Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, th...
Ausführliche Beschreibung
Autor*in: |
Luo, Xiangyang [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2015 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 75(2015), 21 vom: 05. Juli, Seite 13557-13583 |
---|---|
Übergeordnetes Werk: |
volume:75 ; year:2015 ; number:21 ; day:05 ; month:07 ; pages:13557-13583 |
Links: |
---|
DOI / URN: |
10.1007/s11042-015-2759-2 |
---|
Katalog-ID: |
OLC2035026679 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035026679 | ||
003 | DE-627 | ||
005 | 20230503192913.0 | ||
007 | tu | ||
008 | 200819s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-015-2759-2 |2 doi | |
035 | |a (DE-627)OLC2035026679 | ||
035 | |a (DE-He213)s11042-015-2759-2-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Luo, Xiangyang |e verfasserin |4 aut | |
245 | 1 | 0 | |a Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2015 | ||
520 | |a Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. | ||
650 | 4 | |a Adaptive steganography | |
650 | 4 | |a Highly Undetectable steGO steganography | |
650 | 4 | |a Steganalysis | |
650 | 4 | |a Message extraction | |
650 | 4 | |a Syndrome-Trellis codes (STCs) | |
650 | 4 | |a Blind parameters recognition | |
700 | 1 | |a Song, Xiaofeng |4 aut | |
700 | 1 | |a Li, Xiaolong |4 aut | |
700 | 1 | |a Zhang, Weiming |4 aut | |
700 | 1 | |a Lu, Jicang |4 aut | |
700 | 1 | |a Yang, Chunfang |4 aut | |
700 | 1 | |a Liu, Fenlin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 75(2015), 21 vom: 05. Juli, Seite 13557-13583 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:75 |g year:2015 |g number:21 |g day:05 |g month:07 |g pages:13557-13583 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-015-2759-2 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 75 |j 2015 |e 21 |b 05 |c 07 |h 13557-13583 |
author_variant |
x l xl x s xs x l xl w z wz j l jl c y cy f l fl |
---|---|
matchkey_str |
article:13807501:2015----::tgnlssfuotgngahbsdnaaeercgiinf |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.1007/s11042-015-2759-2 doi (DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Luo, Xiangyang verfasserin aut Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition Song, Xiaofeng aut Li, Xiaolong aut Zhang, Weiming aut Lu, Jicang aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 21 vom: 05. Juli, Seite 13557-13583 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 https://doi.org/10.1007/s11042-015-2759-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 21 05 07 13557-13583 |
spelling |
10.1007/s11042-015-2759-2 doi (DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Luo, Xiangyang verfasserin aut Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition Song, Xiaofeng aut Li, Xiaolong aut Zhang, Weiming aut Lu, Jicang aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 21 vom: 05. Juli, Seite 13557-13583 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 https://doi.org/10.1007/s11042-015-2759-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 21 05 07 13557-13583 |
allfields_unstemmed |
10.1007/s11042-015-2759-2 doi (DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Luo, Xiangyang verfasserin aut Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition Song, Xiaofeng aut Li, Xiaolong aut Zhang, Weiming aut Lu, Jicang aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 21 vom: 05. Juli, Seite 13557-13583 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 https://doi.org/10.1007/s11042-015-2759-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 21 05 07 13557-13583 |
allfieldsGer |
10.1007/s11042-015-2759-2 doi (DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Luo, Xiangyang verfasserin aut Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition Song, Xiaofeng aut Li, Xiaolong aut Zhang, Weiming aut Lu, Jicang aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 21 vom: 05. Juli, Seite 13557-13583 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 https://doi.org/10.1007/s11042-015-2759-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 21 05 07 13557-13583 |
allfieldsSound |
10.1007/s11042-015-2759-2 doi (DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Luo, Xiangyang verfasserin aut Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition Song, Xiaofeng aut Li, Xiaolong aut Zhang, Weiming aut Lu, Jicang aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2015), 21 vom: 05. Juli, Seite 13557-13583 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 https://doi.org/10.1007/s11042-015-2759-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2015 21 05 07 13557-13583 |
language |
English |
source |
Enthalten in Multimedia tools and applications 75(2015), 21 vom: 05. Juli, Seite 13557-13583 volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 |
sourceStr |
Enthalten in Multimedia tools and applications 75(2015), 21 vom: 05. Juli, Seite 13557-13583 volume:75 year:2015 number:21 day:05 month:07 pages:13557-13583 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Luo, Xiangyang @@aut@@ Song, Xiaofeng @@aut@@ Li, Xiaolong @@aut@@ Zhang, Weiming @@aut@@ Lu, Jicang @@aut@@ Yang, Chunfang @@aut@@ Liu, Fenlin @@aut@@ |
publishDateDaySort_date |
2015-07-05T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035026679 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035026679</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192913.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-2759-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035026679</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-2759-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Luo, Xiangyang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Highly Undetectable steGO steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Message extraction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Syndrome-Trellis codes (STCs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blind parameters recognition</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Song, Xiaofeng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Xiaolong</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Jicang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Chunfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Fenlin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2015), 21 vom: 05. Juli, Seite 13557-13583</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:21</subfield><subfield code="g">day:05</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:13557-13583</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-2759-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2015</subfield><subfield code="e">21</subfield><subfield code="b">05</subfield><subfield code="c">07</subfield><subfield code="h">13557-13583</subfield></datafield></record></collection>
