[1]卢璥,伏容,田晖.密钥驱动下多语义维度结构化成绩表生成式隐写方法[J].华侨大学学报(自然科学版),2025,46(3):296-307.[doi:10.11830/ISSN.1000-5013.202504041]
 LU Jing,FU Rong,TIAN Hui.Key-Driven Multi-Semantic Dimensional Generative Steganography for Structured Academic Transcripts[J].Journal of Huaqiao University(Natural Science),2025,46(3):296-307.[doi:10.11830/ISSN.1000-5013.202504041]
点击复制

密钥驱动下多语义维度结构化成绩表生成式隐写方法()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第46卷
期数:
2025年第3期
页码:
296-307
栏目:
出版日期:
2025-05-20

文章信息/Info

Title:
Key-Driven Multi-Semantic Dimensional Generative Steganography for Structured Academic Transcripts
文章编号:
1000-5013(2025)03-0296-12
作者:
卢璥12 伏容12 田晖12
1. 华侨大学 计算机科学与技术学院, 福建 厦门 361021; 2. 厦门市数据安全与区块链技术重点实验室, 福建 厦门 361021
Author(s):
LU Jing12 FU Rong12 TIAN Hui12
1. College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China; 2. Xiamen Key Laboratory of Data Security and Blockchain Technology, Xiamen 361021, China
关键词:
生成式隐写 结构化成绩表 多语义维度 密钥驱动嵌入
Keywords:
generative steganography structured academic transcript multidimensional semantics key-driven embedding
分类号:
TP309.2
DOI:
10.11830/ISSN.1000-5013.202504041
文献标志码:
A
摘要:
针对教育结构化数据隐写中修改痕迹显著、多语义维度协同编码不足及安全可控性薄弱的问题,提出一种基于密钥驱动与多字段协同生成的无载体隐写方法。该方法以结构化成绩表为隐写对象,融合姓氏、名字、性别、成绩等多语义维度信息,通过主密钥分层派生子密钥,实现高保真度的隐写成绩表生成与可控嵌入。实验结果表明:隐写生成的姓名符合自然命名规范,课程成绩分布特征与基础表高度一致,统计特性稳定且无系统性偏差。与传统方法相比,文中方法在不可感知性、数据保真度与隐蔽性方面更具优势,为教育数据隐写提供了一种兼顾容量与安全性的可靠方案。
Abstract:
Aiming at the issues of significant modification traces, insufficient collaborative encoding of multi-semantic dimensional fields, and weak security controllability in educational structured data steganography, this paper presents a key-driven and multi-semantic dimensional generation-based carrierless steganography method. Using a structured academic transcript as the object for steganography, the method integrates multiple semantic dimensions, including surnames, given names, gender, and grades. It achieves high-fidelity generation and controllable embedding of steganographic academic transcripts by hierarchically deriving sub-keys from the master key. Experimental results show that the generated names conform to natural naming conventions, the grade distribution characteristics remain highly consistent with the original sheet, and the statistical properties are stable with no systematic bias. Compared with traditional methods, this approach demonstrates significant advantages in imperceptibility, data fidelity, and concealment, providing a reliable solution for educational data steganography that balances capacity and security.

参考文献/References:

[1] 彭飞,肖荻昱.大数据时代国内外个人信息保护研究热点和演化趋势: 基于科学知识图谱分析的文献计量方法[J].情报科学,2024,42(5):102-112.DOI:10.3969/j.issn.1005-8095.2024.05.002.
[2] CHEN Y,WANG H,LI W,et al.A steganography immunoprocessing framework against CNN-based and handcrafted steganalysis[J].IEEE Transactions on Information Forensics and Security,2024,19:6055-6069.DOI:10.1109/TIFS.2024.3409075.
[3] 付章杰,王帆,孙星明,等.基于深度学习的图像隐写方法研究[J].计算机学报,2020,43(9):1656-1672.1DOI:10.11897/SP.J.1016.2020.01656.
[4] SU W,NI J,HU X,et al.Efficient audio steganography using generalized audio intrinsic energy with micro-amplitude modification suppression[J].IEEE Transactions on Information Forensics and Security,2024,19:6559-6572.DOI:10.1109/TIFS.2024.3417268.
[5] 李敬轩,胡润文,阮观奇,等.基于手工特征提取与结果融合的CNN音频隐写分析算法[J].计算机学报,2021,44(10):2061-2075.DOI:10.11897/SP.J.1016.2021.02061.
[6] SHENG Qingxin,FU C,LIN Zhaonan,et al.Content-aware tunable selective encryption for HEVC using sine-modular chaotification model[J].IEEE Transactions on Multimedia,2025,27:41-55.DOI:10.1109/TMM.2024.3521724.
[7] 李林聪,姚远志,张晓雅,等.基于修改概率转换和非加性嵌入失真的视频隐写方法[J].电子与信息学报,2020,42(10):2357-2364.DOI:10.11999/JEIT200001
[8] KOPTYRA K,OGIELA M R.Distributed steganography in PDF files: Secrets hidden in modified pages[J].Entropy,2020,22(6):600.DOI:10.3390/e22060600.
[9] 郝宇,施勇,薛质,等.Office XML文档信息隐藏方法[J].计算机技术与发展,2017,27(10):96-100.DOI:10.3969/j.issn.1673-629X.2017.10.021.
[10] XIANG Lingyun,OU Chengfu,ZENG Daojian.Linguistic steganography: Hiding information in syntax space[J].IEEE Signal Processing Letters,2024,31:261-265.
[11] 秦川,王萌,司广文,等.基于绝句生成的构造式信息隐藏算法[J].计算机学报,2021,44(4):773-785.DOI:10.11897/SP.J.1016.2021.00773.
[12] KAUSHIK K,SHARMA G,NAROOKA P,et al.HTML smuggling: Attack and mitigation[C]//16th International Conference on Security of Information and Networks(SIN).Jaipur,India: IEEE Press,2023:1-5.DOI:10.1109/SIN60469.2023.10474837.
[13] FENO H R.Unveiling hidden messages: A robust approach to detecting structural text steganography in office open XML documents[C]//5th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering(ELECOM).Balaclava,Mauritius:IEEE Press,2024:1-6.DOI:10.1109/ELECOM63163.2024.10892148.
[14] 杨文秀,吴建荣,常潇,等.基于Excel文件的信息隐藏方法,装置,设备及存储介质:202210749023.7[P].2025-04-05.
[15] WENDZEL S,CAVIGLIONE L,MAZURCZYK W,et al.A revised taxonomy of steganography embedding patterns[C]//Proceedings of the 16th International Conference on Availability, Reliability and Security.New York,USA: Association for Computing Machinery,2021:1-12.DOI:10.1145/3465481.347006.

备注/Memo

备注/Memo:
收稿日期: 2025-04-22
通信作者: 田晖(1982-),男,教授,博士,博士生导师,主要从事网络与信息安全、信息隐藏及其检测和数据安全等的研究。E-mail:htian@hqu.edu.cn。
基金项目: 国家自然科学基金资助项目(61972168, U1536115)
更新日期/Last Update: 2025-05-20