期刊文献+

数据冗余空间中的掩密术安全性 被引量:3

Security of Steganography Based on Space of Redundancy Data
下载PDF
导出
摘要 分析了目前掩密术的研究的理论和掩密术安全性评估理论,指出了目前掩密术研究框架的部分局限性和现有掩密术安全性理论的不足。在视觉冗余的基础上提出了基于数据冗余性的掩密术定义和掩密术安全评估准则。 After analyzing the actual steganographic theoretics and the theoretics of evaluation of steganographic security,some localization in steganographic framework and theoretics of steganographic security are found out. Besides visual redundancies, defines of the stegangraphy and evaluation of steganographic security base on data redundancies were given out.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第A02期87-90,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家"863"高技术研究发展计划资助项目(2002AA054010) 国家自然科学基金资助项目(60372083)
关键词 掩密术安全性 数据冗余性 掩密术安全评估 security data redundancies evaluation of steganographic security
  • 相关文献

同被引文献19

  • 1郭艳卿,何德全,尤新刚,孔祥维.信息隐藏的层次安全性[J].中山大学学报(自然科学版),2004,43(A02):105-108. 被引量:4
  • 2张志涌.精通MATLAB6.5[M].北京航空航天大学出版社,2003..
  • 3Cachin. An information-theoretic model for steganography[A ]. Information Hiding. Second International Workshop[ C ]. Berlin- Springer-Verlag, 1998. 306 - 318.
  • 4Ross Anderson. On the limits of steganography [ J ]. IEEE Journal on Selected areas in communications, 1998,16 (4) :474 -481.
  • 5Cox. Watermarking as communication with side information[ J ]. Proceeding of the IEEE, 1999,87 ( 7 ) : 1127 -1141.
  • 6Kazenbeisser. Defining security in steganographic systems[ A ]. Security and Watermarking of Multimedia Contents IV[C]. San Jose:Proceedings of the SPIE,2000.50 -56.
  • 7Craver. On public-key steganography in the presence of an active warden [ A ]. Information Hiding: Second International Workshop [ C ]. Berlin: Springer-Verlag, 1998. 355 -368.
  • 8Hopper. Provably secure steganography [ A ]. Advances in Cryptology: CRYPTO [ C ]. London: Springer-Verlag,2002.77 - 92.
  • 9Jessica Fridrich. Secure steganographic Methods for palette images [ A ]. Information Hiding: Third International Workshop [ C ]. London: Springer-Verlag, 1999.47 - 60.
  • 10Jessica Fridich. Perturbed quantization steganography with wet paper codes [ A]. 2004 International Multimedia Conference [ C ]. New York :ACM Press,2004.4 - 15.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部