message.Hereinafter first just the technical term of the present invention is explained and illustrated:
Embedded distortion:Due to the distortion being embedded in picture caused by classified information
Recompression distortion:Due to the distortion caused by JPEG compression
The whole processing procedure of the present invention can be completed on matlab.
As shown in figure 1, the present invention is applied to the compatible steganalysis methods of JPEG comprising the following steps:
(1) the embedded rate r ' of observation of each JPEG hidden image JS in hidden image training storehouse is calculated;Including following sub-step Suddenly:
(1.1) its quantization table QF is obtained according to JPEG steganography picture JS;Including following sub-step:
(1.1.1) to the JPEG steganography pictures (JPEGStego Image are abbreviated as JS) for giving, with all of quantization table (Quantization Table are abbreviated as QF) carries out JPEG compression, wherein it is 1 to 95 (matter to quantify the quality factor corresponding to table The amount factor is higher, and the picture quality that JPEG compression is obtained is higher), obtain the picture JS after 95 compressionsi(i=1,2 ..., 95);
(1.1.2) similarity function Sim is utilizedi(JS,JSi) calculate JS and JSi(i=1,2 ..., 95) between it is similar Degree:
Define a JS and JSi(i=1,2 ..., 95) between similarity function (different from existing method)
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents limited The element number of set, the number of pixels that card (E) does not change after recompressing, m, n is respectively picture length and cross direction On number of pixels;
(1.1.3) extracted using the method for curve and quantify table:Draw the curve of similarity function, according to the shape of curve come Judge used quantization table QF, it is the quantization table QF for extracting to take the quantization table corresponding to first peak value of curve.
(1.2) JPEG compression again is carried out to steganography picture JS with the quantization table QF obtained in step (1.1) step, is obtained The carrier picture JS ' for estimating, calculate the difference image D of JS and JS ';
(1.3) in the difference image obtained in (1.2), the pixel according to caused by embedded change and recompression distortion becomes Change amplitude is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation.Specially:
In the difference image obtained in step (1.2), existing embedded change also has recompression in step (1.2) to be made Into distortion, need to distinguish both distortions, only extract embedded distortion, be more accurately embedded in rate and estimate to obtain.Due to being empty ± the 1 of domain is embedded in, and after JPEG compression, the pixel amplitude of variation of embedded change is generally 1, but recompression distortion is then showed Unlike this, amplitude of variation is from 1 to higher, this feature not only to adaptive steganographic algorithm effectively, and to non-adaptive The steganographic algorithm answered is highly effective.Different with the pixel amplitude of variation caused by recompression distortion using embedded change, this is special Levy to distinguish compression artefacts and embedded change to obtain the embedded rate r ' of observation.
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
(2) the embedded rate r ' of the observation of each JPEG hidden image JS in storehouse is trained according to hidden image and its is truly embedded in rate R, the relational model set up between the embedded rate of observation and true embedded rate;Specially:
Through the calculating of step (1), the JPEG steganography pictures of substantial amounts of known embedded rate r in hidden image training storehouse are obtained The embedded rate r ' of observation,
According to embedded rate r' of the substantial amounts of observation of above-mentioned acquisition and known truly embedded rate r, using a libsvm (SVM Pattern recognition and the software kit for returning) data are trained, obtain a multinomial model, establish the embedded rate r ' of observation with Relational model between true embedded rate r.
