Telecommunications Science ›› 2018, Vol. 34 ›› Issue (4): 68-80.doi: 10.11959/j.issn.1000-0801.2018044
• research and development • Previous Articles Next Articles
Jian ZHANG,Rangding WANG(),Diqun YAN
Revised:
2017-10-26
Online:
2018-04-01
Published:
2018-05-02
Supported by:
CLC Number:
Jian ZHANG,Rangding WANG,Diqun YAN. A new RS steganalysis algorithm of detecting UnderMP3Cover[J]. Telecommunications Science, 2018, 34(4): 68-80.
"
拟合方式 | 嵌入率 | ||||||||||
3.3% | 6.6% | 9.9% | 13.2% | 16.5% | 19.8% | 23.1% | 26.4% | 29.7% | 33% | ||
估计长度 | 未修正 | 2.66 | 5.74 | 7.82 | 11.21 | 14.80 | 18.32 | 21.84 | 25.29 | 28.91 | 34.66 |
修正 | 2.13 | 4.69 | 9.38 | 12.85 | 16.61 | 20.23 | 24.09 | 27.52 | 31.21 | 32.38 | |
中值误差 | 未修正 | 2.34 | 2.12 | 2.19 | 3.03 | 2.89 | 2.77 | 2.96 | 3.24 | 3.26 | 3.26 |
修正 | 3.26 | 3.19 | 3.25 | 2.59 | 2.60 | 2.61 | 2.92 | 2.89 | 2.78 | 2.96 |
"
码率/(kbit·s-1) | 检测方法 | 嵌入率 | ||||||||||
10% | 20% | 30% | 40% | 50% | 60% | 70% | 80% | 90% | 100% | |||
64 | 估计长度 | Jin算法 | 12.96 | 22.78 | 33.54 | 42.65 | 52.84 | 62.50 | 72.14 | 81.31 | 91.20 | 95.78 |
本文算法 | 11.63 | 21.04 | 31.08 | 40.39 | 50.31 | 60.21 | 69.89 | 79.26 | 88.20 | 94.82 | ||
中值误差 | Jin算法 | 8.42 | 8.70 | 8.52 | 8.62 | 8.70 | 7.78 | 8.32 | 7.97 | 6.80 | 0.00 | |
本文算法 | 7.75 | 7.88 | 7.51 | 7.85 | 7.77 | 7.53 | 7.68 | 7.94 | 6.96 | 2.09 | ||
128 | 估计长度 | Jin算法 | 12.30 | 22.48 | 33.67 | 43.69 | 52.64 | 62.39 | 71.60 | 80.74 | 91.28 | 97.23 |
本文算法 | 10.96 | 20.98 | 31.11 | 40.94 | 50.11 | 59.95 | 69.50 | 78.87 | 89.45 | 96.28 | ||
中值误差 | Jin算法 | 6.44 | 6.63 | 6.67 | 6.58 | 5.98 | 5.88 | 5.65 | 5.50 | 5.76 | 0.00 | |
本文算法 | 5.88 | 6.10 | 6.09 | 6.26 | 5.73 | 5.70 | 5.70 | 5.32 | 5.78 | 1.25 | ||
192 | 估计长度 | Jin算法 | 11.48 | 21.91 | 33.51 | 43.95 | 52.49 | 62.28 | 71.68 | 80.85 | 91.25 | 97.38 |
本文算法 | 10.81 | 20.98 | 31.41 | 41.55 | 50.35 | 60.26 | 69.88 | 79.25 | 89.83 | 96.69 | ||
中值误差 | Jin算法 | 6.36 | 6.32 | 6.57 | 6.61 | 5.65 | 5.26 | 5.52 | 5.31 | 5.25 | 0.00 | |
本文算法 | 5.43 | 5.67 | 5.47 | 5.34 | 5.14 | 5.05 | 5.23 | 5.23 | 4.87 | 0.49 | ||
256 | 估计长度 | Jin算法 | 13.29 | 23.73 | 34.89 | 44.05 | 53.38 | 62.82 | 71.87 | 80.97 | 90.93 | 97.16 |
本文算法 | 10.90 | 21.16 | 31.50 | 40.69 | 50.53 | 60.15 | 69.47 | 78.82 | 89.24 | 96.45 | ||
中值误差 | Jin算法 | 6.78 | 7.14 | 6.86 | 6.83 | 6.56 | 6.25 | 5.84 | 5.86 | 5.59 | 0.00 | |
本文算法 | 5.97 | 5.58 | 5.55 | 5.42 | 5.45 | 5.36 | 5.17 | 5.17 | 5.01 | 1.29 |
"
码率/(kbit·s-1) | 检测方法 | 嵌入率 | ||||||||||
5% | 10% | 15% | 20% | 25% | 30% | 35% | 40% | 45% | 50% | |||
64 | 估计长度 | Jin算法 | 8.67 | 12.65 | 17.28 | 22.02 | 27.44 | 32.53 | 37.45 | 42.60 | 47.52 | 51.92 |
本文算法 | 7.78 | 11.96 | 16.57 | 21.12 | 26.26 | 31.28 | 36.24 | 40.78 | 45.82 | 50.29 | ||
