期刊文献+

基于K-L差异的隐密术安全性理论研究 被引量:2

The Study of Security in Steganography Based on K-L Divergence
下载PDF
导出
摘要 隐密术安全性理论研究一直是被广泛关注的研究重点和难点。该文通过对K-L差异的回顾及隐密术安全性的定性分析,指出Cachin给出的安全性定义缺乏一般性。同时注意到除概率分布的差异外,隐密信息的样本量和状态集合的势对隐密信息的安全性也有重要影响。结合对隐密信息安全性的定性分析,给出了一个基于K-L差异及假设检验的隐密术安全性定义,并推导出修改率对于隐密术安全性的影响。最后结合现有的隐密算法和隐密分析算法设计了一组对比试验,以验证该文理论分析的有效性。 This paper presents a universality method for measure of security in steganography. According to the definition of K-L divergence and the properties of security in steganography, some limitations in Cachin's definition of security are shown in the beginning. Besides the divergence of probability distributions between stego and cover, the sample size and the cardinality of the state set of random variable have great effect on security in steganography Based on K-L divergence and hypothesis testing, an amended measure of security and a useful illation are presented The result of examination can prove that the new measure of security is reasonable.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第2期439-443,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60572111)资助课题
关键词 隐密术 安全性度量 K—L差异 样本量 Steganography Measure of security K-L divergence Sample size
  • 相关文献

参考文献14

  • 1尤新刚 周琳娜 郭云彪.信息隐藏学科的主要分支及术语[C]..见:信息隐藏全国学术研讨会(CIHW2000/2001)[C].西安电子科技大学出版社,2001..
  • 2Simmons G J. The prisoners' problem and the subliminal channel[C]. IEEE Workshop Communications Security CRYPTO, New York, 1983: 51-67.
  • 3Ettinger J M. Steganalysis and game equilibria[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 319-328.
  • 4Mittelholzer T. An information-theoretic approach to steganography and watermarking[C]. Information Hiding, Dresden, Germany, LNCS, 1999, 1768: 1-16.
  • 5Moulin P and O'Sullivan J A. Information-theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3): 563-593.
  • 6Cachin C. An information-theoretic model for steganography[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 306-318.
  • 7Chert B and Wornell G. Quantization index modulation: A class of provably good method watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 48(4): 1423-1443.
  • 8Kim Y, Duric Z, and Richards D. Modified matrix encoding technique for minimal distortion steganography[C]. Information Hiding 2006, VA, USA, LNCS, 2006, 4437: 314-327.
  • 9Fridrich J, Pevny T, and Kodovsky K. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities[C]. The 9th Workshop on Multimedia & Security, Dallas, Texas, USA, 2007: 3-14.
  • 10Ker A. A capacity result for batch steganograph [J]. IEEE Signal Processing Letters, 2007, 14(8): 525-528.

共引文献3

同被引文献11

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部