(3) the embedded rate of observation of hidden image to be detected is calculated, and according between the embedded rate of observation and true embedded rate Relational model calculates the embedded rate of detection of hidden image to be detected.
When a JPEG steganography picture to be detected is given, we obtain the steganography picture by above-mentioned steps (1) The embedded rate r ' of observation, then the relational model in step (2), calculates the embedded rate of final detection.
Correspondingly, present invention also offers the steganalysis system for realizing said method, including:The embedded rate meter of observation Calculate module, embedded rate relational model and set up module and the embedded rate computing module of detection, wherein:
The embedded rate computing module of observation, trains the observation of each JPEG hidden image JS in storehouse embedding for calculating hidden image Enter rate r ';
Embedded rate relational model sets up module, for training the sight of each JPEG hidden image JS in storehouse according to hidden image Embedded rate r ' and its truly embedded rate r are surveyed, the relational model set up between the embedded rate of observation and true embedded rate;
The embedded rate computing module of detection, the embedded rate of the observation for calculating hidden image to be detected, and it is embedded according to observation Relational model between rate and true embedded rate calculates the embedded rate of detection of hidden image to be detected.
Preferably, the embedded rate computing module of the observation specifically includes quantization table acquisition module, difference image computing module And the embedded rate calculating sub module of observation, wherein:
The quantization table acquisition module, for obtaining its quantization table QF according to JPEG steganography picture JS;
The difference image computing module, for the quantization table QF that obtained with the quantization table acquisition module to steganography picture JS carries out JPEG compression again, obtains the carrier picture JS ' for estimating, and calculates the difference image D of JS and JS ';
The observation is embedded in rate calculating sub module, for the difference image to the acquisition, presses according to embedded change and again Pixel amplitude of variation caused by contracting distortion is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation.
Preferably, the quantization table acquisition module specifically includes JPEG compression module, similarity calculation module and quantization Table acquisition submodule, wherein:
The JPEG compression module, for JPEG steganography picture JS, with all of quantization table QF JPEG compression being carried out, its Quality factor corresponding to middle quantization table is 1 to 95, obtains the picture JS after 95 compressionsi(i=1,2 ..., 95);
The similarity calculation module, for using similarity function Simi(JS,JSi) calculate JS and JSi(i=1, 2 ..., 95) between similarity:
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents limited The element number of set, the number of pixels that card (E) does not change after recompressing, m, n is respectively picture length and cross direction On number of pixels;
The quantization table acquisition submodule, for drawing the curve of similarity function, the first peak value institute for taking curve is right The quantization table answered is the quantization table QF corresponding to the steganography picture JS.
Preferably, the embedded rate calculating sub module of the observation specifically for:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
Preferably, the embedded rate relational model set up module specifically for:
Using libsvm, the embedded rate r ' of observation of each JPEG hidden image JS in storehouse and its true is trained to hidden image Embedded rate r is trained, and obtains the relational model observed between embedded rate and true embedded rate.
As it will be easily appreciated by one skilled in the art that the foregoing is only presently preferred embodiments of the present invention, not to The present invention, all any modification, equivalent and improvement made within the spirit and principles in the present invention etc. are limited, all should be included Within protection scope of the present invention.

