期刊文献+

基于PN码随机化的MSAC攻击防御方法

PN code randomization based MSAc attack resistance method
下载PDF
导出
摘要 基于流速率的直序扩频(DSSS)流水印技术在嵌入多比特的水印信息时采用同一伪随机(PN)码,使得已标记数据流具有自相似性,均方自相关(MSAC)攻击通过单条已标记数据流就可检测DSSS流水印的存在性,严重破坏了DSSS流水印的隐蔽性。PN码正交化方法虽可消除已标记数据流的自相关性,进而抵御MSAC攻击的检测,但正交PN码难以生成,应用范围受限。为此,提出基于PN码随机化的MSAC攻击防御方法,在向目标数据流嵌入每个水印位时均采用随机选择的不同长度的PN码进行扩展,使得已嵌入DSSS流水印的数据流速率的均方自相关不再呈现周期性峰值,进而可在MSAC攻击面前保持隐蔽性。理论分析与实验结果表明,基于PN码随机化的MSAC攻击防御方法可有效抵御MSAC攻击的检测,且所采用的PN码易于生成,便于部署和应用。 The flow rate based direct sequence spread spectrum( DSSS) flow watermarking technique used the same pseudorandom( PN) code to modulate the multi-bit watermark signal,as a result,the DSSS watermarked flow had self-similarity,and the mean-square autocorrelation( MSAC) attack could detect the existence of the DSSS flow watermark by using single DSSS watermarked flow,which seriously destroyed the stealthiness of the DSSS flow watermark. Although the PN code orthogonalization method could eliminate the autocorrelation of the DSSS watermarked flow and thus resisted the MSAC attack,however,the orthogonal PN codes were difficult to generate,which limited its application range. Therefore,this paper proposed the PN code randomization based MSAC attack resistance( PNCR-MAR) method,when it embedded the watermark signal into the target flow,the PN codes of different lengths,randomly selected from a PN code set,and used to spread each watermark bit,so that the mean-square autocorrelation of the flow rate of the watermarked flow no longer exhibited periodic peaks,as a result,this PNCR-MAR method could defend against the MSAC attack. Theoretical analysis and experimental results show that this proposed PNCR-MAR method can effectively resist the MSAC attack,and the adopted PN codes are easy to generate,which is suitable for deployment and application.
作者 许新忠 张连成 燕菊维 Xu Xinzhong;Zhang Liancheng;Yan Juwei(Henan Vocational College of Art,Zhengzhou 450011,China;State Key Laboratory for Mathematical Engineering&Advanced Computing,Zhengzhou 450001,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第6期1789-1793,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61402526,61402525)。
关键词 流水印 直序扩频 均方自相关攻击 PN码正交化 PN码随机化 flow watermarking direct sequence spread spectrum mean-square autocorrelation attack pseudo-noise code orthogonalization pseudo-noise code randomization
  • 相关文献

参考文献4

二级参考文献69

  • 1邵立松,窦文华.自相似网络通信量模型研究综述[J].电子与信息学报,2005,27(10):1671-1676. 被引量:10
  • 2李强,刘琨,林雁,鞠九滨.使用递增性延迟建立攻击连接链的关联[J].吉林大学学报(理学版),2006,44(2):194-200. 被引量:4
  • 3Pan Zheng, Peng Hong, Long Xian-zhong, et al. A watermarking-based host correlation detection scheme[A]//2009 International Conference on Management of e-Commerce and e-Government, 2009[C]. Nanchang, China: IEEE Computer Society, 2009:493-497. 被引量:1
  • 4Wang Xin-yuan, Chen Shi-ping,Jajodia S. Tracking anonymous peer-to-peer voip calls on the internet [A] // Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), 2005[C]. Alexandra, Virginia, USA: ACM, 2005 : 81- 91. 被引量:1
  • 5Peng Pai, Ning Peng, Reeves D S, et al. Active timing-based correlation of perturbed traffic flows with chaff packets[A]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops ( ICDCSW' 05 ), 2005 [C]. Columbus, OH, USA.. IEEE Computer Society, 2005 : 107-113. 被引量:1
  • 6Pyun Y J, Park Y H, Wang Xin-yuan, et al. Tracing traffic through intermediate hosts that repacketize flows [A] // Proceedings of the 26th IEEE International Conference on Computer Communications (Infocom' 07), 2007 [C]. Anchorage, AK, USA.. IEEE, 2007: 634-642. 被引量:1
  • 7Huang Di-jiang, Agarwal U. Countering repacketization watermarking attacks on tor network[A]ffProeeedings of the 8th International Conference on Application Cryptography and Network Security ( ACNS' 10), 2010 [C]. Beijing, China: Springer, 2010:232-249. 被引量:1
  • 8Kiyavash N, Houmansadr A, Borisov N. Multi-flow attacks against network flow watermarking schemes[A]//Proceedings of 17th USENIX Security, 2008[C]. San Jose, CA, USA: USENIX Association, 2008 : 307-320. 被引量:1
  • 9Wang Xiao-gang, Luo Jun-zhou, Yang Ming. An interval centroid based spread spectrum watermark for tracing multiple network flows [A]// Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics, 2009 [C]. San Antonio, TX, USA: IEEE, 2009 :4000-4006. 被引量:1
  • 10Wang Xiao-gang, Luo Jun-zhou, Yang Ming. A double interval centroid-based watermark for network flow traceback[A]//Proceedings of the 2010 14tb International Conference on Computer Supported Cooperative Work in Design(CSCWD' 10), 2010[C]. Shanghai, China: IEEE, 2010 : 146-151. 被引量:1

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部