期刊文献+

信息隐藏研究展望 被引量:39

Prospect of Digital Steganography Research
下载PDF
导出
摘要 网络信息有3类,分别用于描述客观世界、记录人类行为、描述虚拟世界.现有信息隐藏技术大多以第1类信息为载体,以轻微修改载体数据的方式进行隐蔽通信,并保证感知逼真与统计逼真.该文在总结载体修改式信息隐藏的基础上,重点探讨以后两类信息为伪装的非载体修改式的新型信息隐藏方法,介绍了适合于特定载体类型的半构造式信息隐藏、完全构造式信息隐藏及行为信息隐藏的基本形式与代表性方法.信息隐藏的形态在新的网络环境下将不断发展变化,各种信息媒介均可作为秘密信息的伪装,因此努力开展新型信息隐藏研究将大大有助于占据新时期信息战的主动地位. Data in cyber-space can be classified into three categories:data for describing objective world,data for recording human behaviors and data for describing virtual world.While current steganographic techniques mainly use the first class of data for hiding secret information,this paper surveys new steganographic techniques using the latter two categories of data as the camouflage,including semi-creative steganography,creative steganography and behavior steganography.Basic concepts and representative methods of the new types of steganography are described.With the development of information and network technology,the new paradigm of digital steganography deserves intensive studies in the future.
出处 《应用科学学报》 CAS CSCD 北大核心 2016年第5期475-489,共15页 Journal of Applied Sciences
基金 国家自然科学基金(No.61525203 No.61472235 No.U1536108 No.61572308) 上海市曙光学者计划基金(No.14SG36) 上海市优秀学术带头人计划基金(No.16XD1401200)资助
关键词 信息隐藏 隐写 半构造式信息隐藏 构造式信息隐藏 行为信息隐藏 information hiding steganography semi-creative steganography creative steganography behavior steganography
  • 相关文献

参考文献1

二级参考文献18

  • 1Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009.
  • 2Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
  • 3Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13.
  • 4Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395.
  • 5Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
  • 6Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270.
  • 7Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154.
  • 8Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569.
  • 9Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14.
  • 10Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4.

共引文献15

同被引文献175

引证文献39

二级引证文献146

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部