期刊文献+

基于变化分组时隙窗口的新型流水印技术 被引量:1

New network stream watermarking scheme based on interval changing slots
在线阅读 下载PDF
导出
摘要 为了解决当前网络数据包在嵌入水印时需要对数据包的内容进行修改以及分组方式单一性的问题,通过理论分析和计算,提出一种基于变化分组时隙窗口的新型流水印技术.给出了交替变化的时隙窗口划分的具体操作步骤及调制数据包发送延迟平均值的规则,同时采用码分复用技术对水印信息进行扩展后再传输,增强其纠错能力.为验证新技术的性能,模拟了不同网络环境,分别进行多次测试,同时用两种相似率计算方法计算检测率值的大小.试验结果表明,抖动时间均值超过6 ms时,新型水印技术检测率高于原始分组技术28%;另外若在抖动均值范围小于10 ms时,新型水印技术检测的误码率均值低于0.49,而原始水印误码率高于0.5.比较可知,新技术能明显提高检测率,性能良好. In order to solve the changing contents and the simple grouping of packet in current watermarking technologies,a new watermarking scheme was proposed based on theoretical analysis and calculation. The packet delay was modulated subtly in the interval-based changing slot network stream watermarking scheme. The code division multiplexing was used to extend the watermark information and improve the error correction ability. To test and verify the performance of new technology,various network environments were simulated to complete many tests,and the detection rates were calculated by two ways. The experimental results show that the detection rate of new scheme is increased by 28% than the original group packet when the jitter average is more than 6 ms. When the jitter average is less than 10 ms,the mean detection error rate of new technology is less than 0. 49,while the rate of original way is more than 0. 5. The comparison shows that the new technology can improve the detection rate clearly with high performance.
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第3期324-330,336,共8页 Journal of Jiangsu University:Natural Science Edition
基金 国家"863"计划项目(2007AA04ZIB2) 江苏省科技攻关项目(BE2007071)
关键词 网络流水印 变化分组 包间隔均值 鲁棒性 码分复用 network stream watermarking different intervals averaging packet delay robustness code division multiplexing
作者简介 严圣华(1975-),男,江苏镇江人,副教授(yanshl975@163.com),主要从事计算机网络、信息管理研究. 周莲英(1964-),女,江苏泰州人,教授,博士生导师(zhouly@ujs.edu.cn),主要从事信息安全技术与电子商务技术研究.
  • 相关文献

参考文献12

  • 1Wang Xiaogang, Yang Ming, Luo Junzhou. A novel se- quential watermark detection model for efficient trace- back of secret network attackflows [ J ]. Journal of Net- work and Computer Application:, 2013,36 ( 6 ) : 1660 - 1670.
  • 2张连成,王振兴,刘慧生.网络流水印技术研究进展[J].计算机科学,2011,38(11):7-11. 被引量:4
  • 3张连成,王振兴,徐静.一种基于包序重排的流水印技术[J].软件学报,2011,22(2):17-22.
  • 4Wang Xiaogang, Luo Junzhou, Yang Ming. An efficient sequential watermark detection model for tracing network attack flows [ C ] //Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Coopera- tive Work in Design. Piscataway: IEEE Computer Socie- ty,2012:236 - 243.
  • 5Pyun Young June, Park Younghee, Reeves Douglas S, et al. Interval-based flow watermarking for tracing interac- tive traffic[J]. Computer Networks,2012,56(5) :1646 - 1665.
  • 6何高峰,杨明,罗军舟,张璐,马媛媛.洋葱路由追踪技术中时间特征的建模与分析[J].计算机学报,2014,37(2):356-372. 被引量:14
  • 7Pyun Young June, Park Young Hee, Wang Xinyuan, et al. Tracing traffic through intermediate hosts that repac- ketize flows [ C ]//Proceedings of the 26th IEEE Interna- tional Conference on Computer Communications. Ancho- rage : IEEE,2007 : 634 - 642.
  • 8Houmansadr Amir, Kiyavash Negar, Borisov Nikita. RAINBOW: a robust and invisible non-blind watermark for network flows [ C ] J/Proceedings of the 16th Annual Network & Distributed System Security Symposium. [ S. 1. I : The Internet Society,2009:224 -236.
  • 9张璐,罗军舟,杨明,何高峰.基于时隙质心流水印的匿名通信追踪技术[J].软件学报,2011,22(10):2358-2371. 被引量:21
  • 10Pan Zheng, Peng Hong, Long Xianzhong, et al. A wa- termarking-based host correlation detection scheme [C]//Proceedings of 2009 International Conference on Management of e:Gommerce and e-Government. Nan- chang, China: IEEE Computer Society, 2009:493 - 497.

二级参考文献88

  • 1卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:32
  • 2邵立松,窦文华.自相似网络通信量模型研究综述[J].电子与信息学报,2005,27(10):1671-1676. 被引量:10
  • 3孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 4Pan Zheng, Peng Hong, Long Xian-zhong, et al. A watermarking-based host correlation detection scheme[A]//2009 International Conference on Management of e-Commerce and e-Government, 2009[C]. Nanchang, China: IEEE Computer Society, 2009:493-497.
  • 5Wang Xin-yuan, Chen Shi-ping,Jajodia S. Tracking anonymous peer-to-peer voip calls on the internet [A] // Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), 2005[C]. Alexandra, Virginia, USA: ACM, 2005 : 81- 91.
  • 6Peng Pai, Ning Peng, Reeves D S, et al. Active timing-based correlation of perturbed traffic flows with chaff packets[A]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops ( ICDCSW' 05 ), 2005 [C]. Columbus, OH, USA.. IEEE Computer Society, 2005 : 107-113.
  • 7Pyun Y J, Park Y H, Wang Xin-yuan, et al. Tracing traffic through intermediate hosts that repacketize flows [A] // Proceedings of the 26th IEEE International Conference on Computer Communications (Infocom' 07), 2007 [C]. Anchorage, AK, USA.. IEEE, 2007: 634-642.
  • 8Huang Di-jiang, Agarwal U. Countering repacketization watermarking attacks on tor network[A]ffProeeedings of the 8th International Conference on Application Cryptography and Network Security ( ACNS' 10), 2010 [C]. Beijing, China: Springer, 2010:232-249.
  • 9Kiyavash N, Houmansadr A, Borisov N. Multi-flow attacks against network flow watermarking schemes[A]//Proceedings of 17th USENIX Security, 2008[C]. San Jose, CA, USA: USENIX Association, 2008 : 307-320.
  • 10Wang Xiao-gang, Luo Jun-zhou, Yang Ming. An interval centroid based spread spectrum watermark for tracing multiple network flows [A]// Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics, 2009 [C]. San Antonio, TX, USA: IEEE, 2009 :4000-4006.

共引文献36

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部