期刊文献+

MP3Stego信息隐藏与检测方法研究 被引量:9

MP3Stego Hiding and Detecting Research
在线阅读 下载PDF
导出
摘要 信息隐藏是一门正在迅速发展的学科,广泛应用于秘密数据通信、知识产权保护等领域。从音频信息隐藏MP3Stego出发,分析了各种MP3Stego的检测攻击技术,然后通过对MP3Stego隐藏特性的研究,提出了一种检测MP3Stego的新方法。这种方法通过计算MP3文件中part23、stuffingBits的统计量,可以准确检测出经过MP3Stego处理的MP3文件。实验证明,该方法简单有效,可以用于实现MP3Stego信息隐藏的检测。 Information hiding is the art and science of communicating in such a way that the presence of a message cannot be detected. It can be used for secret communicating and copyright marking and receives more attention from the research community and from industry today. This paper introduced the audio information hiding techniques first, with an emphasis on MP3Stego, then introduced the existing MP3Stego attacking and detecting techniques. After analyzing the properties of MP3Stego, a new detecting method was found. This method can detect mp3 files produced by MP3Stego correctly by calculating the statistic of part23 and stuffingBits in mp3 files. The experiments proved that this method is effective and can be used to detect MP3Stego.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第A02期221-224,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
关键词 信息隐藏 MP3Stego检测方法 information hiding MP3Stego detecting methods
  • 相关文献

参考文献1

二级参考文献12

  • 1杨洋 戴跃伟 王执铨.一种基于块分类的DCT域音频水印技术[A]..全国第三届信息隐藏学术研讨会((2IHW'2001)[c].西安:西安电子科技大学出版社,2001.129~134.
  • 2University of Cambridge, Computer Laboratory. MP3Stego [OL]. http://www, cl. cam. ac. uk/-- fapp2/steganography/MP3Stego/index. html, 2002.
  • 3Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Attacks on copying marking systems [OL]. http://www, cl.cam. ac. uk/Research/Security/.
  • 4Fabien A P Petitcolas, Ross J Anderson. Weaknesses of copyright marking systems [OL]. http://www, cl. cam. ac. uk/Research/Security/.
  • 5Karlheinz Brandenbrug, Gerhard Stoll. ISO-MPEG-1 audio: A generic standard for coding of high-quantity digital audio [J].Audio Engineer Society, 1994, 42(10) : 780--792.
  • 6Bender W, Gruhl D, Morimoto N, et al. Technique for data hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336.
  • 7Gruhl D, Bender W, Lu A. Echo Hiding in Information Hiding[M]. In: Anderson R J, ed. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996, 1174:295--315.
  • 8Lie Wen-Nung, Chang Li-Chun. Robust and high-quality timedomain audio watermarking subject to psychoacoustic masking[J]. Circuits and Systems, 2001, 2:245--248.
  • 9Lu Chunshien, Liao Hongyuan, Mark Chen Lianghua.Multipurpose audio watermarking [A]. In: Proceedings of the 15th International Conference on Pattern Recognition,Barcelona, Spain, 2000, Ⅲ: 286--289.
  • 10Chang L, Moskowitz I S. Critical analysis of security in voice hiding techniques [A]. In: Proceedings of the International Conference on Information and Communications Security, vol 1334 of Lecture Notes in Computer Science [C]. Berlin:Springer, 1997. 203--216.

共引文献6

同被引文献81

引证文献9

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部