首页> 外文会议>Joint International Computer Conference >EXTRACTING ATTACK TO LSB STEGANOGRAPHY OF JPEG IMAGES
【24h】

EXTRACTING ATTACK TO LSB STEGANOGRAPHY OF JPEG IMAGES

机译:提取攻击JPEG图像的LSB隐写术

获取原文

摘要

The "extracting attack" on steganography is a kind of steganalysis, the purpose of which is to extract the hidden message or recover the stego-key. In this paper we discuss how to recover the key of LSB JPEG steganographic schemes such as "JP hide and seek". In fact, extracting attack can be treated as a special kind of cryptanalysis, and we solve this problem by using both traditional steganalysis and traditional cryptanalysis. Our approach is to build a set as a measure, and this measure have some advantage of accordant probability with the correct key, so the correlation attack of cryptanalysis can be used to identify the stegokey. Experiments show that the search speed is 6400-8000 keys per second. This speed would allow us to search through all numerical passwords of length up to 16 bit keys in about 8 seconds.
机译:隐写术的“提取攻击”是一种麻木分析,其目的是提取隐藏的消息或恢复标号键。在本文中,我们讨论如何恢复LSB JPEG隐点方案的关键,例如“JP隐藏和搜索”。事实上,提取攻击可以被视为一种特殊的密码分析,我们通过使用传统的隐藏和传统密码分析来解决这个问题。我们的方法是将一个设置为一个措施,并且该措施具有与正确的键有一致概率的一些优势,因此可以使用密码分析的相关性攻击来识别标志性。实验表明,每秒搜索速度为6400-8000键。此速度将允许我们在大约8秒内完成长度最多16位键的所有数字密码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号