期刊文献+

基于编码转移特性的信息隐藏掩密术掩密安全原则研究

Study on Steganographic Security in Information Hiding Based on Coding Transition Diagram
下载PDF
导出
摘要 本文针对信息隐藏领域中的掩密术(STEGANOGRAPHY)的安全性问题,研究分析了(Christain Cachin等文献中)传统信息隐藏模型的局限性.结合数据冗余空间的掩密术安全性,提出掩密术的编码安全性的分析方法.该方法结合编码转移图和编码转移概率矩阵,能分析目前应用最广泛的基于替换原理的掩密编码方式的安全性,并用编码子空间重心、掩密编码重心和编码子空间偏心度来度量掩密术编码对掩密术安全性的影响,进而提出掩密术编码安全原则,证明满足安全原则的编码转移矩阵的存在性.最后基于该掩密术编码安全原则,提出了对用量化后DCT系数携带密信的掩密术改进方法. Steganographic security is very important in information hiding. However,existing models of information hiding have many shortcomings in this field, informed by redundancy of data space, this paper proposed a new method, called Coding Transition Diagram ( CTD), to evaluate the security of the coding model of steganography. The method, which combines coding model and transition matrix, measures the security of coding models using statistics in data space. Based on the method, we introduced four rules to improve the security of coding model and proofed the existence of the coding model which fulfills the four rules in DCT space.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第B12期2322-2326,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60572111)
关键词 掩密术 数据冗余空间 安全性 编码转移图 编码安全原则 steganography redundancy of data space security coding transition diagram rules of coding
  • 相关文献

参考文献10

  • 1Cachin. An information-theoretic model for steganography[A ]. Information Hiding. Second International Workshop[ C ]. Berlin- Springer-Verlag, 1998. 306 - 318.
  • 2Ross Anderson. On the limits of steganography [ J ]. IEEE Journal on Selected areas in communications, 1998,16 (4) :474 -481.
  • 3Cox. Watermarking as communication with side information[ J ]. Proceeding of the IEEE, 1999,87 ( 7 ) : 1127 -1141.
  • 4Kazenbeisser. Defining security in steganographic systems[ A ]. Security and Watermarking of Multimedia Contents IV[C]. San Jose:Proceedings of the SPIE,2000.50 -56.
  • 5Craver. On public-key steganography in the presence of an active warden [ A ]. Information Hiding: Second International Workshop [ C ]. Berlin: Springer-Verlag, 1998. 355 -368.
  • 6Hopper. Provably secure steganography [ A ]. Advances in Cryptology: CRYPTO [ C ]. London: Springer-Verlag,2002.77 - 92.
  • 7宋辉,孔祥维,尤新刚,胡岚.数据冗余空间中的掩密术安全性[J].中山大学学报(自然科学版),2004,43(A02):87-90. 被引量:3
  • 8Jessica Fridrich. Secure steganographic Methods for palette images [ A ]. Information Hiding: Third International Workshop [ C ]. London: Springer-Verlag, 1999.47 - 60.
  • 9Jessica Fridich. Perturbed quantization steganography with wet paper codes [ A]. 2004 International Multimedia Conference [ C ]. New York :ACM Press,2004.4 - 15.
  • 10Hany Farid. Detecting hidden messages using higher-order statistical model [ A ]. 2002 International Conference on Image Processing (ICIP) [ C ]. New York, 2002. 905 -908.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部