中值误差 | Jin算法 | 5.00 | 8.89 | 8.66 | 8.82 | 8.97 | 8.89 | 8.13 | 8.36 | 8.16 | 7.77 | |
本文算法 | 5.00 | 8.05 | 8.31 | 7.77 | 8.00 | 7.85 | 7.38 | 7.48 | 7.66 | 7.04 | ||
128 | 估计长度 | Jin算法 | 7.51 | 12.16 | 17.22 | 22.25 | 27.67 | 33.01 | 37.71 | 42.85 | 47.63 | 52.75 |
本文算法 | 6.87 | 11.37 | 16.61 | 21.15 | 26.71 | 31.89 | 36.51 | 41.15 | 45.77 | 51.26 | ||
中值误差 | Jin算法 | 5.00 | 6.56 | 6.40 | 6.28 | 5.92 | 6.24 | 6.10 | 5.97 | 6.22 | 6.16 | |
本文算法 | 5.00 | 5.82 | 6.02 | 5.89 | 5.91 | 5.86 | 5.53 | 5.60 | 5.55 | 5.56 | ||
192 | 估计长度 | Jin算法 | 6.73 | 11.51 | 16.74 | 21.69 | 26.88 | 32.62 | 37.64 | 42.38 | 47.10 | 52.21 |
本文算法 | 6.61 | 11.33 | 16.46 | 21.15 | 26.33 | 31.87 | 36.68 | 41.09 | 45.77 | 50.95 | ||
中值误差 | Jin算法 | 5.00 | 5.94 | 6.01 | 6.12 | 5.99 | 5.64 | 5.50 | 5.96 | 5.27 | 5.76 | |
本文算法 | 5.00 | 5.77 | 5.56 | 5.51 | 5.66 | 5.09 | 4.93 | 5.25 | 4.86 | 5.26 | ||
256 | 估计长度 | Jin算法 | 8.53 | 13.15 | 18.44 | 23.29 | 28.22 | 33.78 | 38.60 | 43.39 | 48.09 | 53.35 |
本文算法 | 6.76 | 11.42 | 16.49 | 21.06 | 26.23 | 31.76 | 36.48 | 40.97 | 45.76 | 51.00 | ||
中值误差 | Jin算法 | 5.00 | 6.61 | 6.69 | 6.58 | 6.60 | 6.69 | 6.24 | 6.32 | 6.39 | 6.24 | |
本文算法 | 5.00 | 5.69 | 5.57 | 5.57 | 5.46 | 5.56 | 5.20 | 5.28 | 5.22 | 4.89 |
"
码率/(kbit·s-1) | 检测方法 | 嵌入率 | ||||||||||
3.3% | 6.6% | 9.9% | 13.2% | 16.5% | 19.8% | 23.1% | 26.4% | 29.7% | 33.0% | |||
64 | 估计长度 | Jin算法 | 7.42 | 9.82 | 13.00 | 16.03 | 18.77 | 21.96 | 25.49 | 29.12 | 31.86 | 35.02 |
本文算法 | 6.46 | 8.73 | 11.49 | 14.59 | 17.39 | 20.44 | 23.89 | 27.49 | 30.03 | 33.19 | ||
中值误差 | Jin算法 | 3.30 | 6.60 | 8.80 | 8.83 | 8.11 | 8.89 | 8.12 | 8.62 | 8.12 | 8.23 | |
本文算法 | 3.30 | 6.60 | 8.13 | 7.49 | 7.50 | 7.73 | 7.70 | 7.78 | 7.10 | 7.72 | ||
128 | 估计长度 | Jin算法 | 6.08 | 8.76 | 11.97 | 15.08 | 18.66 | 21.87 | 25.71 | 29.25 | 32.91 | 36.28 |
本文算法 | 5.45 | 7.90 | 10.73 | 13.77 | 17.20 | 20.21 | 23.93 | 27.57 | 30.79 | 34.07 | ||
中值误差 | Jin算法 | 3.30 | 6.40 | 6.34 | 6.35 | 6.15 | 6.10 | 6.24 | 6.37 | 6.17 | 6.15 | |
本文算法 | 3.30 | 6.24 | 6.01 | 5.91 | 5.90 | 5.74 | 5.87 | 6.01 | 5.96 | 5.91 | ||
192 | 估计长度 | Jin算法 | 5.61 | 8.34 | 11.44 | 14.92 | 18.25 | 21.64 | 25.56 | 29.09 | 33.19 | 36.74 |
本文算法 | 5.27 | 7.81 | 10.70 | 14.01 | 17.25 | 20.47 | 24.10 | 27.62 | 31.33 | 34.76 | ||
中值误差 | Jin算法 | 3.30 | 6.13 | 6.26 | 6.20 | 5.71 | 6.11 | 6.66 | 6.21 | 6.47 | 6.45 | |
本文算法 | 3.30 | 5.38 | 5.28 | 5.57 | 5.14 | 4.97 | 5.39 | 5.71 | 5.23 | 5.54 | ||
256 | 估计长度 | Jin算法 | 7.06 | 9.81 | 13.01 | 16.45 | 19.42 | 22.85 | 26.83 | 30.29 | 34.01 | 37.76 |
本文算法 | 5.34 | 7.80 | 10.74 | 14.00 | 16.86 | 20.11 | 23.93 | 27.29 | 30.86 | 34.53 | ||
中值误差 | Jin算法 | 3.30 | 6.60 | 6.83 | 6.80 | 6.67 | 6.81 | 6.80 | 6.72 | 6.75 | 7.17 | |