|
author |
Luo, Xiangyang |
spellingShingle |
Luo, Xiangyang ddc 070 misc Adaptive steganography misc Highly Undetectable steGO steganography misc Steganalysis misc Message extraction misc Syndrome-Trellis codes (STCs) misc Blind parameters recognition Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
authorStr |
Luo, Xiangyang |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Adaptive steganography Highly Undetectable steGO steganography Steganalysis Message extraction Syndrome-Trellis codes (STCs) Blind parameters recognition |
topic |
ddc 070 misc Adaptive steganography misc Highly Undetectable steGO steganography misc Steganalysis misc Message extraction misc Syndrome-Trellis codes (STCs) misc Blind parameters recognition |
topic_unstemmed |
ddc 070 misc Adaptive steganography misc Highly Undetectable steGO steganography misc Steganalysis misc Message extraction misc Syndrome-Trellis codes (STCs) misc Blind parameters recognition |
topic_browse |
ddc 070 misc Adaptive steganography misc Highly Undetectable steGO steganography misc Steganalysis misc Message extraction misc Syndrome-Trellis codes (STCs) misc Blind parameters recognition |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
ctrlnum |
(DE-627)OLC2035026679 (DE-He213)s11042-015-2759-2-p |
title_full |
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
author_sort |
Luo, Xiangyang |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
13557 |
author_browse |
Luo, Xiangyang Song, Xiaofeng Li, Xiaolong Zhang, Weiming Lu, Jicang Yang, Chunfang Liu, Fenlin |
container_volume |
75 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Luo, Xiangyang |
doi_str_mv |
10.1007/s11042-015-2759-2 |
dewey-full |
070 004 |
title_sort |
steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes |
title_auth |
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
abstract |
Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. © Springer Science+Business Media New York 2015 |
abstractGer |
Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. © Springer Science+Business Media New York 2015 |
abstract_unstemmed |
Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography. © Springer Science+Business Media New York 2015 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
21 |
title_short |
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes |
url |
https://doi.org/10.1007/s11042-015-2759-2 |
remote_bool |
false |
author2 |
Song, Xiaofeng Li, Xiaolong Zhang, Weiming Lu, Jicang Yang, Chunfang Liu, Fenlin |
author2Str |
Song, Xiaofeng Li, Xiaolong Zhang, Weiming Lu, Jicang Yang, Chunfang Liu, Fenlin |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-015-2759-2 |
up_date |
2024-07-03T23:29:44.364Z |
_version_ |
1803602503260962816 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035026679</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192913.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-2759-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035026679</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-2759-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Luo, Xiangyang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Highly Undetectable steGO (HUGO steganography) is a well-known image steganography method proposed in recent years. The security of HUGO steganography is analyzed in this paper, and a corresponding steganalysis method is proposed based on the blind coding parameters recognition. Firstly, the principle of covert communication based on HUGO steganography and the characteristics of the Syndrome-Trellis codes (STCs) used in HUGO are analyzed; and then the potential security risk of HUGO is pointed out; Secondly, based on the idea of the blind parameters recognition for channel coding, the submatrix parameter of STCs is recognized correctly, and thus the message embedded by HUGO can be extracted correctly by decode algorithm of STCs. A series of experimental results show that the proposed steganalysis method can not only detect the stego-images reliably, but also extract the embedded message correctly; these validated the existence of security flaw of HUGO steganography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Highly Undetectable steGO steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Message extraction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Syndrome-Trellis codes (STCs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blind parameters recognition</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Song, Xiaofeng</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Xiaolong</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Jicang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Chunfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Fenlin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2015), 21 vom: 05. Juli, Seite 13557-13583</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:21</subfield><subfield code="g">day:05</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:13557-13583</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-2759-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2015</subfield><subfield code="e">21</subfield><subfield code="b">05</subfield><subfield code="c">07</subfield><subfield code="h">13557-13583</subfield></datafield></record></collection>
|
score |
7.400321 |