期刊文献+

针对同义词替换信息隐藏的检测方法研究 被引量:9

Steganalysis on Synonym Substitution Steganography
下载PDF
导出
摘要 基于同义词替换的文本信息隐藏方法,可以通过对载体中的同义词进行有选择的替换来嵌入隐藏信息.通过分析,发现这种方法嵌入隐藏信息后会导致载体文本中同义词结对概率的明显增加.基于此,提出了一种通过分析文本中同义词结对值来进行隐藏信息检测的算法.实验表明,该检测算法漏警率约为4%,虚警率约为9.8%,证明该检测算法可以有效地检测基于同义词替换的文本信息隐藏方法隐藏的信息. As text steganography becomes a new research hotspot of security communication recently, text steganalysis, whose purpose is to detect the presence of secret message in text, has attracted more and more attention. At present, all existing methods concerning text steganography can be roughly divided into three categories: those based on invisible characters, those based on format, and those based on natural language processing. The important major technique shared by most of the natural language processing based steganographic methods is utilizing synonym substitution, which embeds secret information by substituting the synonyms selectively. Since it has the advantages of good imperceptibility, robustness, it is much more difficult for the steganalysis researchers to detect the existence of the hidden information embedded using this type of approaches. Nevertheless, it is found that the synonym substitution based steganography can lead to an obvious increase in the probability of synonym pairs in the carrier text. In the light of this observation, a steganalysis algorithm which makes use of the number of synonym pairs to decide whether the hidden information exists in text or not is proposed. Experimental results show that the proposed algorithm can efficiently break the text steganography lying on synonym substitution. The achieved false negative rate is approximately 4 % and the false positive rate is approximately 9.8 %.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第10期1696-1703,共8页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展规划基金项目(2006CB303000) 国家自然科学基金重点项目(60736016) 国家自然科学基金项目(60573045) 高等学校博士学科点专项科研基金项目(20050532007)~~
关键词 信息隐藏 隐写分析 同义词结对 同义词替换 文本 steganography steganalysis synonym pairs synonym substitution text
  • 相关文献

参考文献13

  • 1Cox I J, Kalker T, Pakura G, et al. Information transmission and steganography [C] //Proc of the 4th Int Workshop on Digital Watermarking. LNCS 3710. Berlin: Springer, 2005:15-29
  • 2夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736. 被引量:19
  • 3Lie Wennung, Lin Guoshiang. A feature -based classification technique for blind image steganalysis[J]. IEEE Trans on Multimedia, 2005, 7(6):1007-1020
  • 4Lyu S, Farid H. Steganalysis using higher order image statistics [J]. IEEE Trans on Information Forensics and Security, 2006, 1(1): 111-119
  • 5周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 6罗纲 孙星明.基于噪声检测的文本隐藏信息检测算法研究.湖南大学学报:自然科学版,2005,32(6):181-184.
  • 7Taskiran C, Topkara U, Topkara M, et al. Attacks on lexical natural language steganography systems [C] //Proc of the SPIE Int Conf on Security, Steganograpby, and Watermarking of Multimedia Contents VIII. San Jose: SPIE, 2006:607209
  • 8C Jun, A C Kot, L Jun, et al. Steganalysis of binary text images [C] //Proc of IEEE Int Conf on Acoustics, Speech, and Signal Processing. Piscataway:IEEE, 2005: 689-692
  • 9Atallah M J, McDonough C J, Raskin V, et al. Natural language processing for information assurance and security: An overview and implementations [C] //Proc of the 9th ACM/SIGSAC New Security Paradigms Workshop. New York: ACM, 2000: 51-65
  • 10Bolshakov I A, Gelbukh A. Synonymous paraphrasing using WordNet and Internet. Natural Language Processing and Information Systems [C]//Proc of the 9th Int Conf on Applications of Natural Language to Information Systems. LNCS 3136. Berlin: Springer, 2004: 312-323

二级参考文献26

  • 1张蕾.一个概念图编辑工具的设计与实现[J].西北大学学报(自然科学版),1996,26(6):483-487. 被引量:2
  • 2[1]N F Johnson, S Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 1998, 31(2): 26~34
  • 3[2]J Kelley. Terror groups hide behind Web encryption. USA Today News, 2001-02-05
  • 4[3]B Starr, G Utley. Hunt for bin Laden goes online. CNN News, 2002-07-23
  • 5[4]Avcbas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Trans on Image Processing, 2003, 12(2): 221~230
  • 6[5]Avcbas, B Sankur. Statistical analysis of image quality measures. The 10th European Signal Processing Conf(EUSIPCO'2000), Tampere, Finland, 2000
  • 7[6]A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proc of Information Hiding, Third Int'l Workshop, LNCS 1768. Berlin Heidelberg: Springer-Verlag, 2000. 61~76
  • 8[7]J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia(Special Issue on Security), 2001, 8(4): 22~28
  • 9[8]J Fridrich, R Du, M Long. Steganalysis of LSB encoding in color images. ICME'2000, New York, USA, 2000
  • 10[9]Y K Lee, L H Chen. An adaptive image steganographic model based on minimum-error LSB replacement. The 9th National Conf on Information Security, Taichung, Taiwan, 1999

共引文献43

同被引文献70

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部