首页 | 本学科首页   官方微博 | 高级检索  
     

分级安全的文本隐写方法
引用本文:向凌云,王鑫辉.分级安全的文本隐写方法[J].计算机应用,2015,35(3):717-721.
作者姓名:向凌云  王鑫辉
作者单位:长沙理工大学 计算机与通信工程学院, 长沙 410114
基金项目:国家自然科学基金资助项目(61202439,61103215);湖南省教育厅一般项目(12C0011);湖南省交通运输厅科技进步与创新项目(201334)
摘    要:针对单一数据类型隐写方法安全性不高、隐写容量不足等问题,提出了一种具有分级安全的文本隐写方法。首先,将整个载体文档中的多种类型的数据作为备选隐写载体,以不同类型数据的隐写特点和隐写分析技术为评估依据定义隐写安全等级,构建了一个多类数据融合的分级安全隐写模型。然后,根据秘密信息的长度自适应确定安全等级,并利用分级安全隐写模型将秘密信息分块地嵌入在同一个载体文档相互独立的多个不同类数据中。理论分析及实验结果表明,与现有基于单一数据类型隐写方法相比,所提方法扩大了隐写容量,在嵌入等量的秘密信息情况下,降低了文档中同一类载体数据的统计特征改变程度,提高了秘密信息的整体安全性。

关 键 词:隐写术    隐写分析    文本    隐写模型    分级安全
收稿时间:2014-10-17
修稿时间:2014-11-17

Text steganographic method with hierarchical security
XIANG Lingyun , WANG Xinhui.Text steganographic method with hierarchical security[J].journal of Computer Applications,2015,35(3):717-721.
Authors:XIANG Lingyun  WANG Xinhui
Affiliation:School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha Hunan 410114, China
Abstract:For the low security and capacity shortages of steganographic methods based on the single data, a new text steganography method with hierarchical security was proposed. First, multiple types of data in the whole cover document were regarded as optional steganographic covers to build up a hierarchical security steganographic model upon the the steganographic security levels defined by taking the characteristics of different types of data and the steganalysis as evaluation criterions. Then, a security level was adaptively determined by the secret message length, and the secret message was embedded into the selected independent different types of data in a cover document with the help of the built model. Theoretical analysis and experimental results show that compared with the steganography based on single data, the proposed method has expanded the steganographic capacity and reduced the modifications of the statistic characteristics of a single type of data in the cover document when the same secret message was embedded. In conclusion the proposed method improves the security of the secret message.
Keywords:steganography  steganalysis  text  steganographic model  hierarchical security
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号