Claims (10)

1. a kind of JPEG compatible steganalysis method, it is characterised in that the method comprising the steps of:
(1) the embedded rate r ' of observation of each JPEG hidden image JS in hidden image training storehouse is calculated by following processes:
(1.1) its quantization table QF is obtained according to JPEG steganography picture JS;
(1.2) JPEG compression again is carried out to steganography picture JS with the quantization table QF obtained in step (1.1) step, is estimated The carrier picture JS ' for going out, calculate the difference image D of JS and JS ';
(1.3) the pixel change width in the difference image obtained in (1.2), according to caused by embedded change and recompression distortion Degree is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation;
(2) the embedded rate r ' of the observation of each JPEG hidden image JS in storehouse and its truly embedded rate r are trained according to hidden image, is built Relational model between the vertical embedded rate of observation and true embedded rate;
(3) the embedded rate of observation of hidden image to be detected is calculated, and according to the relation between the embedded rate of observation and true embedded rate Model calculates the embedded rate of detection of hidden image to be detected.
2. the method for claim 1, it is characterised in that obtained according to JPEG steganography pictures JS in the step (1.1) Its quantization table QF is specifically included:
(1.1.1) to JPEG steganography picture JS, JPEG compression is carried out with all of quantization table QF, wherein quantifying the matter corresponding to table The amount factor is 1 to 95, obtains the picture JS after 95 compressionsi(i=1,2 ..., 95);
(1.1.2) similarity function Sim is utilizedi(JS,JSi) calculate JS and JSi(i=1,2 ..., 95) between similarity:
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents finite aggregate Element number, the number of pixels that card (E) does not change after recompressing, m, n is respectively on picture length and cross direction Number of pixels;
(1.1.3) curve of similarity function is drawn, it is the steganography figure to take the quantization table corresponding to first peak value of curve Quantization table QF corresponding to piece JS.
3. the method for claim 1, it is characterised in that the step (1.3) specifically includes:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
4. method as claimed in claim 2, it is characterised in that the step (1.3) specifically includes:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
5. the method as described in any one of Claims 1-4, it is characterised in that the step (2) specifically includes:
Using libsvm, the embedded rate r ' of observation of each JPEG hidden image JS in storehouse is trained to hidden image and its is truly embedded in Rate r is trained, and obtains the relational model observed between embedded rate and true embedded rate.
6. a kind of JPEG compatible steganalysis system, it is characterised in that include:The embedded rate computing module of observation, embedded rate are closed It is that model building module and detection are embedded in rate computing module, wherein:
The embedded rate computing module of observation, for calculating hidden image the embedded rate of the observation of each JPEG hidden image JS in storehouse is trained R ';
Embedded rate relational model sets up module, for being trained the observation of each JPEG hidden image JS in storehouse embedding according to hidden image Enter rate r ' and its truly embedded rate r, the relational model set up between the embedded rate of observation and true embedded rate;
The embedded rate computing module of detection, the embedded rate of the observation for calculating hidden image to be detected, and according to the embedded rate of observation with Relational model between true embedded rate calculates the embedded rate of detection of hidden image to be detected;
The observation is embedded in rate computing module and specifically includes quantization table acquisition module, difference image computing module and observe embedded Rate calculating sub module, wherein:
The quantization table acquisition module, for obtaining its quantization table QF according to JPEG steganography picture JS;
The difference image computing module, the quantization table QF for being obtained with the quantization table acquisition module enters to steganography picture JS Row JPEG compression again, obtains the carrier picture JS ' for estimating, and calculates the difference image D of JS and JS ';
The observation is embedded in rate calculating sub module, for the difference image to the acquisition, is lost according to embedded change and recompression Very caused pixel amplitude of variation is different, distinguishes embedded change and compression artefacts, obtains the embedded rate r ' of observation.
7. system as claimed in claim 6, it is characterised in that the quantization table acquisition module specifically includes JPEG compression mould Block, similarity calculation module and quantization table acquisition submodule, wherein:
The JPEG compression module, for JPEG steganography picture JS, JPEG compression being carried out with all of quantization table QF, wherein measuring The quality factor changed corresponding to table is 1 to 95, obtains the picture JS after 95 compressionsi, i=1,2 ..., 95;
The similarity calculation module, for using similarity function Simi(JS,JSi) calculate JS and JSi, i=1,2 ..., 95, Between similarity:
Simi(JS,JSi)=card (E)/m × n
Wherein E=(x, y) | | JS (x, y)-JSi(x, y) |=0,1≤x≤m, 1≤y≤n }, card () represents finite aggregate Element number, the number of pixels that card (E) does not change after recompressing, m, n is respectively on picture length and cross direction Number of pixels;
The quantization table acquisition submodule, for drawing the curve of similarity function, takes corresponding to first peak value of curve Quantization table is the quantization table QF corresponding to the steganography picture JS.
8. system as claimed in claim 6, it is characterised in that the embedded rate calculating sub module of the observation specifically for:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
9. system as claimed in claim 7, it is characterised in that the embedded rate calculating sub module of the observation specifically for:
According to the difference image D that step (1.2) is obtained, using the embedded rate r ' of following formula calculating observation:
R'=card (A)/m × n
Wherein A=(x, y) | and | D (x, y) |=1,1≤x≤m, 1≤y≤n }, card () represents the element of finite aggregate Number, card (A) is the number of pixels that pixel value is 1 in difference image, m, n be respectively picture length and cross direction on pixel Number.
10. the system as described in any one of claim 6 to 9, it is characterised in that the embedded rate relational model sets up module tool Body is used for:
Using libsvm, the embedded rate r ' of observation of each JPEG hidden image JS in storehouse is trained to hidden image and its is truly embedded in Rate r is trained, and obtains the relational model observed between embedded rate and true embedded rate.
CN201410195302.9A 2014-05-09 2014-05-09 Method and system for steganalysis of JPEG compatibility Active CN103971321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410195302.9A CN103971321B (en) 2014-05-09 2014-05-09 Method and system for steganalysis of JPEG compatibility

