期刊文献+

一种基于随机序列填充的信息隐藏方法 被引量:2

An Information Hiding Method Based on Filling Random Sequences
下载PDF
导出
摘要 由于计算机技术的飞速发展使得解密技术也得到很大发展,它已对传统加密方法构成威胁。因此,文章提出了一种基于随机序列填充的信息隐藏方法,该方法中使用黄金分割算法计算出被隐藏信息的大小,然后使用填充算法将秘密信息隐藏在随机序列中。该方法有效提高了信息的安全性、可靠性,有着广泛的应用前景。 With the development of computer technology,the cryptanalysis techniques have got great advances.This has threatened the traditional encryption.So,this paper presents an information hiding method based on filling random sequences.In this method,the gold-cut algorithm is used to give the rate of hiding information and hidden information. After that we hide the important information in random sequences through a filling algorithm.And this greatly improves the security of information and it has more practical applications.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第30期153-154,共2页 Computer Engineering and Applications
关键词 信息安全 随机序列 信息隐藏 黄金分割算法 information security,random sequences,information hiding,gold-cut algorithm
  • 相关文献

参考文献5

  • 1I J Cox,M L Miller.The first 50 years of electronic watermarking[J]. Journal of Applied Signal Processing,2002,9(2):126-132.
  • 2F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding-A survey[C].In:Proceeding of the IEEE(Special Issue on Protection of Multimedia Content), 1999;87(7) : 1062-1078.
  • 3常速,谭运猛,杨宗凯.基于行程压缩编码的信息隐藏算法[J].计算机工程与应用,2003,39(17):150-152. 被引量:3
  • 4F A Petitcolas,R J Anderson,M G Kuhn.Information Hiding-A survey[J].Proceeding of the IEEE(Special Issue on Protection of Multimedia Content), 1999 ; 87 (7) : 1062-1078.
  • 5C I Podilchuk,E J Delp.Digital watermarking:algorithms and applications [J].IEEE Signal Processing Magazine,2001 ;69(13) :33-46.

二级参考文献5

  • 1W Bender et al.Techniques for data hiding Technical report[R].Media I Lab,MIT, 1994.
  • 2Anderson R.Information hiding[C].In:First International Workshop,I H'96 Cambridge, 1996.
  • 3Johnson N,Jajodia S.Exploring steganography:seeing and the unseen[J]. IEEE Computer, 1998 ; 26-34.
  • 4Cachin C.An Information Theoretic Modal for Steganogmphy[C].In: proceedings Information Hiding,Second International Workshop,IH'98. Portland, Oregon, USA: 1998 : 307-318.
  • 5Katzenbeisser S,Petitcdas F A P.Information Hiding Techniques for Steganography and Digital Waterrmarking[M].Artech Home Computer Security Series, 1999.

共引文献2

同被引文献6

  • 1Neil F Johnson.Steganography Tools[EB/OL].http://www.jjtc.com/Security/stegtools.htm,2006-05.com/Security/stegtools.htm,2006-05.
  • 2Mielikainen J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285 ~ 287.
  • 3Petitcolas F A P,Anderson R J.Evaluation of copyright marking systems[A].In:Proceedings of IEEE Mulitimedia Systems[C],Florence.,Italy,1999:574 ~ 579.
  • 4NeilF Johnson.SteganographyTools[OL].http://www.jjtc.com/Security/ stegtools.htm,2006.
  • 5Wu D C,Tsai W H.A steganographic method for images by pixel-value differencing,Pattern Recognition Letters,2003,24(9-10):1613-1626.
  • 6Petitcolas F A P,Anderson R J.Evaluation of Copyright Marking Systems[J].In Proc.IEEE Mulitimedia Systems.Italy:Florence.June 1999:574-579.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部