期刊文献+

隐秘通信系统的对策论模型 被引量:3

A game-theoretic model to covert communication systems
下载PDF
导出
摘要 运用对策论方法,构造了隐秘通信系统的对策论模型,研究了信息隐藏者采用最优策略,在现有的隐秘通信技术条件下,能够更好地达到自己的预期目标。. We constructed a game-theoretic model of covert communication systems and researched the efficiency of the optimal strategy.
出处 《通信学报》 EI CSCD 北大核心 2004年第5期160-165,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60374066) 博士点基金资助项目(20020288025) 江苏自然科学基金资助项目(Bk2002101)
关键词 保密通信 系统模型 对策论 隐秘通信 secure communication system model theory of games covert communication
  • 相关文献

参考文献6

  • 1ZOLLNER J, FEDERRATH H. Modeling the security of steganographic systems[A]. Information Hiding: Second International Workshop[C]. Portland, USA, 1998. 344-354.
  • 2ANDERSONR PETITCOLASF.On the limits of steganography. IEEE Journal of Selected Areas in Communications, 1998,注3因为只有当试验次数相当大时,使用a1,a2的概率方为0.5,实验结果才能与理论结果相吻合[J].(4):474-481.
  • 3FRIDRICH J, GOL.JAN M. Practical steganalysis of digital images-state of the art[A]. Security and Watermarking of Multimedia Contents IV[C]. San Jose, USA, 2002. 1-13.
  • 4MACHADO R. Ezstego, stego online, stego[EB/OL].http://www. stego.com, 1997.
  • 5COX J, KILIAN J, LEIGHTON T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing,1997,6(12):1673-1687.
  • 6CHANDRAMOULI R. A mathematical approach to steganalysis[A]. Security and Watermarking of Multimedia Contents IV[C]. San Jose, USA, 2002. 14-25.

同被引文献32

  • 1唐功友,孙亮.Optimal Control for Nonlinear Interconnected Large-scale Systems: A Successive Approximation Approach[J].自动化学报,2005,31(2):248-254. 被引量:30
  • 2Zollner J, Klimant H, Pfizmann A, et al, Modeling the security of steganographic systems [ J ]. Lecture Notes in Computer Science, 1998 ( 1 525 ) : 345 - 355.
  • 3Cachin C, An information-theoretic model for steganography [ J]. Information and Computation, 2004, 192 (1): 41 -56.
  • 4Wang Y, Moulin P. Steganalysis of block-structured stegotext [ A]. Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI [ C]. San Jose, CA: SPIE, 2004. 477-488.
  • 5陈丹 王育民.基于图像模型的掩密安全性定义.哈尔滨工业大学学报,2006,38:901-904.
  • 6Sallee P. Model-based steganography [ J ]. Lecture Notes in Computer Science,2003(2 939) :154 - 167.
  • 7Cox I J, Kalker T, Pakura G, et al. Information transmission and steganography [ J ]. Lecture Notes in Computer Science, 2005 (3 710) : 15 -29.
  • 8Katzenbeisser S, Petitcolas F A. Defining security in steganographic systems-[ A ]. Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅳ[ C ]. San Jose, CA. SPIE, 2002. 50 - 56.
  • 9Hopper N J, Langford J, Luis V A. Provably secure steganography ( Extended abstract ) [ J ]. Lecture Notes in Computer Science, 2002 (2 442) : 77 -92.
  • 10Moulin P, O'Sullivan J A. Information-theoretic analysis of information hiding [ J ]. IEEE Transaction on Information Theory, 2003, 49 (3) : 563 -593.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部