期刊文献+

流媒体隐蔽通信系统模型及性能优化 被引量:8

Modeling and optimizing of the information hiding communication system over streaming media
下载PDF
导出
摘要 针对流媒体载体类型的多样性造成隐藏过程的不一致等问题,提出了一种流媒体隐蔽通信系统的3层模型,该模型将流媒体的隐蔽通信过程划分为适配与执行、传输管理和隐蔽应用3个层次,定义了各层的功能、服务和接口原语等规则.针对隐蔽通信系统中的主要参数建立了数学模型,得到了隐蔽信道有效利用率的表达式,利用求偏导数方法计算出给定条件下系统参数的最佳值.该模型已经在VoIP隐蔽通信系统中得到实现.实验和测试表明:分层模型很好地解决了不同载体下流媒体隐蔽通信隐藏过程的一致性问题,模型的理论计算值对实际系统的优化设计具有直接指导意义. Information hiding communication (IHC) over streaming media is an important branch of information hiding (IH). As for the problem of inconsistent hiding process caused by the diversity of the streaming media data format, the paper proposes a three-layer system model, which divides the IHC process into adaption ~ execution, transmission management and IH application. The functionality, service and interface of each layer are defined. An analytical model for primary parameters is then established, obtaining the presentation of effective IH channel usage. The optimal system parameter is calculated using the partial derivative method. The system model has been implemented on the VolP platform. Experiments and tests show that the layered model successfully solves the inconsistent problem due to different carriers for IHC. The theoretical value of the optimal parameter serves the function of guiding the design of a practical system.
作者 肖博 黄永峰
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2008年第3期554-558,共5页 Journal of Xidian University
基金 "863"计划资助(2006AA01Z444)
关键词 流媒体 信息隐藏 分层模型 性能优化 streaming media information hiding layered model performance optimizing
  • 相关文献

参考文献14

  • 1Provos N,Honeyman P.Hide and Seek:an Introduction to Steganography[J].IEEE Security & Privacy,2003,1(3):32-44. 被引量:1
  • 2Wang H,Wang S.Cyber Warfare:Steganography vs Steganalysis[J].Communications of the ACM,2004,47(10):76-82. 被引量:1
  • 3陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,33(2):21-23. 被引量:37
  • 4Cachin C.An Information-Theoretic Model for Steganography[C]//Information Hiding,Second International Workshop,IH98.Portland:Proceedings,1998:307-318. 被引量:1
  • 5Moulin P,O'Sullivan J A.Information-Theoretic Analysis of Information Hiding[J].IEEE Trans on Information Theory,2003,49(3):563-593. 被引量:1
  • 6Fridrich J,Rui D.Secure Stegangraphic Methods for Palette Images:Vol 1 768[C]//The 3rd Information Hiding Workshop,Lecture in Computer Science.Berlin:Springer-Verlag,2000:47-60.Zhou Wenjin,Fan Mingyu,Wang Guangwei.An Information Hiding Method to LSB of BMP Images[J].China Information Security,2005,7:253-255. 被引量:1
  • 7吴志军,钮心忻,杨义先.语音隐藏的研究及实现[J].通信学报,2002,23(8):99-104. 被引量:18
  • 8周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 9Dittmann J,Stabenau M,Steinmetz R.Robust MPEG Video Watermarking Technologies[C]//Proceedings of the Sixth ACM International Conference on Multimedia.Bristol:ACM,1998:71-80. 被引量:1
  • 10Xu Changyong,Ping Xijian,Zhang Tao.Steganography in Compressed Video Stream[C]//Proceedings of the First International Conference on Innovative Computing,Information and Control (ICICIC'06).Washington:IEEE Computer Society,2006:269-272. 被引量:1

二级参考文献12

  • 1张蕾.一个概念图编辑工具的设计与实现[J].西北大学学报(自然科学版),1996,26(6):483-487. 被引量:2
  • 2KATZENBEISSER S 吴秋新 等.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001.. 被引量:1
  • 3PETITCOLAS F A P 丁玮(译).信息隐藏-概论[M].中国科学院自动化研究所,1999.. 被引量:1
  • 4I.J. Cox, F. T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6 (12): 1673 - 1687. 被引量:1
  • 5N. F. Johnson, S. Jajodia. Exploring Steganography:seeing the unseen. IEEE Transactions on Computer,1998, 31(2): 26-34. 被引量:1
  • 6W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM System Journal, 1996, 35(3): 313- 336. 被引量:1
  • 7FAN K C, WANG Y K, CHANG M L. Form document identification using line structure based features[A]. Sixth International Conference on Document Analysis and Recognition[C]. Seattle, Washington, USA, 2001.704-708. 被引量:1
  • 8CHAPMAN M, DAVIDA G. A software system for concealing ciphertext as innocuous text[A]. ICICS'97 - International Conference on Information and Communications Security[C]. Beijing, China, 1997.335-345. 被引量:1
  • 9The texthide (verston1.0) software[EB/OL]. http:∥www. compris.com. 被引量:1
  • 10SOWA J F. Conceptual Structures.[M] UK:Addsion-Welsley, 1984. 被引量:1

共引文献78

同被引文献30

  • 1黄永峰,袁键,陈书梅,王俊.MSN语音流中隐蔽信道的检测方法[J].清华大学学报(自然科学版),2009(S2):2200-2207. 被引量:1
  • 2白剑,景晓军,杨榆,徐迎晖,钮心忻,杨义先.语音信息隐藏中的AERA算法[J].电子学报,2005,33(9):1541-1544. 被引量:3
  • 3袁键,黄永峰,肖博.基于流媒体的隐蔽通信可靠传输机制的研究[J].计算机研究与发展,2009,46(z1):147-151. 被引量:2
  • 4Provos N, Honeyman P. Hide and seek:an introduction to steganography [ J ]. IEEE Security & Privacy Magazine,2003,1(3) :32. 被引量:1
  • 5Raphael E, Thomas L, Roger W. Hidden communication in P2P networks: steganographic handshake and broadcast [ C]//Proc of the 30th IEEE Int Conf on Comp Corn (INFOCOM 2011) ,Los Alamitos:IEEE,2011:1 -9. 被引量:1
  • 6Ramirez D H. IPTV Security:Protecting High-value Digital Contents [ M ]. Hoboken : Wiley Press,2008. Tian H,Jiang H,Zhou K,et al. Adaptive partial-matching steganography for voice over IP using triple m sequences [ J ]. Comp Corn,2011,34 ( 18 ) :2236. 被引量:1
  • 7Tian H,Jiang H,Zhou K,et al. Adaptive partial-matching steganography for voice over IP using triple m sequences [ J ]. Comp Corn,2011,34 ( 18 ) :2236. 被引量:1
  • 8Huang Y, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec [ J ]. IEEE Trans on Infor Forensics and Security,2011,6(2) :296. 被引量:1
  • 9Mazurezyk W, Lubacz J. LACK--A VoIP steganographic method[ J ]. Telecom Syst J ,2010,45 ( 2 - 3 ) : 153. 被引量:1
  • 10Lubacz J, Mazurczyk W, Szczypiorski K. Vice over IP [ J ]. IEEE Spectrum, 2010,47 (2) :42. 被引量:1

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部