情报科学 ›› 2025, Vol. 43 ›› Issue (7): 2-12.

• 专题组稿 • 上一篇    下一篇

面向深度伪装敏感信息暴露的暗数据反隐写模型
构建及应用实证

  

  • 出版日期:2025-07-05 发布日期:2025-10-16

  • Online:2025-07-05 Published:2025-10-16

摘要:

【目的/意义】敏感信息正随时代发展往自动化生成与深度伪装方面倾斜,使传统方法难以发挥检测成效,
应对其暴露工作重新引起重视。【方法/过程】从暗数据介入与反隐写干预思路下构建应对模型,在确定实施过程、
应用思路与目标基础前提下取得暴露方法,以便对信息本体、类型及特征进行外部表示。为检验应用价值依托现
实案例开展实证。【结果/结论】实证结果表明,模型能够对识别到的高作用高破坏力IX型深度伪装敏感信息环境、
载体、本体、传播对象、信息主题等内容进行充分暴露并得到特征画像。性能实验表明模型方法细节性能良好。【创
新/局限】创新在于设计一种利用暗数据发现并通过反隐写撕裂敏感信息深度伪装且能够进行特征概要表示的应
用模型,局限在于未能充分检验不同场景的模型应用效果,同时省略众多如暗数据结构体系构建及优化等理论论
证和反隐写链路感染与攻击对抗等技术描述内容而仅对关键实施步骤作以陈述,期待日后不断完善补全。

Abstract:

【Purpose/significance】Sensitive information is shifting towards automated generation and deep camouflage with the devel⁃
opment of the times, making it difficult for traditional methods to achieve effective detection. Therefore, the need to address its expo⁃
sure has been given renewed attention.【Method/process】Construct a response model from the perspectives of dark data intervention
and anti-steganography intervention, and obtain exposure methods based on determining the implementation process, application
ideas, and objectives, in order to externally represent the information ontology, types, and features. To verify the application value, em⁃
pirical research is conducted based on real-life cases.【Result/conclusion】The empirical results indicate that the model can fully ex⁃
pose and obtain feature portraits of the identified high impact and high destructive IX type deep camouflage sensitive information envi⁃
ronment, carrier, ontology, dissemination object, information theme, and other contents. The performance experiment shows that the
model method has good detail performance.【Innovation/limitation】The innovation lies in designing an application model that utilizes
dark data to discover and deeply disguise sensitive information through anti steganography tearing, and can perform feature summary
representation. The limitation is that the model's application effect in different scenarios has not been fully tested, and many theoreti⁃
cal proofs such as dark data structure system construction and optimization, as well as technical descriptions such as anti
steganography link infection and attack countermeasures, have been omitted, only stating key implementation steps, looking forward to
continuous improvement and completion in the future.