本文算法 | 3.30 | 5.58 | 5.58 | 5.94 | 5.76 | 5.51 | 5.62 | 5.46 | 5.55 | 5.65 |
[2] | WANG S , WANG L F , JIN H M ,et al. Big data application in net-work security analysis[J]. Telecommunications Science, 2015,31(7): 145-150 |
[3] | 万威, 赵险峰, 黄炜 ,等. 基于码表分布特征和重编码的 MP3Stego隐写分析[J]. 中国科学院大学学报, 2012,29(1): 118-124. |
WAN W , ZHAO X F , HUANG W ,et al. Steganalysis of MP3Stego based on huffman table distribution and recoding[J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2012,29(1): 118-124. | |
[4] | 万威 . MP3音频隐写分析技术研究[D]. 北京:中国科学院大学, 2011. |
WAN W . Research on MP3 audio steganalysis technology[D]. Beijing:Chinese Academy of Sciences University, 2011. | |
[5] | PETITCOLAS F A P . MP3Stego[EB]. 2002. |
[6] | ACHMAD Z . MP3Stegz[EB]. 2007. |
[7] | PLATT C . UnderMP3Cover[EB]. 2002. |
[8] | FRIDRICH J , GOLJAN M , DU R . Detecting LSB steganography in color,and gray-scale images[J]. IEEE Multimedia, 2001,8(4): 22-28. |
[9] | 张涛, 平西建 . 基于差分直方图实现LSB信息伪装的可靠检测[J]. 软件学报, 2004,15(1): 151-158. |
ZHAN T , PING X J . Reliable detection of spatial LSB steganography based on difference histogram[J]. Journal of Software, 2004,15(1): 151-158. | |
[10] | JIN C , WANG R , YAN D ,et al. Steganalysis of UnderMP3Cover[J]. Journal of Computational Information Systems, 2012,8(24): 10459-10468. |
[11] | KER A D , . Improved detection of LSB steganography in grayscale images[C]// International Conference on Information Hiding,May 19-21,2004,Santa Barbara,California,USA. Berlin:Springer, 2004: 97-115. |
[12] | KER A D . Quantitative evaluation of pairs and RS steganalysis[J]. Proceedings of SPIE -The International Society for Optical Engineering, 2004(5306): 83-97. |
[13] | LUO X , LIU B , LIU F . Improved RS method for detection of LSB steganography[C]// International Conference on Computational Science and Its Applications,Dec 19-21,2008,Wuhan,China. Berlin:Springer Berlin Heidelberg, 2005: 508-516. |
[14] | 丁晋晶, 蒋铃鸽, 何晨 . 一种针对 LSB 嵌入方式水印的改进的全盲检测方案[J]. 高技术通讯, 2007,17(7): 681-685. |
DING J J , JIANG L G , HE C . An improved method of detecting LSB steganography[J]. Chinese High Technology Letters, 2007,17(7): 681-685. | |
[15] | 于禛, 陈克非 . RS 检测算法的分析与改进[J]. 计算机工程, 2008,34(8): 170-171. |
[1] | 郑志彬 . 信息网络安全威胁及技术发展趋势[J]. 电信科学, 2009,25(2): 28-34. |
ZHENG Z B . Overview of mobile communication services se-curity[J]. Telecommunications Science, 2009,25(2): 28-34. | |
[2] | 王帅, 汪来富, 金华敏 ,等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7): 145-150. |
[15] | YU Z , CHEN K F . Analysis and improvement on RS detection algorithm[J]. Computer Engineering, 2008,34(8): 170-171. |
