Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information similarity metrics in in...
~
Quach, Tu-Thach.
Linked to FindBook
Google Book
Amazon
博客來
Information similarity metrics in information security and forensics.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information similarity metrics in information security and forensics./
Author:
Quach, Tu-Thach.
Description:
116 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
Contained By:
Dissertation Abstracts International71-02B.
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3390826
ISBN:
9781109611717
Information similarity metrics in information security and forensics.
Quach, Tu-Thach.
Information similarity metrics in information security and forensics.
- 116 p.
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
Thesis (Ph.D.)--The University of New Mexico, 2009.
We study two information similarity measures, relative entropy and the similarity metric, and methods for estimating them. Relative entropy can be readily estimated with existing algorithms based on compression. The similarity metric, based on algorithmic complexity, proves to be more difficult to estimate due to the fact that algorithmic complexity itself is not computable. We again turn to compression for estimating the similarity metric. Previous studies rely on the compression ratio as an indicator for choosing compressors to estimate the similarity metric. This assumption, however, is fundamentally flawed. We propose a new method to benchmark compressors for estimating the similarity metric. To demonstrate its use, we propose to quantify the security of a stegosystem using the similarity metric. Unlike other measures of steganographic security, the similarity metric is not only a true distance metric, but it is also universal in the sense that it is asymptotically minimal among all computable metrics between two objects. Therefore, it accounts for all similarities between two objects. In contrast, relative entropy, a widely accepted steganographic security definition, only takes into consideration the statistical similarity between two random variables. As an application, we present a general method for benchmarking stegosystems. The method is general in the sense that it is not restricted to any covertext medium and therefore, can be applied to a wide range of stegosystems. For demonstration, we analyze several image stegosystems using the newly proposed similarity metric as the security metric. The results show the true security limits of stegosystems regardless of the chosen security metric or the existence of steganalysis detectors. In other words, this makes it possible to show that a stegosystem with a large similarity metric is inherently insecure, even if it has not yet been broken.
ISBN: 9781109611717Subjects--Topical Terms:
1669061
Engineering, Computer.
Information similarity metrics in information security and forensics.
LDR
:02992nam 2200313 4500
001
1391590
005
20110119094951.5
008
130515s2009 ||||||||||||||||| ||eng d
020
$a
9781109611717
035
$a
(UMI)AAI3390826
035
$a
AAI3390826
040
$a
UMI
$c
UMI
100
1
$a
Quach, Tu-Thach.
$3
1670031
245
1 0
$a
Information similarity metrics in information security and forensics.
300
$a
116 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
500
$a
Adviser: Gregory L. Heileman.
502
$a
Thesis (Ph.D.)--The University of New Mexico, 2009.
520
$a
We study two information similarity measures, relative entropy and the similarity metric, and methods for estimating them. Relative entropy can be readily estimated with existing algorithms based on compression. The similarity metric, based on algorithmic complexity, proves to be more difficult to estimate due to the fact that algorithmic complexity itself is not computable. We again turn to compression for estimating the similarity metric. Previous studies rely on the compression ratio as an indicator for choosing compressors to estimate the similarity metric. This assumption, however, is fundamentally flawed. We propose a new method to benchmark compressors for estimating the similarity metric. To demonstrate its use, we propose to quantify the security of a stegosystem using the similarity metric. Unlike other measures of steganographic security, the similarity metric is not only a true distance metric, but it is also universal in the sense that it is asymptotically minimal among all computable metrics between two objects. Therefore, it accounts for all similarities between two objects. In contrast, relative entropy, a widely accepted steganographic security definition, only takes into consideration the statistical similarity between two random variables. As an application, we present a general method for benchmarking stegosystems. The method is general in the sense that it is not restricted to any covertext medium and therefore, can be applied to a wide range of stegosystems. For demonstration, we analyze several image stegosystems using the newly proposed similarity metric as the security metric. The results show the true security limits of stegosystems regardless of the chosen security metric or the existence of steganalysis detectors. In other words, this makes it possible to show that a stegosystem with a large similarity metric is inherently insecure, even if it has not yet been broken.
590
$a
School code: 0142.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0464
690
$a
0544
710
2
$a
The University of New Mexico.
$b
Computer Engineering.
$3
1670032
773
0
$t
Dissertation Abstracts International
$g
71-02B.
790
1 0
$a
Heileman, Gregory L.,
$e
advisor
790
1 0
$a
Perez-Gonzalez, Fernando
$e
committee member
790
1 0
$a
Abdallah, Chaouki T.
$e
committee member
790
1 0
$a
Pattichis, Marios S.
$e
committee member
790
$a
0142
791
$a
Ph.D.
792
$a
2009
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3390826
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9154729
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login