隐写术

  • 网络Steganography;information hiding;Steganographia
隐写术隐写术
  1. 可泛化的基于DCT域的隐写术算法

    Generalization algorithm of steganography based on DCT domain

  2. 针对使用最普遍的LSB隐写术研究了提取攻击方法。

    Extracting attack methods on popular LSB steganography are researched .

  3. 论文给出了隐写术的主要框架、详细分析了TCP协议的包头;

    Themain framework is introduced and the TCP packet header is analysed in details , then the method of realization covert channel in TCPprotocol is given .

  4. 由于JPEG图像是网络传输中最常见的多媒体形式,PEG图像隐写术具有更广泛的应用范围。

    As JPEG image is the most popular image format transferring via internet , steganography in JPEG images bears broad application filed .

  5. 本文将信息隐藏技术与信息检索技术相结合,提出了一种通用的基于隐写术的信息检索(SBR)方法。

    Combining the techniques of information hiding and information retrieval , a universal retrieval method & SBR ( Steganography-Based Retrieval ) is presented .

  6. LSB隐写术的密钥恢复方法

    Approaches for Recovering Key of LSB Steganography

  7. 序贯LSB隐写术在载体中通过连续LSB替换嵌入消息,其提取攻击问题本质上是消息嵌入起止点的估计问题。

    The problem of extracting attack to sequential LSB steganography is essentially equivalent to the problem of estimating the beginning and the end of the secret message .

  8. 基于JPEG图像的离散余弦变换(DCT)系数直方图差值序列,提出一种新的检测JPEGMB2隐写术的方法。

    Based on the Discrete Cosine Transform ( DCT ) coefficient histogram difference sequences of JPEG images , a new steganalytic method was proposed to realize the steganalysis of JPEG MB2 .

  9. F5是另一个以前开发的隐写术应用程序,最近进行了一些改进,让它更加有用。

    F5 is another steganography application that was developed some time ago and has since seen some " face lifts " to make it more usable .

  10. 因为MSB和LSB之间应该有一些基本的关联,有些隐写术会改变LSB,因而可能打破这种关系,这给侦测带来了可乘之机。

    Because the MSB and LSB should have a basic correlation between them , the alteration of the LSB by some steganographic techniques can break this relationship , making detection possible .

  11. 当前主要的研究集中在隐写术和数字水印技术的使用和检测上。1997年RowlandC.H提出可以基于TCP/IP协议构建隐秘信道【11】之后就出现了很多基于网络通讯模型的隐秘信道技术。

    Current major research focus in the using and detecting of steganography and digital watermarking technology . 1997 , Rowland C. H made can build covert channels based on TCP / IP protocol . After that appeared a lot of covert channel communications technology base of network model .

  12. 信息隐藏技术主要分为数字水印和隐写术,它在版权保护、隐蔽通信等方面有着广阔的应用前景。

    It has a broad prospect in covert communication and copyright protection .

  13. 在当前网络传输的媒体数据中,可能含有使用隐写术方法隐藏的隐秘信息。

    Media data in internet may contain secret message embedded by steganography .

  14. 一种替换类隐写术算法的统一模型

    A Generalization Model for Algorithms of Substitution on Steganography

  15. 信息隐藏技术包括隐写术,隐信道技术,数字水印技术等。

    Information hiding techniques including steganography , Covert channel , digital watermark technology .

  16. 一种基于对称加密和隐写术的反取证方法

    An Anti-forensic Scheme Based on Symmetrical Encryption and Steganography

  17. 最后,说明阈下通信与隐写术、隐通道的区别与联系。

    Finally , the differences of subliminal channels and covert channels are given .

  18. 隐写术通过使用正常的媒体数据对信息进行伪装,达到隐秘通信的目的。

    Steganography can disguise secret message in normal media data for secret communication .

  19. 另外,隐写术在反盗版领域也有广泛的应用。

    Besides , steganography also finds wide application in the field of anti-piracy .

  20. 但对隐写术的提取攻击是目前在公开的研究中几乎空白的课题。

    However , there is hardly any literature about extracting attack on steganography .

  21. 隐写术主要用于秘密通信。

    Steganography is used main for privacy communication .

  22. 基于隐写术的信息检索方法

    A Method of Information Retrieval Based on Steganography

  23. 研究隐写术安全性的信息论模型。

    The information-theoretic model of stegosystem is studied .

  24. 基于音频的隐写术和数字水印的研究是正向研究,音频数字水印主要是研究在音频中嵌入和提取水印的各种算法。

    Audio watermarking algorithm focuses on kinds of audio watermark embedding and extracting watermarking algorithms .

  25. 将秘密信息隐藏在数字载体中的技术称为隐写术。

    The technology that hiding secret messages in the digital media carriers is called steganography .

  26. 隐写术分析是检测、提取、破坏隐蔽载体中秘密信息的技术。

    Steganalysis is a technique of finding , distilling and destroying the hiding information in stego-cover .

  27. 本文将探讨隐写术的原理并展示如何侦测它的使用。

    This article examines the process of steganography and shows how you can detect its use .

  28. 信息隐藏就是为解决这些问题而出现的,它有两个主要分支:数字水印和隐写术。

    Information hiding can solve these problems . It has two branches : digital watermarking and steganography .

  29. 隐写术的被动式攻击,主要包括隐藏消息的检测,提取和还原技术。

    Passive attacks to steganography , mainly include the detection , extraction and restoration of hidden messages .

  30. 隐写术的目的是避免对传送被隐藏消息的行为产生怀疑。

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message .