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410195302.9A CN103971321B (en) 2014-05-09 2014-05-09 Method and system for steganalysis of JPEG compatibility

Publications (2)

Publication Number Publication Date
CN103971321A CN103971321A (en) 2014-08-06
CN103971321B true CN103971321B (en) 2017-04-19

Family

ID=51240773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410195302.9A Active CN103971321B (en) 2014-05-09 2014-05-09 Method and system for steganalysis of JPEG compatibility

Country Status (1)

Country Link
CN (1) CN103971321B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244016B (en) * 2014-08-12 2018-04-10 中山大学 A kind of H264 video contents altering detecting method
CN106157232B (en) * 2016-06-30 2019-04-26 广东技术师范学院 A kind of general steganalysis method of digital picture characteristic perception
CN106548445A (en) * 2016-10-20 2017-03-29 天津大学 Spatial domain picture general steganalysis method based on content
CN112017095A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Universal method for optimizing existing JPEG steganography distortion function

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304522A (en) * 2008-06-20 2008-11-12 中国民航大学 Considerable information hide method using JPEG2000 compression image as carrier

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006333212A (en) * 2005-05-27 2006-12-07 Kyocera Mita Corp Image forming apparatus

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304522A (en) * 2008-06-20 2008-11-12 中国民航大学 Considerable information hide method using JPEG2000 compression image as carrier

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Security Analysis on Spatial 1 Steganography for JPEG Decompressed Images;Weiqi Luo,et al.;《IEEE SIGNAL PROCESSING LETTERS》;20110131;第18卷(第1期);摘要,引言,第2节 *
Steganalysis of LSB Matching in Grayscale Images;Andrew D. Ker;《IEEE SIGNAL PROCESSING LETTERS》;20050630;第12卷(第6期);全文 *
采用SVR模型进行嵌入率估计的隐写分析方法;孙子文,李慧;《计算机工程与应用》;20111114;摘要,第1.5节,第2节,图1.5 *

Also Published As

Publication number Publication date
CN103971321A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
Singh et al. Wavelet based image watermarking: futuristic concepts in information security
Chanu et al. A short survey on image steganography and steganalysis techniques
Bhatnagar et al. Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform
Tarif et al. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
CN103971321B (en) Method and system for steganalysis of JPEG compatibility
Muhammad et al. Secure image steganography using cryptography and image transposition
Singh et al. Experimental studies of LSB watermarking with different noise
CN107846530A (en) Digital watermarking algorithm
CN105227964B (en) Video-frequency identifying method and system
CN106454367A (en) Method and system for identifying multimedia file
CN103559251B (en) Data security protection method based on Information hiding
Hu et al. Effective forgery detection using DCT+ SVD-based watermarking for region of interest in key frames of vision-based surveillance
CN106055632B (en) Video authentication method based on scene frame fingerprint
Sharma et al. Zero distortion technique: an approach to image steganography using strength of indexed based chaotic sequence
CN102945542A (en) Region-of-interest authentication and tampering detection digital watermark method
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Shukla Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map
CN103617589A (en) Information hiding method based on local histogram
CN103873871B (en) Geometric-attack-resistant robust video watermark method based on timeline spread spectrum
Balamurugan et al. A fingerprint based reversible watermarking system for the security of medical information
Haynes Using Image Steganography to Establish Covert Communication Channels
Alaa Sabri et al. A New Algorithm for a Steganography System
Bhatnagar et al. Encryption based robust watermarking in fractional wavelet domain
GB2582456A (en) System, device and method for fingerprint authentication using a watermarked digital image
Neela et al. ECG steganography and hash function based privacy protection of patients medical information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant