期刊文献+

文本信息隐藏的统计检测算法 被引量:7

Text Information Hiding Detecting Algorithm Based on Statistics
在线阅读 下载PDF
导出
摘要 文本信息隐藏(TIH)是把隐秘信息嵌入文本载体中的技术,探讨其逆向攻击手段对于信息安全(IS)领域有着重要的意义.本文提出一种基于词间相关度统计特性的文本信息隐藏检测算法,并利用该算法对文本信息隐藏系统NICETEXT做了检测实验,取得了很好的效果.在对115个正常的文本段和212个由NICETEXT生成的文本段进行检测的实验中,成功地检测出106个正常的文本段和209个由NICETEXT生成的文本段.其中仅有9个正常文本段和3个生成文本段发生了误判,检测正确率高达96.3%. Text Information Hiding (TIH) is a technique for embedding secret messages into text carriers. Research on attacking methods against TIH plays an important role in Information Security (IS) area. In this paper, a text information hiding detecting algorithm based on statistical characteristics of correlations between words is presented. An experiment to detect text segments generated by text information hiding system NICETEXT using the algorithm is carried out and a pretty good result is obtained. In the experiment, there are 115 normal text segments and 212 generated text segments detected, and 106 normal segments and 209 generated segments are successfully picked out. Only 9 normal segments and 3 generated segments are mistakenly examined. The accuracy of the detecting reaches as high as 96.3%.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第12期2199-2201,共3页 Journal of Chinese Computer Systems
基金 国家自然基金项目(60773032 60703071)资助 高校博士点基金(20060358014) 江苏省自然科学基金(BK2007060)项目的资助
关键词 信息隐藏 检测 词间相关度 N窗互信息 information hiding detecting correlations between words N-window mutual information
  • 相关文献

参考文献8

  • 1Wu Shu-feng, Huang Liu-sheng. Research on information hiding[D]. University of Science and Technology of China, 2003.
  • 2Maher K. TEXTO. URL[EB/OL]: ftp://ftp. funet. fi/pub/crypt/steganography/texto. tar.gz.2007.
  • 3Chapman, Mark. Hiding the hidden: a software system for concealing ciphertext as innocuous text[EB/OL]. http://www. NICETEXT. com/NICETEXT/doc/thesis. pdf, 1937.
  • 4Chapman, Mark, George Davida,Marc Rennhard. A practical and effective approach to large-scale automated linguistic steganography[C]. Lecture Notes in Computer Science, Volume 2200, Springer-Verlag: Berlin Heidelberg. Jan 2001,156- 167.
  • 5Taskiran CM,Topkara U,Topkara M,et al. Attacks on lexical natural language steganography systems[C]. Proceedings of SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2006.
  • 6Winstein, Keith. Lexical steganography through adaptive modulation of the word choice hash[EB/OL].http://alumni, imsa. edu/-keithw/tlex/lsteg, ps. Ms,2007.
  • 7周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:27
  • 8Christopher D Manning, Hinrich Schutze. Foundations of statistical natural language processing[M]. Beijing: Publishing House of Electronics Industry, 2005.

二级参考文献6

  • 1张蕾.一个概念图编辑工具的设计与实现[J].西北大学学报(自然科学版),1996,26(6):483-487. 被引量:2
  • 2FAN K C, WANG Y K, CHANG M L. Form document identification using line structure based features[A]. Sixth International Conference on Document Analysis and Recognition[C]. Seattle, Washington, USA, 2001.704-708.
  • 3CHAPMAN M, DAVIDA G. A software system for concealing ciphertext as innocuous text[A]. ICICS'97 - International Conference on Information and Communications Security[C]. Beijing, China, 1997.335-345.
  • 4The texthide (verston1.0) software[EB/OL]. http:∥www. compris.com.
  • 5SOWA J F. Conceptual Structures.[M] UK:Addsion-Welsley, 1984.
  • 6杜慧敏,韩俊刚.一种实现语义解释器的方法[J].纺织高校基础科学学报,1997,10(2):173-177. 被引量:1

共引文献26

同被引文献41

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部