An information-hiding model for secure communication

被引:0
|
作者
Ma, Lan [1 ]
Wu, Zhi-jun [1 ]
Hu, Yun
Yang, Wei
机构
[1] Civil Aviat Univ China, Tianjin Key Lab Adv Signal Proc, Tianjin 300300, Peoples R China
关键词
information hiding model; secure communication; speech; security; steganography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an speech information hiding model for transmitting secret speech through subliminal channel covertly for secure communication over PSTN (Public Switched Telephone Network) or VoIP (Voice over Internet Protocol). This model's main statement is that the embedding operation of a secure communication system should work indeterminate from the attacker's point of view. This model for secure communication based on the technique of information hiding has more severe requirements on the performances of data embedding than watermarking and fingerprinting in the aspects of real time, hiding capacity, and speech quality. Experiments show that this model meets the requirement of secure communication and suits for practical application of covert communication. The security analysis of this model by means of information theory and actual test proved that it is theoretically and practically secure. This information theory based model can be commonly used to help design a system of speech secure communication with different coding schemes.
引用
收藏
页码:1305 / +
页数:2
相关论文
共 50 条
  • [1] Information-hiding games
    Moulin, P
    DIGITAL WATERMARKING, 2002, 2613 : 1 - 12
  • [2] AN INFORMATION-HIDING METRIC
    RISING, LS
    CALLISS, FW
    JOURNAL OF SYSTEMS AND SOFTWARE, 1994, 26 (03) : 211 - 220
  • [3] Compositional methods for information-hiding
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Braun, Christelle
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2016, 26 (06) : 908 - 932
  • [4] Formal approaches to information-hiding
    Beauxis, Romain
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 347 - +
  • [5] Compositional methods for information-hiding
    Braun, Christelle
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, PROCEEDINGS, 2008, 4962 : 443 - 457
  • [6] On the Bayes risk in information-hiding protocols
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (05) : 531 - 571
  • [7] Computing the Leakage of Information-Hiding Systems
    Andres, Miguel E.
    Palamidessi, Catuscia
    van Rossum, Peter
    Smith, Geoffrey
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2010, 6015 : 373 - 389
  • [8] Detecting Information-Hiding in WAV Audios
    Liu, Qingzhong
    Sung, Andrew H.
    Qiao, Mengyu
    19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 1834 - 1837
  • [9] Probability of error in information-hiding protocols
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 341 - +
  • [10] The edge process model and its application to information-hiding capacity analysis
    Voloshynovskiy, S
    Koval, O
    Mihcak, MK
    Pun, T
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (05) : 1813 - 1825