基于PN码分集的扩频流水印技术

Xinzhong Xu, Liancheng Zhang, Juwei Yan
{"title":"基于PN码分集的扩频流水印技术","authors":"Xinzhong Xu, Liancheng Zhang, Juwei Yan","doi":"10.1109/CIS2018.2018.00063","DOIUrl":null,"url":null,"abstract":"Compared with passive flow correlation technology, active flow watermarking technology has the advantages of high accuracy and low false positive rate in the aspects of stepping stone attack tracking and anonymous abuser association. Multi-flow attack can detect the existence of flow watermark, restore the flow watermark, and even remove the flow watermark from target watermarked flow. To improve the multi-flow attack resistance capability of flow rate-based direct sequence spread spectrum (DSSS) flow watermarking technology, a pseudo-noise (PN) code diversification based spread spectrum flow watermarking technology is proposed. Each watermark bit is spread by different PN code fragments before embedded into target flow, which can eliminate the inter-dependence between these watermarked flows and effectively defend against multi-flow attack. Compared with the embedding position randomization method, the complexity of our proposed technology is low and the false positive rate doesn't increase. Compared with the watermark bit reordering method, our proposed technology is more suitable for the DSSS flow watermarking technology and the multi-flow attack resistant effect is better.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"PN Code Diversification Based Spread Spectrum Flow Watermarking Technology\",\"authors\":\"Xinzhong Xu, Liancheng Zhang, Juwei Yan\",\"doi\":\"10.1109/CIS2018.2018.00063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Compared with passive flow correlation technology, active flow watermarking technology has the advantages of high accuracy and low false positive rate in the aspects of stepping stone attack tracking and anonymous abuser association. Multi-flow attack can detect the existence of flow watermark, restore the flow watermark, and even remove the flow watermark from target watermarked flow. To improve the multi-flow attack resistance capability of flow rate-based direct sequence spread spectrum (DSSS) flow watermarking technology, a pseudo-noise (PN) code diversification based spread spectrum flow watermarking technology is proposed. Each watermark bit is spread by different PN code fragments before embedded into target flow, which can eliminate the inter-dependence between these watermarked flows and effectively defend against multi-flow attack. Compared with the embedding position randomization method, the complexity of our proposed technology is low and the false positive rate doesn't increase. Compared with the watermark bit reordering method, our proposed technology is more suitable for the DSSS flow watermarking technology and the multi-flow attack resistant effect is better.\",\"PeriodicalId\":185099,\"journal\":{\"name\":\"2018 14th International Conference on Computational Intelligence and Security (CIS)\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 14th International Conference on Computational Intelligence and Security (CIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS2018.2018.00063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS2018.2018.00063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

与被动流量相关技术相比,主动流量水印技术在垫脚石攻击跟踪和匿名滥用者关联方面具有精度高、误报率低的优点。多流攻击可以检测出流水印的存在,恢复流水印,甚至从被水印的目标流中去除流水印。为了提高基于流量的直接序列扩频(DSSS)流水印技术抗多流攻击的能力,提出了一种基于伪噪声(PN)码分集的扩频流水印技术。每个水印位在嵌入目标流之前由不同的伪码片段进行扩散,消除了这些水印流之间的相互依赖性,有效地防御了多流攻击。与嵌入位置随机化方法相比,该方法的复杂度低,且不增加误报率。与水印位重排序方法相比,本文提出的方法更适合于DSSS流水印技术,并且具有更好的抗多流攻击效果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
PN Code Diversification Based Spread Spectrum Flow Watermarking Technology
Compared with passive flow correlation technology, active flow watermarking technology has the advantages of high accuracy and low false positive rate in the aspects of stepping stone attack tracking and anonymous abuser association. Multi-flow attack can detect the existence of flow watermark, restore the flow watermark, and even remove the flow watermark from target watermarked flow. To improve the multi-flow attack resistance capability of flow rate-based direct sequence spread spectrum (DSSS) flow watermarking technology, a pseudo-noise (PN) code diversification based spread spectrum flow watermarking technology is proposed. Each watermark bit is spread by different PN code fragments before embedded into target flow, which can eliminate the inter-dependence between these watermarked flows and effectively defend against multi-flow attack. Compared with the embedding position randomization method, the complexity of our proposed technology is low and the false positive rate doesn't increase. Compared with the watermark bit reordering method, our proposed technology is more suitable for the DSSS flow watermarking technology and the multi-flow attack resistant effect is better.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Real-Time Location Privacy Protection Method Based on Space Transformation Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card Off-Topic Text Detection Based on Neural Networks Combined with Text Features Research of X Ray Image Recognition Based on Neural Network CFO Algorithm Using Niche and Opposition-Based Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1