• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法

高瞻瞻, 汤光明, 王硕

高瞻瞻, 汤光明, 王硕. 基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法[J]. 计算机研究与发展, 2018, 55(4): 854-863. DOI: 10.7544/issn1000-1239.2018.20161042
引用本文: 高瞻瞻, 汤光明, 王硕. 基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法[J]. 计算机研究与发展, 2018, 55(4): 854-863. DOI: 10.7544/issn1000-1239.2018.20161042
Gao Zhanzhan, Tang Guangming, Wang Shuo. A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863. DOI: 10.7544/issn1000-1239.2018.20161042
Citation: Gao Zhanzhan, Tang Guangming, Wang Shuo. A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863. DOI: 10.7544/issn1000-1239.2018.20161042
高瞻瞻, 汤光明, 王硕. 基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法[J]. 计算机研究与发展, 2018, 55(4): 854-863. CSTR: 32373.14.issn1000-1239.2018.20161042
引用本文: 高瞻瞻, 汤光明, 王硕. 基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法[J]. 计算机研究与发展, 2018, 55(4): 854-863. CSTR: 32373.14.issn1000-1239.2018.20161042
Gao Zhanzhan, Tang Guangming, Wang Shuo. A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863. CSTR: 32373.14.issn1000-1239.2018.20161042
Citation: Gao Zhanzhan, Tang Guangming, Wang Shuo. A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863. CSTR: 32373.14.issn1000-1239.2018.20161042

基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法

基金项目: 国家自然科学基金项目(61272488);河南省科技攻关项目(122102210047);全军军事类研究生基金项目(2015JY125)
详细信息
  • 中图分类号: TP391

A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding

  • 摘要: 网络语音电话(voice over IP, VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进一步加强,且缺乏安全性理论指导.为此,首先分析语音帧的时序性特点,以相对熵的形式定义了基于贝叶斯网络模型的隐写安全性.通过分析语音编码过程,建立了固定码本参数的贝叶斯网络模型并将参数分为二元载体和三元载体2类.应用矩阵嵌入技术确定载体的修改位置,减少修改量;以最小化安全性测度为目标确定三元载体元素的修改方向,降低隐写对载体统计特性的影响.实验表明:在不显著增加计算复杂度的前提下,所提算法取得了比已有算法更好的感知透明性和抗检测能力.
    Abstract: Voice over IP (VoIP) call has become our common choice of communication with each other. Compared with traditional steganographic covers such as texts and images, VoIP data flow has better imperceptibility and larger space for secret message embedding. Thus, VoIP steganography has received increasing attention in recent years. So far, the research mainly revolves around the designing of embedding and extracting process. However, the detection resistance of existing methods still needs to be strengthened. And they are lacking in the guidance of steganographic security theory. This paper firstly analyzes time sequence characteristics of speech frames, then defines the steganographic security in the form of relative entropy based on Bayesian network model. By analysing the speech encoding process, a specific Bayesian network model for fixed codebook parameters is established and the parameters are divided into binary cover elements and ternary cover elements. To minimize the change number in the embedding process, matrix embedding is used to determine the change positions in the cover vector. To reduce embedding impacts on the statistical properties of the cover, change directions of the ternary cover elements are determined by minimizing the security measure. Experimental results show that under the premise of limited computational complexity, the novel VoIP steganography method leads to good perceptual transparency and outperforms prior methods in resisting blind steganalysis.
  • 期刊类型引用(6)

    1. 童伟传,方友军,唐明. 基于数据挖掘的政务数据安全风险检测系统. 信息技术. 2023(02): 151-156 . 百度学术
    2. 白荣华,魏强,郭瑞,刘金. 政务信息系统商用密码集约化平台设计与实现. 信息安全研究. 2023(05): 461-468 . 百度学术
    3. 黎祥远. 攻防视角下的高校网络安全防护策略——基于网络安全攻防演练的研究. 华商论丛. 2023(01): 101-106 . 百度学术
    4. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 . 百度学术
    5. 刘平. 国家公共文化云网络安全设计和实践. 百花. 2020(07): 31-34 . 百度学术
    6. 张锐昕,王玉荣. 中国政府上网20年:发展历程、成就及反思. 福建师范大学学报(哲学社会科学版). 2019(05): 43-50+168 . 百度学术

    其他类型引用(2)

计量
  • 文章访问数: 
  • HTML全文浏览量:  0
  • PDF下载量: 
  • 被引次数: 8
出版历程
  • 发布日期:  2018-03-31

目录

    /

    返回文章
    返回