期刊文献+

基于翻译的信息隐藏分析检测 被引量:2

Analysis and Detection of Translation-Based Steganography
下载PDF
导出
摘要 基于翻译的信息隐藏(Translation-Based Steganography,TBS)是一类文本信息隐藏算法,它利用不同的翻译机对同一个句子翻译产生的结果一般不同这一特性,使用多台翻译机翻译同一段文本,最终译文的每个句子根据隐藏信息来选择不同翻译机的翻译结果以形成隐藏文本.这种方法基本保证了隐藏文本语法的正确性和语义的连贯性,传统的检测算法很难发现隐藏文本.本文研究发现,在知道TBS算法所使用的翻译机集合的条件下存在一种TBS检测算法,因此对TBS算法所使用的翻译机集合保密是TBS算法安全的关键.文章从理论上分析了检测算法的有效性,并给出了算法的过程和实验结果.另外,我们还给出了增强TBS安全性的方法. Translation-Based Steganography(TBS) is a class of text steganography.When translating the same sentence from a natural language to another by different translators,there are normally different translation results.Making use of this property,TBS chooses from different translation results of a sentence according to secrete messages to generate stego-text.Because TBS basically preserves syntactic correctness and semantic coherence,it is comparatively difficulty for traditional detections to detect this method.Our research shows that there exists a detection method for TBS when we know the Machine Translation(MT) set that being used by TBS.So it is crucial important to keep a secret of the MT set.This paper theoretically analyzes the effective of our detection method and gives the detection process and experiment results.Additionally,we propose a method to improve the security of TBS.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第8期1748-1752,共5页 Acta Electronica Sinica
基金 国家自然科学基金重大研究计划(No.90818005) 国家自然科学基金(No.60773032 No.60703071) 教育部博士点基金(No.2006CB303006) 江苏省自然科学基金(No.BK2007060)
关键词 信息隐藏 信息隐藏检测 机器翻译 机器可逆度 机器倾向度 机器生成度 steganography steganalysis machine translation degree of machine reversibility degree of machine preference degree of machine generated
  • 相关文献

参考文献19

  • 1K Bennett.Linguistic Steganography:Survey,Analysis,and Robustness Concerns for Hiding Information in Text .Purdue University,2004-13.
  • 2Petitcolas,FAP,Anderson,RJ,Kuhn,MG.Information hiding-A survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 3J T Brassil,S Low, N F Maxemchuk.Copyright protection for electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7):1181-1196.
  • 4J Brassil,S Low,N Maxemchuk,L O’Garman.Electronic marking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1495:1504.
  • 5曹卫兵,戴冠中,夏煜,慕德俊.基于文本的信息隐藏技术[J].计算机应用研究,2003,20(10):39-41. 被引量:36
  • 6Bergmair R.Towards Linguistic Steganography:A Systematic Investiga-tion of Approaches Systems and Issues .Vienna,Austria,University of Derby,2004.
  • 7Atallah M J,McDonough C J,Raskin V,et a1.Natural language processing for information assurance and security:an overview and implementations .Proceedings New Security Paradigm Workshop .New York:ACM,2000.51-65.
  • 8Wayner,P.Mimic functions[J].Cryptologia 1992,16(3):193-214.
  • 9Chapman M,G Davida.Hiding the hidden:a software system for concealing ciphertext as innocuous text .In Proceedings of the International Conference on Information and Communication Security.1997,Lecture Notes in Computer Sciences 1334 .Berlin:Springer,1997.333-345.
  • 10Christian Grothoff,Krista Grothoff,Ludmila Alkhutova,Ryan Stutsman,Mikhail J Atallah.Translation-based steganography .In Proceedings of Information Hiding Workshop (IH 2005) .Berlin:Springer,2005.213-233.

二级参考文献2

  • 1吴世忠 祝世雄 张文政 等.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 2贾英江,傅孝忠,于鑫.数字文档的数字水印[J].小型微型计算机系统,2000,21(10):1067-1068. 被引量:37

共引文献35

同被引文献11

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部