计算机应用 ›› 2015, Vol. 35 ›› Issue (3): 717-721.DOI: 10.11772/j.issn.1001-9081.2015.03.717

• 信息安全 • 上一篇    下一篇

分级安全的文本隐写方法

向凌云, 王鑫辉   

  1. 长沙理工大学 计算机与通信工程学院, 长沙 410114
  • 收稿日期:2014-10-17 修回日期:2014-11-17 出版日期:2015-03-10 发布日期:2015-03-13
  • 通讯作者: 向凌云
  • 作者简介:向凌云(1983-),女,湖南娄底人,讲师,博士,CCF会员,主要研究方向:信息安全、信息隐藏与数字水印、隐写分析、自然语言处理;王鑫辉(1988-),男,湖南衡阳人,硕士研究生,主要研究方向:信息安全、信息隐藏与数字水印
  • 基金资助:

    国家自然科学基金资助项目(61202439,61103215);湖南省教育厅一般项目(12C0011);湖南省交通运输厅科技进步与创新项目(201334)

Text steganographic method with hierarchical security

XIANG Lingyun, WANG Xinhui   

  1. School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha Hunan 410114, China
  • Received:2014-10-17 Revised:2014-11-17 Online:2015-03-10 Published:2015-03-13

摘要:

针对单一数据类型隐写方法安全性不高、隐写容量不足等问题,提出了一种具有分级安全的文本隐写方法。首先,将整个载体文档中的多种类型的数据作为备选隐写载体,以不同类型数据的隐写特点和隐写分析技术为评估依据定义隐写安全等级,构建了一个多类数据融合的分级安全隐写模型。然后,根据秘密信息的长度自适应确定安全等级,并利用分级安全隐写模型将秘密信息分块地嵌入在同一个载体文档相互独立的多个不同类数据中。理论分析及实验结果表明,与现有基于单一数据类型隐写方法相比,所提方法扩大了隐写容量,在嵌入等量的秘密信息情况下,降低了文档中同一类载体数据的统计特征改变程度,提高了秘密信息的整体安全性。

关键词: 隐写术, 隐写分析, 文本, 隐写模型, 分级安全

Abstract:

For the low security and capacity shortages of steganographic methods based on the single data, a new text steganography method with hierarchical security was proposed. First, multiple types of data in the whole cover document were regarded as optional steganographic covers to build up a hierarchical security steganographic model upon the the steganographic security levels defined by taking the characteristics of different types of data and the steganalysis as evaluation criterions. Then, a security level was adaptively determined by the secret message length, and the secret message was embedded into the selected independent different types of data in a cover document with the help of the built model. Theoretical analysis and experimental results show that compared with the steganography based on single data, the proposed method has expanded the steganographic capacity and reduced the modifications of the statistic characteristics of a single type of data in the cover document when the same secret message was embedded. In conclusion the proposed method improves the security of the secret message.

Key words: steganography, steganalysis, text, steganographic model, hierarchical security

中图分类号: