期刊文献+

对MP3Stego的攻击研究 被引量:7

Attacking Study of MP3Stego
下载PDF
导出
摘要 针对普遍使用的MP3水印嵌入的最新软件MP3Stego1 1 16版 ,提出一种攻击思想 :在不降低隐蔽音频质量、不改变其统计分布规律的条件下 ,使嵌入在音频上的隐藏数据失效 ,从而无法正确提取水印 根据这种思想 ,结合MP3Stego1 1 16软件 ,提出三种直接有效的攻击方法 ,并进行了听觉、统计分布。 A new attacking principle is given to the newest typical MP3 embedding software MP3Stego V1 1 16 The principle is to make the embedded data invalid and keep the quality of original MP3 and its statistic distribution unaffected Any information cannot be extracted from attacked MP3 Three attacking methods are presented to attack the MP3Stego V1 1 16 The experiment results demonstrate their validity
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2003年第8期954-960,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国家重点基础研究发展规划项目(G19980 3 0 42 0 )资助
关键词 MP3Stego1.1.16软件 数字音频媒体 信息隐藏 数字水印 MP3Stego attack method statistic distribution validity
  • 相关文献

参考文献12

  • 1杨洋 戴跃伟 王执铨.一种基于块分类的DCT域音频水印技术[A]..全国第三届信息隐藏学术研讨会((2IHW'2001)[c].西安:西安电子科技大学出版社,2001.129~134.
  • 2王道顺,梁敬弘,戴一奇,罗颂,齐东旭.图像水印系统有效性的评价框架[J].计算机学报,2003,26(7):779-788. 被引量:16
  • 3易克初 田斌 付强 等.语音信号处理[M].北京:国防工业出版社,2001..
  • 4Gruhl D, Bender W, Lu A. Echo Hiding in Information Hiding[M]. In: Anderson R J, ed. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996, 1174:295--315.
  • 5Lie Wen-Nung, Chang Li-Chun. Robust and high-quality timedomain audio watermarking subject to psychoacoustic masking[J]. Circuits and Systems, 2001, 2:245--248.
  • 6Lu Chunshien, Liao Hongyuan, Mark Chen Lianghua.Multipurpose audio watermarking [A]. In: Proceedings of the 15th International Conference on Pattern Recognition,Barcelona, Spain, 2000, Ⅲ: 286--289.
  • 7Chang L, Moskowitz I S. Critical analysis of security in voice hiding techniques [A]. In: Proceedings of the International Conference on Information and Communications Security, vol 1334 of Lecture Notes in Computer Science [C]. Berlin:Springer, 1997. 203--216.
  • 8University of Cambridge, Computer Laboratory. MP3Stego [OL]. http://www, cl. cam. ac. uk/-- fapp2/steganography/MP3Stego/index. html, 2002.
  • 9Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Attacks on copying marking systems [OL]. http://www, cl.cam. ac. uk/Research/Security/.
  • 10Fabien A P Petitcolas, Ross J Anderson. Weaknesses of copyright marking systems [OL]. http://www, cl. cam. ac. uk/Research/Security/.

二级参考文献28

  • 1Anderson R ed. Information hiding. LNCS 1174, Berlin: Spinger-Verlag, 1996.
  • 2Aucsmith D ed. Information hiding. LNCS 1525, Berlin: Spinger-Verlag, 1998.
  • 3Pfitzmann A ed. Information hiding. LNCS 1768, Berlin: Spinger-Verlag, 1999.
  • 4Moskowitz I S ed. Information hiding. LNCS 2137,Berlin: Spinger-Verlag, 2001.
  • 5Katzenbeisser S, Petitcolas F A P. Information Hiding Techniques for Steganography and Digital Watermarking. Boston,London: Artech House,2000.
  • 6Cox I, Miller M L, Bloom J. Digital Watermarking. San Francisco,San Diego: Mogran Kaufemann Publishers, 2001.
  • 7Colins L. International between contract and tort in the conflict of laws. International and Comparative Law Quarterly, 1967,16:103.
  • 8Johnson N F, Durie Z, Jajodia S. Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Boston, Dordreeht, London: Kluwer Academic Publishers, 2001.
  • 9Johnson N F. Information hiding: Steganography, attacks,and countermeasures[Ph D dissertation]. School George Mason University, Virginia, USA,2000.
  • 10Kurak C, McHughes J. A cautionary note on image downgrading. In: Proceeding of IEEE Computer Security Application Conference, 1992. 153~159.

共引文献22

同被引文献38

  • 1刘伟,王朔中,张新鹏.一种基于部分MP3编码原理的音频水印[J].中山大学学报(自然科学版),2004,43(A02):26-28. 被引量:7
  • 2尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 3钟桦,焦李成.DCT域半易损水印技术[J].计算机学报,2005,28(9):1549-1557. 被引量:12
  • 4陈芳,王冰.基于文本字体的信息隐藏算法[J].计算机技术与发展,2006,16(1):20-22. 被引量:9
  • 5Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3-4) :313.
  • 6Gruhl D, Lu A, Bender W. Echo hiding[C]//International Workshop on Information Hiding. London: Springer, 1996.
  • 7Chen O T, Wu W C. Highly robust secure and perceptual-quality echo hiding scheme[J]. IEEE Trans- actions on Audio, Speech, and Language Processing, 2008, 16(3): 629.
  • 8Petitcolas F. MP3Stego[EB/OL]. (1998-12-26). [2010-03-24] . http://www, petitcolas, net/fabien/ steganography/mp3stego/.
  • 9Westfeld A. Detecting the low embedding rates[C]. London: Springer, 2003.
  • 10WangCT, ChenTS, ChaoWH. Anewaudiowatermarking based on modified discrete cosine transform of MPEG/Audio Layer III[C]. Washington: IEEE, 2004.

引证文献7

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部