Font Size: a A A

Research And Realization On Steganalysis Algorithms Of Jepg Based On DWT Domain Features

Posted on:2009-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:T Y ZhouFull Text:PDF
GTID:2178330338485392Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Based on introduction of steganography technology and analyses of current steganography methods, the mainly researches presented in this paper are the steganography algorithms and steganography analyzing algorithms for JPEG image and implements a testing platform of image steganography and steganography analyzing . In detail, this paper:1. Summarizes the concepts and the current research situation of information hiding, image steganography, and reviews the developing history of image steganography.2. Introduces the concepts of steganography and compression on JPEG images, summarizes typical JEPG image steganography algorithms and the steganography analyzing algorithms, after that, the paper points out the shortages of the current methods mentioned above.3. Proposes a new blind analyzing framework based on DWT domain characteristics. Summarizes the situation of JPEG image blind steganalysis based on frequency domains characteristics. The method extracts all the four-order moments of DWT (Discrete Wavelet Transform) co-occurrence matrix as a feature vector of BP (Back Propagation) network classifier, which is the basis of JEPG image steganography algorithms analyzing methods using BP nerve networks. The results of the tests proves the new method holds a higher accuracies on analyzing of multiple JPEG image steganography algorithms than the typical analyzing method in a thesis as a reference.4. Designs and implements an analyzing platform for JPEG steganography and steganography analyzing, which estalishes a library of cover images and stego images. Intergrating with some typical steganography and testing methods, the platform is able to analyzes the stego image cooperating with multiple current used testing algorithms with can be easily simulated, and the steganography method to some special types can implement further extraction of private massage.In the end, the paper makes a summary of the works above and discussed the future trend of information hiding and the further work afterwards.
Keywords/Search Tags:Steganography, Steganalysis, Blind Steganalysis, DWT, co-occurrence matrix
PDF Full Text Request
Related items