Time filter

Source Type

Zhu T.T.,Hubei University | Zhu T.T.,Wuhan Naval University of Engineering | Zhu T.T.,The Key Laboratory of Aerospace Information Security and Trust Computing | Wang L.N.,Hubei University | And 4 more authors.
Applied Mechanics and Materials | Year: 2013

In this paper, a JPEG steganalysis algorithm based on locality preserving projection (LPP) dimensionality reduction method is proposed for detecting the unseen stego algorithms. The co-occurrence features are extracted from DCT-DWT domain and dimension is reduced by using the LPP method. For improving the generalization capability of the algorithm, SVDD is used as the classifier. Experimental results reveal the fact that our scheme has better generalization capability and is more effective than others. © (2013) Trans Tech Publications, Switzerland.

Zhu T.-T.,Hubei University | Zhu T.-T.,The Key Laboratory of Aerospace Information Security and Trust Computing | Zhu T.-T.,Hubei Engineering University | Wang L.-N.,Hubei University | And 7 more authors.
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2013

Steganalysis was discussed as a certain problem without considering the uncertain factors, which reduced the reliability of steganalysis. Accordingly, the uncertainty factors, in universal steganalysis, are analyzed. Then, based on uncertainty reasoning method, a steganalysis model considering the uncertain factors from features extraction, classifier training and decision is put forward. Moreover, an universal steganalysis algorithm is proposed based on Dempster-Shafer(D-S) evidence theory. The experimental results show that the reliability and scalability of the algorithm is higher than previous algorithms and uncertainty theory is validity to resolve the steganalysis problems.

Wang L.,Hubei University | Wang L.,The Key Laboratory of Aerospace Information Security and Trust Computing | Jiang X.,Hubei University | Lian S.,Orange S.A. | And 3 more authors.
Soft Computing | Year: 2011

Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations. © 2009 Springer-Verlag.

Ye D.,Singapore Management University | Ye D.,Hubei University | Ye D.,The Key Laboratory of Aerospace Information Security and Trust Computing | Ma L.,Hubei University | And 3 more authors.
International Journal of Computational Intelligence Systems | Year: 2011

Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work, a new computer-based copyright control system used to detect the media has been proposed. Based on this system, this paper proposes an improved media feature matching measure and an entropy based copy detection method. The Levenshtein Distance was used to enhance the matching degree when using for feature matching measure in copy detection. For entropy based copy detection, we make a fusion of the two features of entropy matrix of the entropy feature we extracted. Firstly, we extract the entropy matrix of the image and normalize it. Then, we make a fusion of the eigenvalue feature and the transfer matrix feature of the entropy matrix. The fused features will be used for image copy detection. The experiments show that compared to use these two kinds of features for image detection singly, using feature fusion matching method is apparent robustness and effectiveness. The fused feature has a high detection for copy images which have been received some attacks such as noise, compression, zoom, rotation and so on. Comparing with referred methods, the method proposed is more intelligent and can be achieved good performance. © 2011 Copyright Taylor and Francis Group, LLC.

Dengpan Y.,Hubei University | Dengpan Y.,Singapore Management University | Dengpan Y.,The Key Laboratory of Aerospace Information Security and Trust Computing | Zhuo W.,Singapore Management University | And 2 more authors.
International Journal of Computational Intelligence Systems | Year: 2012

The content authenticity of the multimedia delivery is important issue with rapid development and widely used of multimedia technology. Till now many authentication solutions had been proposed, such as cryptology and watermarking based methods. However, in latest heterogeneous network the video stream transmission has been coded in scalable way such as H.264/SVC, there is still no good authentication solution. In this paper, we firstly summarized related works and proposed a scalable content authentication scheme using a ratio of different energy (RDE) based perceptual hashing in Q/S dimension, which is used Dempster-Shafer theory and combined with the latest scalable video coding (H.264/SVC) construction. The idea of "sign once and verify in scalable way" can be realized. Comparing with previous methods, the proposed scheme based on perceptual hashing outperforms previous works in uncertainty (robustness) and efficiencies in the H.264/SVC video streams. At last, the experiment results verified the performance of our scheme. © 2012 Copyright the authors.

Xu M.-D.,Wuhan Digital and Engineering Institute | Zhang H.-G.,The Key Laboratory of Aerospace Information Security and Trust Computing | Zhang F.,Hangzhou Dianzi University | Yang L.-J.,Wuhan Digital and Engineering Institute
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2014

Chain of trust (CoT) is one of the key technologies for constructing trusted system. As viewed from theories and application systems of CoT, this paper introduced several representative models and the latest investigations including noninterference-based CoT theory and composition security-based CoT theory firstly. Afterward, this paper expatiated advantage and shortage of two CoT theories in detail. Secondly, this paper introduced the development of application systems comprising static CoT and dynamic CoT, and analyzed the remote attestation technology of chain of trust, and presented the CoT systems in cloud computing environment, and analyzed the security deficiency of those systems, and then discussed the conformance testing and security evaluation for CoT application system. Finally, this paper put forward the research and development trend for CoT. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.

Loading The Key Laboratory of Aerospace Information Security and Trust Computing collaborators
Loading The Key Laboratory of Aerospace Information Security and Trust Computing collaborators