期刊文献+

基于密钥的信息隐藏技术个性化密钥交换

Research on One Type of Key Exchange Techniques in Information Hiding Techniques Based on Key
下载PDF
导出
摘要 为了实现密钥的安全传输,利用已有的信息隐藏系统,设计了个性化密密钥交换算法,并提出了具体的实现步骤。该方法增加了密钥系统的安全性,提高了信息隐藏系统的不可破译性。 To improve the safety of key in information transmitting system, an individuation encryption approach based on existing information hiding system is designed and implementing steps are presented. The experiment result proves that both the security of key system and the performance of information hiding system have been improved after using this technology.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2006年第3期48-49,54,共3页 Journal of Air Force Engineering University(Natural Science Edition)
关键词 网络安全 信息隐藏 个性化加密 密钥交换 network security information hiding individuation encryption key exchange
  • 相关文献

参考文献6

  • 1Diffie W, Hellmanm E. New Directions in Cryptography[ J]. IEEE Trans IT, 1976,22(6) :644- 654.
  • 2Beth T, Frisch M C. Public - Key Cryptography : State of the Art and Future Directions [ M ]. New York : Springer - Verlag, 1991.
  • 3韦卫,王行刚.密钥交换理论与算法研究[J].通信学报,1999,20(7):64-68. 被引量:11
  • 4Bender W, Gmbl D, Morimito N, et al. Techniques for data hiding [ J ]. IBM Systems Journal, 1996,35 ( 3 - 4 ) : 313 - 336.
  • 5Swanson M. Kobayashi M. A Multimedia data embedding and watermarking technologies[ J]. Pro IEEE, 1998,86 (6):1064 -1087.
  • 6孙启禄,殷肖川,王宾.一种基于离散小波域的隐蔽通信中的混合型信息隐藏技术[J].空军工程大学学报(自然科学版),2004,5(6):63-67. 被引量:1

二级参考文献8

  • 1华罗庚.数论导论,第2版[M].北京:科学出版社,1995..
  • 2潘承桐 潘承彪.解析数论基础[M].北京:科学出版社,1993..
  • 3华罗庚,数论导引(第2版),1995年
  • 4潘承洞,解析数论基础,1993年
  • 5Cox I J, Miller M L. The First 50 Years of Electronic Watermarking[ J ]. Journal of Applied Signal Processing, 2002, (2): 126 -132.
  • 6Cox I J,Kilian J,Leighton T,et at.Secure Spread Spectrum Watermarking for Multimedia[A].Proceedings of The IEEE International Conference on Image Processing ICIP97[C].USA October:Santa Barbara,California,1997,1673-1687.
  • 7Kundur D, Hatzinakos D. A Robust Digital Image Watermarking Method Using Wavelet - Based Fusion [ A ]. Proc. 4th IEEE Int.Conf. Image Processing97 [ C ]. CA: Santa Barbara, 1997. 544 - 547.
  • 8Hongmei Liu, Jiufen Liu, Jiwu Huang, et al. A Robust DWT - Based Blind Data Hiding Algorithm [ J ]. IEEE International Symposium on Circuits and Systems ,2002, (2) :672 - 675.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部