語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information similarity metrics in in...
~
Quach, Tu-Thach.
FindBook
Google Book
Amazon
博客來
Information similarity metrics in information security and forensics.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information similarity metrics in information security and forensics./
作者:
Quach, Tu-Thach.
面頁冊數:
116 p.
附註:
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
Contained By:
Dissertation Abstracts International71-02B.
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3390826
ISBN:
9781109611717
Information similarity metrics in information security and forensics.
Quach, Tu-Thach.
Information similarity metrics in information security and forensics.
- 116 p.
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
Thesis (Ph.D.)--The University of New Mexico, 2009.
We study two information similarity measures, relative entropy and the similarity metric, and methods for estimating them. Relative entropy can be readily estimated with existing algorithms based on compression. The similarity metric, based on algorithmic complexity, proves to be more difficult to estimate due to the fact that algorithmic complexity itself is not computable. We again turn to compression for estimating the similarity metric. Previous studies rely on the compression ratio as an indicator for choosing compressors to estimate the similarity metric. This assumption, however, is fundamentally flawed. We propose a new method to benchmark compressors for estimating the similarity metric. To demonstrate its use, we propose to quantify the security of a stegosystem using the similarity metric. Unlike other measures of steganographic security, the similarity metric is not only a true distance metric, but it is also universal in the sense that it is asymptotically minimal among all computable metrics between two objects. Therefore, it accounts for all similarities between two objects. In contrast, relative entropy, a widely accepted steganographic security definition, only takes into consideration the statistical similarity between two random variables. As an application, we present a general method for benchmarking stegosystems. The method is general in the sense that it is not restricted to any covertext medium and therefore, can be applied to a wide range of stegosystems. For demonstration, we analyze several image stegosystems using the newly proposed similarity metric as the security metric. The results show the true security limits of stegosystems regardless of the chosen security metric or the existence of steganalysis detectors. In other words, this makes it possible to show that a stegosystem with a large similarity metric is inherently insecure, even if it has not yet been broken.
ISBN: 9781109611717Subjects--Topical Terms:
1669061
Engineering, Computer.
Information similarity metrics in information security and forensics.
LDR
:02992nam 2200313 4500
001
1391590
005
20110119094951.5
008
130515s2009 ||||||||||||||||| ||eng d
020
$a
9781109611717
035
$a
(UMI)AAI3390826
035
$a
AAI3390826
040
$a
UMI
$c
UMI
100
1
$a
Quach, Tu-Thach.
$3
1670031
245
1 0
$a
Information similarity metrics in information security and forensics.
300
$a
116 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-02, Section: B, page: 1200.
500
$a
Adviser: Gregory L. Heileman.
502
$a
Thesis (Ph.D.)--The University of New Mexico, 2009.
520
$a
We study two information similarity measures, relative entropy and the similarity metric, and methods for estimating them. Relative entropy can be readily estimated with existing algorithms based on compression. The similarity metric, based on algorithmic complexity, proves to be more difficult to estimate due to the fact that algorithmic complexity itself is not computable. We again turn to compression for estimating the similarity metric. Previous studies rely on the compression ratio as an indicator for choosing compressors to estimate the similarity metric. This assumption, however, is fundamentally flawed. We propose a new method to benchmark compressors for estimating the similarity metric. To demonstrate its use, we propose to quantify the security of a stegosystem using the similarity metric. Unlike other measures of steganographic security, the similarity metric is not only a true distance metric, but it is also universal in the sense that it is asymptotically minimal among all computable metrics between two objects. Therefore, it accounts for all similarities between two objects. In contrast, relative entropy, a widely accepted steganographic security definition, only takes into consideration the statistical similarity between two random variables. As an application, we present a general method for benchmarking stegosystems. The method is general in the sense that it is not restricted to any covertext medium and therefore, can be applied to a wide range of stegosystems. For demonstration, we analyze several image stegosystems using the newly proposed similarity metric as the security metric. The results show the true security limits of stegosystems regardless of the chosen security metric or the existence of steganalysis detectors. In other words, this makes it possible to show that a stegosystem with a large similarity metric is inherently insecure, even if it has not yet been broken.
590
$a
School code: 0142.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0464
690
$a
0544
710
2
$a
The University of New Mexico.
$b
Computer Engineering.
$3
1670032
773
0
$t
Dissertation Abstracts International
$g
71-02B.
790
1 0
$a
Heileman, Gregory L.,
$e
advisor
790
1 0
$a
Perez-Gonzalez, Fernando
$e
committee member
790
1 0
$a
Abdallah, Chaouki T.
$e
committee member
790
1 0
$a
Pattichis, Marios S.
$e
committee member
790
$a
0142
791
$a
Ph.D.
792
$a
2009
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3390826
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9154729
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入