期刊文献+

基于时间间隔的扩频流水印技术 被引量:2

Interval-based spread spectrum watermarking scheme for tracing network flows
下载PDF
导出
摘要 将基于时间间隔的数据流调制方法和扩频通信原理相结合,提出基于时间间隔的扩频流水印技术,对于不同的待嵌水印位使用不同的正交伪噪声码进行扩展,通过调制包到达时间的统计特征将扩展水印信息嵌入到随机选择的时间间隔中。理论分析和实验结果表明,该技术可有效进行多流追踪,并能抵御多流和均方自相关攻击。 By combining interval-based watermarking flow modulation approach with spread spectrum communication principle,this paper proposed an interval-based spread spectrum watermarking(IBSSW) scheme for efficiently and simultaneously tracing multiple network traffic,which utilized multiple orthogonal pseudo-noise codes to spread different watermark bits and embeded them into randomly selected intervals by modulating the statistical characteristic of packets arriving time.Statistical analysis and empirical results indicate that IBSSW scheme,robust against multi-flow and mean-square autocorrelation attacks,can effectively trace multiple network flows.
出处 《计算机应用研究》 CSCD 北大核心 2011年第8期3049-3053,3057,共6页 Application Research of Computers
关键词 网络流水印 多流追踪 基于时间间隔的流水印 扩频 时序扰乱 包重组 network flow watermarking multi-flow traceback interval-based watermarking spread spectrum timing perturbation repacketization
  • 相关文献

参考文献25

  • 1ZHANG Yin, PAXSON V. Detecting stepping stones[ C]//Proc of the 9th Conference on USENIX Security Symposium. Berkeley, CA: USENIX Association, 2000 : 171-184. 被引量:1
  • 2DONOHO D L, FLESIA A G, SHANKAR U, et al. Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting raaximum tolerable dela'y [ C ]//Proc of the 5th International Symposium on Recent Advances in Intrusion Detection. [ S. 1, ] : Springer, 2002: 17-35. 被引量:1
  • 3BLUM A, SONG D, VENKATARAMAN S. Detection of interactive stepping stones: 'algorithms and confidence bounds [ C ]//Proc of the 7th International Symposium on Recent Advances in Intrusion Detec- tion. IS. 1. ] : Springer, 2004: 258-277. 被引量:1
  • 4WANG Xin-yuan, REEVES D S, WU S F. Inter-packet delay based correlation for tracing encrypted connections through stepping slones [ C ]//Proc of the 7th European Symposium on Research in Computer Security. [ S. 1. ] : Springer-Verlag, 2002 : 244-263. 被引量:1
  • 5PENG Pai, NING Peng, REEVES D S, et al. Active timing-based correlation of perturbed traffic flows with chaff packets [ C ]//Proc of the 25th IEEE Intenmtianal Conference on Distributed Computing Sys- tems Workshops. [ S. 1. ] : IEEE Computer Society, 2005 : 107-113. 被引量:1
  • 6HE Ting, TONG Lang. Detecting encrypted stepping-stone connections[ J ]. IEEE Trans on Signal Processing, 2007, 55 (5) : 1612-1623. 被引量:1
  • 7CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[ J]. Communication of the ACM, 1981, 24( 1 ) : 84- 88. 被引量:1
  • 8DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[ C]//Proc of the 13th USENIX Security Symposium. [ S. 1. ] : USENIX Association, 2004: 303-320. 被引量:1
  • 9REITER M K, RUBIN A D. Crowds: anonymity for Web transactions [J]. ACM Yrans on Information and System Security, 1998, 1 (1): 66-92. 被引量:1
  • 10REITER M K, RUBIN A D. Anonymous Web transactions with crowds[J]. Communications of the ACM, 1999, 42(2) : 32-38. 被引量:1

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部