Trajectory data set is the indispensable foundation for constructing reliable Internet of Vehicles (IoV) service and location-based service (LBS), while it is likely to be abused by malicious attackers to infer user’...Trajectory data set is the indispensable foundation for constructing reliable Internet of Vehicles (IoV) service and location-based service (LBS), while it is likely to be abused by malicious attackers to infer user’s privacy. In this paper, we propose a trajectory protection method based on stop points obfuscation, which can confront various privacy attacks and preserve the semantic information to achieve adequate utility. Two strategies for stop point selection are designed, including category-distance priority method and Markov matrix method. Our new method was analyzed and evaluated on a real-world trajectory data set. The experiment result shows that our method can improve the utility of the data set and provide multi-level privacy protection.展开更多
In this paper,an effective intra prediction mode-based video strganography is proposed.Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.The influenc...In this paper,an effective intra prediction mode-based video strganography is proposed.Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.The influence on the sum of absolute difference(SAD)in intra prediction modes(IPMs)reversion phenomenon is sharp when modifying IPMs.It inspires us to take the SAD prediction deviation(SPD)to define the distortion function.What is more,the mapping rule between IPMs and the codewords is introduced to further reduce the SPD values of each intra block.Syndrome-trellis code(STC)is used as the practical embedding implementation.Experimental results demonstrate that our proposed steganographic scheme presents high undetectability compared with existing IPMs-based steganographic approaches.It also outperforms these schemes on stego video quality.展开更多
文摘Trajectory data set is the indispensable foundation for constructing reliable Internet of Vehicles (IoV) service and location-based service (LBS), while it is likely to be abused by malicious attackers to infer user’s privacy. In this paper, we propose a trajectory protection method based on stop points obfuscation, which can confront various privacy attacks and preserve the semantic information to achieve adequate utility. Two strategies for stop point selection are designed, including category-distance priority method and Markov matrix method. Our new method was analyzed and evaluated on a real-world trajectory data set. The experiment result shows that our method can improve the utility of the data set and provide multi-level privacy protection.
基金This work was supported by National Key R&D Plan of China(Grant No.2017YFB0802203)National Natural Science Foundation of China(Grant No.U173620045,61732021,61472165 and 61373158)+4 种基金Natural Science Foundation of Guangdong Province,China(Grant No.2017A030313390)Science and Technology Program of Guangzhou,China(Grant No.201804010428)Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence(Grant No.2014B090904067)Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve(Grant No.2016B010124009)the Zhuhai Top Discipline-Information Security,Guangzhou Key Laboratory of Data Security and Privacy Preserving,Guangdong Key Laboratory of Data Security and Privacy Preserving,the Fundamental Research Funds for the Central Universities.
文摘In this paper,an effective intra prediction mode-based video strganography is proposed.Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.The influence on the sum of absolute difference(SAD)in intra prediction modes(IPMs)reversion phenomenon is sharp when modifying IPMs.It inspires us to take the SAD prediction deviation(SPD)to define the distortion function.What is more,the mapping rule between IPMs and the codewords is introduced to further reduce the SPD values of each intra block.Syndrome-trellis code(STC)is used as the practical embedding implementation.Experimental results demonstrate that our proposed steganographic scheme presents high undetectability compared with existing IPMs-based steganographic approaches.It also outperforms these schemes on stego video quality.