期刊文献+

多载体信息隐藏安全性研究 被引量:4

Research Security for Batch Steganography
下载PDF
导出
摘要 分析单载体信息隐藏技术的的特点和局限性,针对单载体信息隐藏的不足,提出一种多载体信息隐藏的理论模型.给出了其工作原理和实现过程,得到了载体的最大有效载荷与载体容量的关系.从信息论的角度对单载体信息隐藏和多载体信息隐藏的安全性进行了分析,并给出了形式化的证明,最后给出了完备多载体信息隐藏系统安全性的约束条件. This paper, analyzed features and limitations with single cover steganography, proposed a theoretical model of batch steganography for lack of single cover steganography. It expresses working principle and implementation process, and derives a closed form expression for maximal payload and capacity of covers. In this paper, it analyses steganographic security of single cover and batch covers by information theory, and gives formal proof. Finally, it obtains the security constraints of perfect batch steganosystem.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第4期644-646,共3页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773004)资助 山西省科技攻关项目(20090322004)资助 中北大学自然科学基金项目资助
关键词 多载体隐藏 安全性 信息隐藏 信息论 batch steganography steganographic security stegano^aphy information theory
  • 相关文献

参考文献10

  • 1Simmons G J. The prisoner's problem and the subliminal channel [ C ]. In Advances in Cryptology, Proceedings of CRY-PTO' 83, Plenum Press, 1983,51 -67.
  • 2Andrew D Ker. Batch steganography and pooled steganal-Ysis[C]. Processing of the 8th Information Hiding Workshop, 2006,265-281.
  • 3Andrew D Ker. Capacity result for batch steganography[J]. IEEE Signal Processing Letters,2007,14 (8) :525-528.
  • 4Hedieh Sajedi, Mansour Jamzad. Secure steganography based on embedding capacity[J]. Int J. Inf. Secur,2009,8(6) :433-445.
  • 5Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganagraphic schemes [ C ]. Processing of the 6th International Workshop on Information Hiding, 2005,67 -81.
  • 6Christian Cachin. An information-theoretic model for steganography[ C ]. Information Hiding 2nd International Workshop, 1998, 1525,306-318.
  • 7Andrew D Ker. A general framework for the structural steganalysis of LSB replacement[C]. Processing of the 7th Information Hiding Workshop, 2007,37(27):296-311.
  • 8Andrew D Ker. Steganalysis of embedding in two least-significant bits[J]. IEEE Transitions on Information Forensics and Security, 2007,1 (2):46-54.
  • 9Wang Bing-xi, Peng Tian-qiang. Information hiding technique [M]. Beijing:National Defense Industry Press ,2009.
  • 10Sallee P. Model-based methods for stegano graphy and steganalysis [J]. Int. J. Image Graph,2008,1 (5) :167-190.

同被引文献36

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部