期刊文献+

主动攻击下的隐写系统博弈模型

Game-theoretic model of active attack on steganographic system
下载PDF
导出
摘要 针对隐写系统面临的主动攻击问题,对隐写方和主动攻击方之间的对抗关系进行建模,提出了以信息嵌入率和错误率两个目标为收益函数的隐写系统博弈模型。借助二人有限零和博弈基本理论,分析了隐写方和主动攻击方博弈均衡的存在性,并给出了均衡局势下对抗双方的策略求解方法。最后通过求解一个实例说明了模型的有效性。建立的模型可为隐写方和主动攻击方的最优策略选择提供理论依据,对抗主动攻击的隐写算法设计也具有一定的指导意义。 To solve the problem of active attack on steganographie system, the counterwork relationship was modeled between steganographier and active attacker. The steganographie game with embedding rate and error rate as the payoff function was proposed. With the basic theory of two-person finite zero-sum game, the equilibrium between steganographier and active attacker was analyzed and the method to obtain their strategies in equilibrium was given. Then an example case was solved to demonstrate the ideas presented in the model. This model not only provides the theoretic basis for steganographier and active attacker to determine their optimal strategies, but also brings some guidance for designing steganographic algorithms robust to active attack.
作者 刘静 汤光明
机构地区 信息工程大学
出处 《计算机应用》 CSCD 北大核心 2014年第3期720-723,共4页 journal of Computer Applications
基金 河南省科技攻关计划项目(122102210047)
关键词 隐蔽通信 隐写系统 主动攻击 博弈论 嵌入率 误码率 covert communication steganographic system active attack game theory embedding rate Bit Error Rate(BER)
  • 相关文献

参考文献4

二级参考文献29

  • 1Alvaro A Cairdenas, George V Moustakides, John S Baras. Towards optimal design of data hiding algorithms against nonparametric adversary models[ C] //Information Sciences and Systems, CISS ' 07.41st Annual Conference. Balti- more, 2007:911-916. 被引量:1
  • 2Harmsen J, Pearlman W. Capacity of steganographoic channels[C]//Proc, of the 7th workshop on Multimedia and Security. New York, 2005(1/2) : 11 - 24. 被引量:1
  • 3Pierre Moulin, Kivanc Mihca M. The parallel - gaussian watermarking game [J ]. IEEE Transactions on Information Theory, 2004,50(20) : 1 - 6. 被引量:1
  • 4Harmsen J. Secure capacity of steganographic systems[D]. New York, Polytechnic Institute Troy, 2005. 被引量:1
  • 5Pierre Moulin, Joseph A O' Sullivan. Information - theoretic analysis of information hiding[J ]. IEEE Transactions on Information Theory, 2003,49(2) : 19 - 23. 被引量:1
  • 6Jiang Cuiling, Lin Jiajun, Pang Yilin. Capacity analysis of steganography based on the digital images under the constraints of security[ C]//International Conference on Audio, Language and Image Processing. Shanghai: East China University of Sci. & Technd., 2008(7) :909 -912. 被引量:1
  • 7ZOLLNER J, FEDERRATH H. Modeling the security of steganographic systems[A]. Information Hiding: Second International Workshop[C]. Portland, USA, 1998. 344-354. 被引量:1
  • 8ANDERSONR PETITCOLASF.On the limits of steganography. IEEE Journal of Selected Areas in Communications, 1998,注3因为只有当试验次数相当大时,使用a1,a2的概率方为0.5,实验结果才能与理论结果相吻合[J].(4):474-481. 被引量:1
  • 9FRIDRICH J, GOL.JAN M. Practical steganalysis of digital images-state of the art[A]. Security and Watermarking of Multimedia Contents IV[C]. San Jose, USA, 2002. 1-13. 被引量:1
  • 10MACHADO R. Ezstego, stego online, stego[EB/OL].http://www. stego.com, 1997. 被引量:1

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部