{"title":"选择可靠的隐写方法","authors":"H. Sajedi, M. Jamzad","doi":"10.1109/MCIT.2010.5444848","DOIUrl":null,"url":null,"abstract":"Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method. Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported steganalysis methods. Experimental results show the efficiency of the proposed method in improving the security of stego images.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Selecting a reliable steganography method\",\"authors\":\"H. Sajedi, M. Jamzad\",\"doi\":\"10.1109/MCIT.2010.5444848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method. Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported steganalysis methods. Experimental results show the efficiency of the proposed method in improving the security of stego images.\",\"PeriodicalId\":285648,\"journal\":{\"name\":\"2010 International Conference on Multimedia Computing and Information Technology (MCIT)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Multimedia Computing and Information Technology (MCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCIT.2010.5444848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCIT.2010.5444848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

由于图像的各种内容,隐写方法产生的隐写图像可能对隐写分析器具有不同程度的不可检测性。换句话说,与其他图像相比,隐写方法可能在某些图像上造成更少可检测的统计伪影。本文通过分析图像的不同特征,找出各种隐写方法中合适的封面图像之间的相似性。图像之间的相似性使用进化算法以模糊if-then规则的形式建模。随后,为了在封面图像中隐藏秘密数据,我们提出了一种可靠的隐写方法,该方法可以对最近报道的隐写分析方法产生不可检测的隐写图像。实验结果表明,该方法能够有效地提高隐写图像的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Selecting a reliable steganography method
Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method. Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported steganalysis methods. Experimental results show the efficiency of the proposed method in improving the security of stego images.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multimodal biometric recognition inspired by visual cortex and Support vector machine classifier Partial image retrieval using SIFT based on illumination invariant features Extracting membership functions by ACS algorithm without specifying actual minimum support Gabor wavelet for road sign detection and recognition using a hybrid classifier Prediction model of reservoir fluids properties using Sensitivity Based Linear Learning method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1