期刊文献+

流媒体信息隐藏的安全性界定及安全容量模型 被引量:2

Secure definition and secure capacity model of streaming-media information hiding
下载PDF
导出
摘要 针对目前流媒体信息隐藏尚无具有普遍意义的理论模型问题,从流媒体的载体特性出发,借鉴信息论和最优化技术,在阐述流媒体信息隐藏的安全性原理的基础上,给出了其不可感知性和不可检测性的定义.分析了隐藏容量的相对性和安全容量问题,进而提出一种流媒体多隐藏信道安全容量模型,指出多隐秘信道的并行使用将有助于获得最佳的隐藏性能. Aiming at the problem that the streaming-media information hiding has no universal theory model until now, the formal definition of perceptive transparency and statistical security were given based on elaborating secure principle of streaming-media information hiding using information theory and optimization techniques from the carrier of streaming-media characteristic. The relativity of hiding capacity and secure capacity were investigated, a secure capacity model of multi-hiding information channel based on streaming- media was proposed, the coven multi-channel of streaming-media can be employed in parallel to achieve a nice hiding performance.
出处 《郑州轻工业学院学报(自然科学版)》 CAS 2012年第3期5-10,共6页 Journal of Zhengzhou University of Light Industry:Natural Science
基金 福建省自然科学基金计划资助项目(2011J05151) 华侨大学科研基金资助项目(11BS210) 华侨大学"中央高校基本科研业务费"(JB-ZR1131 JB-ZR1148) 福建省重大科技计划专项(2011H6016)
关键词 信息隐藏 隐蔽通信 流媒体 安全隐藏容量 information hiding covert communication streaming-media secure hiding capacity
  • 相关文献

参考文献17

  • 1Provos N, Honeyman P. Hide and seek:an introduction to steganography [ J ]. IEEE Security & Privacy Magazine,2003,1(3) :32.
  • 2Raphael E, Thomas L, Roger W. Hidden communication in P2P networks: steganographic handshake and broadcast [ C]//Proc of the 30th IEEE Int Conf on Comp Corn (INFOCOM 2011) ,Los Alamitos:IEEE,2011:1 -9.
  • 3Ramirez D H. IPTV Security:Protecting High-value Digital Contents [ M ]. Hoboken : Wiley Press,2008. Tian H,Jiang H,Zhou K,et al. Adaptive partial-matching steganography for voice over IP using triple m sequences [ J ]. Comp Corn,2011,34 ( 18 ) :2236.
  • 4Tian H,Jiang H,Zhou K,et al. Adaptive partial-matching steganography for voice over IP using triple m sequences [ J ]. Comp Corn,2011,34 ( 18 ) :2236.
  • 5Huang Y, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec [ J ]. IEEE Trans on Infor Forensics and Security,2011,6(2) :296.
  • 6Mazurezyk W, Lubacz J. LACK--A VoIP steganographic method[ J ]. Telecom Syst J ,2010,45 ( 2 - 3 ) : 153.
  • 7Lubacz J, Mazurczyk W, Szczypiorski K. Vice over IP [ J ]. IEEE Spectrum, 2010,47 (2) :42.
  • 8Tian H,Zhou K, Feng D. Dynamic matrix encoding strategy for voice-over-IP steganography[ J ]. J of Central South Univ of Tech,2010,17(6) :1255.
  • 9Tian H,Zhou K, Jiang H, et al. Digital logic based encoding strategies for voice-over-IP steganography [ C ]//Proc of the 17th ACM Multimedia Conf, Beijing: [ s. n. ], 2009:777 - 800.
  • 10肖博,黄永峰.流媒体隐蔽通信系统模型及性能优化[J].西安电子科技大学学报,2008,35(3):554-558. 被引量:8

二级参考文献13

  • 1周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 2陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,33(2):21-23. 被引量:37
  • 3Provos N,Honeyman P.Hide and Seek:an Introduction to Steganography[J].IEEE Security & Privacy,2003,1(3):32-44.
  • 4Wang H,Wang S.Cyber Warfare:Steganography vs Steganalysis[J].Communications of the ACM,2004,47(10):76-82.
  • 5Cachin C.An Information-Theoretic Model for Steganography[C]//Information Hiding,Second International Workshop,IH98.Portland:Proceedings,1998:307-318.
  • 6Moulin P,O'Sullivan J A.Information-Theoretic Analysis of Information Hiding[J].IEEE Trans on Information Theory,2003,49(3):563-593.
  • 7Fridrich J,Rui D.Secure Stegangraphic Methods for Palette Images:Vol 1 768[C]//The 3rd Information Hiding Workshop,Lecture in Computer Science.Berlin:Springer-Verlag,2000:47-60.Zhou Wenjin,Fan Mingyu,Wang Guangwei.An Information Hiding Method to LSB of BMP Images[J].China Information Security,2005,7:253-255.
  • 8Dittmann J,Stabenau M,Steinmetz R.Robust MPEG Video Watermarking Technologies[C]//Proceedings of the Sixth ACM International Conference on Multimedia.Bristol:ACM,1998:71-80.
  • 9Xu Changyong,Ping Xijian,Zhang Tao.Steganography in Compressed Video Stream[C]//Proceedings of the First International Conference on Innovative Computing,Information and Control (ICICIC'06).Washington:IEEE Computer Society,2006:269-272.
  • 10Dittmann J,Vogel T,Hillert R.Design and Evaluation of Steganography for Voice-over-IP[C]//Circuits and Systems,ISCAS 2006.Island of Kos:IEEE CAS Society,2006:4-7.

共引文献8

同被引文献15

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部