[1] | Hui MA, Ruiqin WANG, Shuai YANG. A progressive growing of conditional generative adversarial networks model [J]. Telecommunications Science, 2023, 39(6): 105-113. |
[2] | Min LU, Juan HU, Xianchao ZHANG, Weijian DING, Guangxue YUE. Personalized recommendation model based on users multi-features fusion [J]. Telecommunications Science, 2023, 39(5): 101-115. |
[3] | Xiaoyun WANG, Wei DENG, Long ZHANG, Qi SUN. Research on multi-domain collaboration based method of TDD large-scale networking [J]. Telecommunications Science, 2023, 39(4): 43-51. |
[4] | Min LU, Zehao QIN, Zhihui CHEN, Min ZHANG, Guangxue YUE. 1D-Concatenate based channel estimation DNN model optimization method [J]. Telecommunications Science, 2023, 39(4): 71-86. |
[5] | Kehong A, Xiaodong HU. GAN data reconstruction based prediction method of telecom subscriber loss [J]. Telecommunications Science, 2023, 39(3): 135-142. |
[6] | Yudi SUN. A prediction model of massive 5G network users’ revisit behavior based on telecom big data [J]. Telecommunications Science, 2023, 39(2): 157-162. |
[7] | Ming WAN. Business model stakeholders and boundary reconstruction of 5GtoB [J]. Telecommunications Science, 2022, 38(Z1): 60-66. |
[8] | Shaolong YANG, Yingshuang LIU, Yingqi WEI, Yue HUANG. Research on DNS implementation scheme of 5G enterprise private network [J]. Telecommunications Science, 2022, 38(Z1): 149-157. |
[9] | Jiangxing WU. Revolution of the development paradigm of network technology system—network of networks [J]. Telecommunications Science, 2022, 38(6): 3-12. |
[10] | Hao DONG, Liang SONG, Cunqing HUA, Lingya LIU, Junhua TANG. Survey of the research and development on the maritime communication technology [J]. Telecommunications Science, 2022, 38(5): 1-17. |
[11] | Xinrong LYU, Youming LI, Yongqing WU, Xiaobo TANG. Receiver design of sparse Bayesian learning based MIMO-OFDM power line communication system [J]. Telecommunications Science, 2022, 38(2): 25-34. |
[12] | Qing SHEN, Wenbin GUO, Jungang LOU, Qiangguo YU. Personalized recommendation model with multi-level latent features [J]. Telecommunications Science, 2022, 38(2): 71-83. |
[13] | Peng ZHANG, Xiaoping JIN, Dongxiao CHEN. A genetic algorithm based method of optimizing dispersion matrix for RDSM system [J]. Telecommunications Science, 2022, 38(12): 46-55. |
[14] | Weina ZHOU, Lu LIU. A real-time detection method for multi-scale ships in complex scenes [J]. Telecommunications Science, 2022, 38(10): 67-78. |
[15] | Jian HU, Lei SUN, Yiyan YIN, Xiaokang YANG, Jingui BAI, Yejiang ZHANG. Research on 4G/5G voice quality optimization based on data mining and geographic visualization [J]. Telecommunications Science, 2022, 38(10): 131-139. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|