隐写术
隐写分析技术
计算机科学
封面(代数)
隐写工具
计算机安全
保密
钥匙(锁)
理论计算机科学
数据挖掘
图像(数学)
人工智能
工程类
机械工程
作者
K. Yan,Jia Liu,Minqing Zhang,Tingting Su,Xiaoyuan Yang
出处
期刊:IEEE Access
[Institute of Electrical and Electronics Engineers]
日期:2018-01-01
卷期号:6: 73009-73022
被引量:20
标识
DOI:10.1109/access.2018.2881680
摘要
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security. The two necessary conditions for the steganography security are obtained. Under the current technology situation, we then analyze the indistinguishability of the cover and stego-cover, and consider that the steganography security should rely on the key secrecy with algorithms open. By specifying the role of key in steganography, the necessary conditions for a secure steganography algorithm in theory are formally presented. When analyzing the security instances, we have classified the steganalysis attacks according to their variable access to the steganography system, and then defined the four security levels. The higher level security one has, the higher level attacks one can resist. We have also presented algorithm instances based on current technical conditions, and analyzed their data hiding process, security level, and practice requirements.
科研通智能强力驱动
Strongly Powered by AbleSci AI