Long PN Code Based DSSS Watermarking

被引:0
|
作者
Huang, Junwei [1 ]
Pan, Xian [1 ]
Fu, Xinwen [1 ]
Wang, Jie [1 ]
机构
[1] Univ Massachusetts Lowell, Lowell, MA 01854 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber crimes often involve complicated scenes. In this paper, we investigate unidentified crimes committed through anonymous communication networks. We developed a long Pseudo-Noise (PN) code based Direct Sequence Spread Spectrum (DSSS) flow marking technique for invisibly tracing suspect anonymous flows. By interfering with a sender's traffic and marginally varying its rate, an investigator can embed a secret spread spectrum signal into the sender's traffic. Each signal bit is modulated with a small segment of a long PN code. By tracing where the embedded signal goes, the investigator can trace the sender and receiver of the suspect flow despite the use of anonymous networks. Benefits of the Long PN code include its resistance to previous discovered detection approaches. We may also use the vast number of long PN code at different phases to conduct parallel tracback without worrying about the interference between codes. Using a combination of analytical modeling and experiments on Anonymizer, we demonstrate the effectiveness of the long PN code based DSSS watermarking technique.
引用
收藏
页码:2426 / 2434
页数:9
相关论文
共 50 条
  • [31] Application of DSTC to code acquisition system of DSSS
    Department of Satellite Communication, Institute of Communications Engineering, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    Dianzi Yu Xinxi Xuebao, 2007, 8 (1942-1945):
  • [32] DSSS/BPSK信号PN码速率的估计
    刘营营
    徐朝阳
    现代电子技术, 2011, 34 (21) : 20 - 22
  • [33] An Algorithm for Acquiring PRN Code in DSSS System Based on Sub-sampling
    Qian, Bo
    Yang, Li
    Feng, Yong-xin
    Pan, Cheng-sheng
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 327 - +
  • [34] The design and FPGA realization of the long PN code acquisition circuit based on digital matched-filter
    Tan, XH
    Yang, SZ
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 744 - 747
  • [35] QR Code Watermarking Algorithm based on Wavelet Transform
    Panyavaraporn, Jantana
    Horkaew, Paramate
    Wongtrairat, Wannaree
    2013 13TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT): COMMUNICATION AND INFORMATION TECHNOLOGY FOR NEW LIFE STYLE BEYOND THE CLOUD, 2013, : 791 - 796
  • [36] A blind audio watermarking algorithm based on convolutional code
    Xu Da-Wen
    Wang Rang-Ding
    Bao Ji-Long
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2551 - +
  • [37] QR code based blind digital image watermarking with attack detection code
    Thulasidharan, Pillai Praveen
    Nair, Madhu S.
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (07) : 1074 - 1084
  • [38] Digital audio watermarking based on code division multiplexing
    Jia, Jun
    Wang, Shuo-Zhong
    Zhang, Xin-Peng
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2004, 38 (12): : 2073 - 2077
  • [39] DWT and QR Code Based Watermarking for Document DRM
    Cardamone, Nicolo
    d'Amore, Fabrizio
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 137 - 150
  • [40] An Improved Digital Watermarking Technology Based on QR Code
    Zhang, Weijun
    Meng, Xuetian
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1004 - 1007