高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于K-L差异的隐密术安全性理论研究

宋辉 孔祥维 尤新刚

宋辉, 孔祥维, 尤新刚. 基于K-L差异的隐密术安全性理论研究[J]. 电子与信息学报, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142
引用本文: 宋辉, 孔祥维, 尤新刚. 基于K-L差异的隐密术安全性理论研究[J]. 电子与信息学报, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142
Song Hui, Kong Xiang-wei, You Xin-gang. The Study of Security in Steganography Based on K-L Divergence[J]. Journal of Electronics & Information Technology, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142
Citation: Song Hui, Kong Xiang-wei, You Xin-gang. The Study of Security in Steganography Based on K-L Divergence[J]. Journal of Electronics & Information Technology, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142

基于K-L差异的隐密术安全性理论研究

doi: 10.3724/SP.J.1146.2009.00142

The Study of Security in Steganography Based on K-L Divergence

  • 摘要: 隐密术安全性理论研究一直是被广泛关注的研究重点和难点。该文通过对K-L差异的回顾及隐密术安全性的定性分析,指出Cachin给出的安全性定义缺乏一般性。同时注意到除概率分布的差异外,隐密信息的样本量和状态集合的势对隐密信息的安全性也有重要影响。结合对隐密信息安全性的定性分析,给出了一个基于K-L差异及假设检验的隐密术安全性定义,并推导出修改率对于隐密术安全性的影响。最后结合现有的隐密算法和隐密分析算法设计了一组对比试验,以验证该文理论分析的有效性。
  • 尤新刚, 周琳娜, 郭云彪. 信息隐藏学科的主要分支及术语[C]. CIHW2001, 西安, 2001: 43-50.[2]You Xin-gang.[J].Zhou Lin-na, and Guo Yun-biao. The main offshoots and terminology in information hiding [C]. CIHW2001, Xian.2001,:-[3]Simmons G J. The prisoners problem and the subliminal channel[C]. IEEE Workshop Communications Security CRYPTO, New York, 1983: 51-67.[4]Ettinger J M. Steganalysis and game equilibria[C][J].Information Hiding 1998, Oregon, USA, LNCS.1998, 1525:319-328[5]Mittelholzer T. An information-theoretic approach to steganography and watermarking[C]. Information Hiding, Dresden, Germany, LNCS, 1999, 1768: 1-16.[6]Moulin P and OSullivan J A. Information-theoretic analysis of information hiding [J].IEEE Transactions on Information Theory.2003, 49(3):563-593[7]Cachin C. An information-theoretic model for steganography[C][J].Information Hiding 1998, Oregon, USA, LNCS.1998, 1525:306-318[8]Chen B and Wornell G. Quantization index modulation: A class of provably good method watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 48(4): 1423-1443.[9]Kim Y, Duric Z, and Richards D. Modified matrix encoding technique for minimal distortion steganography[C]. Information Hiding 2006, VA, USA, LNCS, 2006, 4437: 314-327.[10]Fridrich J.[J].Pevny T, and Kodovsky K. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities[C]. The 9th Workshop on Multimedia Security, Dallas, Texas, USA.2007,:-[11]Ker A. A capacity result for batch steganograph [J].IEEE Signal Processing Letters.2007, 14(8):525-528[12]Ker A.[J].Pevny T, and Kodovsky J, et al.. The square root law of steganographic capacity[C]. MMSec 08, Oxford, UK.2008,:-Pevny T and Fridrich J. Benchmarking for steganography[C]. Information Hiding 2008, Santa Barbara, CA, USA, 2008: 251-267.[13]Leibler K. On information and sufficiency[J].Annals of Mathematical Statistics.1951, 22(1):79-86[14]Pevny T and Fridrich J. Merging markov and DCT features for multi-class JPEG steganalysis[C]. Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, 2007: 6505.
  • 加载中
计量
  • 文章访问数:  3262
  • HTML全文浏览量:  75
  • PDF下载量:  617
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-02-04
  • 修回日期:  2009-07-21
  • 刊出日期:  2010-02-19

目录

    /

    返回文章
    返回