期刊文献+

A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2

A SVM Based Text Steganalysis Algorithm for Spacing Coding
下载PDF
导出
摘要 Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.
作者 YANG Yu
出处 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页 中国通信(英文版)
基金 the National Natural Science Foundation of China under Grant No.61170269,No.61170272,No.61202082,No.61003285,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308,No.BUPT2013RC0311
关键词 text steganalysis SVM steganalysis space-coding detecting 支持向量机 文本 编码 算法 SVM分类器 间距 通信覆盖 隐藏方法
  • 相关文献

参考文献1

二级参考文献11

  • 1周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 2BERGMA1R R. A comprehensive bibliography of linguistic steganography[A]. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents[C]. San Jose, CA, 2007.333-338.
  • 3TOPKARA U, TOPKARA M, ATALLAH M J. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions[A]. ACM Multimedia and Security Workshop[C]. Geneva, Switzerland, 2006. 164-174.
  • 4CHAPMAN M, DAVIDA G. Plausible deniability using automated linguistic steganography[A]. InfraSec 2002[C]. Bristol, UK, 2002. 276-287.
  • 5ATALLAH M J, RASKIN V, HEMPELMANN C F, et al. Natural language watermarking and tamperproofing[A]. Information Hiding[C]. Noordwijkerhout, Netherlands, 2002.196-212.
  • 6TOPKARA M, TOPKARA U, ATALLAH M J. Words are not enough-sentence level natural language watermarking[A]. The 4th ACM International Workshop on Contents Protection and Security[C]. Santa Barbara, California, USA, 2006, 37-46.
  • 7WAYNER P. Mimic functions[J]. Cryptologia, 1992, 16(3):193-214.
  • 8SECURSTAR GMBH. Sams big play maker[EB/OL], http://www. scramdisk, clara.net/play/playmaker.html, 2006-10-12.
  • 9SUI X G LUO H, ZHU Z L. A steganalysis method based on the distribution of first letters of words[A]. 1EEE 2006 International Con- ference on Intelligent Information Hiding and Multimedia Signal processing[C]. Pasadena, California, USA, 2006. 369-372.
  • 10DAVID J M. Information Theory, Inference and Learning Algorithms[M]. London: Cambridge Unversity Press,2003.

共引文献1

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部