期刊文献+

数字隐藏技术在秘密通信中的应用 被引量:2

Application of Data Hiding Technology in Secret Communication
下载PDF
导出
摘要 为了提高秘密通信的安全性、隐蔽性,提出一套基于数字隐藏技术的保密通信方案。该方案将需要秘密传送的信息隐藏在普通图像中发送。收方得到图像后从中提取秘密信息。通过试验和分析发现该方案具有安全性好、隐藏数据量大、速度快不易被检测等优点。更重要的是该方案的隐蔽性好,敌方很难发现图像中藏有秘密信息,因此不会去尝试破解或者切断我方信道。根据该方案的思路还可以衍生出大量基于数字隐藏技术的保密通信方案。 In order to improve the security and hiding, a new communication seheme based on digital hiding technology is introduced. In this scheme, the secret information is hidden in a normal image and sent to destination. The destination gets the image and takes the secret information from the image. Through the experiment and analysis, this scheme has high security, big, quick and diffieult to detect. What' s more, the hiding of this scheme is good. The enemy can not find the secret information hidden in image. So they will not attempt to analyze and damage our information channel. According to this scheme, a lot of new secret communication scheme will be found.
出处 《计算机技术与发展》 2007年第5期101-103,共3页 Computer Technology and Development
基金 国家自然科学基金资助项目(60471055) 国家863项目 博士点基金(0040614017)
关键词 数字隐藏 图像处理 保密通信 digital hiding image process secret communication
  • 相关文献

参考文献5

二级参考文献13

  • 1杨峰,李景峰,刘飞,祝跃飞.用ARM和FPGA实现无线局域网的安全接入[J].微计算机信息,2005,21(07Z):111-113. 被引量:6
  • 2Anderson, R., Biham, E., Knudsen, L., "Serpent :Aproposal for Advanced Encryption Standard". http://www. nist. gov/aes, 1998.
  • 3Adams,C. "The CAST-128Encryption Algorithm "Request for Commnets(RFC 2144),May 1997.
  • 4Adams ,C.,Gilchrist, J. "The CAST-256 Encryption Algorithm"Reauest for comments(RFC 2612),May 1999.
  • 5Braden, R., Borman, D., Partridge, C., "Computing the Internet Checksum, "Reaquest for Comment (RFC1071), 9, 1998.
  • 6XavierLagrange著 顾肇基译.GSM网络与GPRS[M].北京:电子工业出版社,2002..
  • 7[美]Carlton R D.IPSec:VPN的安全实施[M].北京:清华大学出版社,2002..
  • 8王书琴.细谈局域网内的安全误区.http://www.cnw.com.cn/ store/detail
  • 9张玉清,戴祖锋.安全扫猫技术.清华大学出版社.2004
  • 10王蔚,冯运波,杨义先.IPSec的实现途径及主要产品[J].电信科学,2001,17(5):41-43. 被引量:4

共引文献32

同被引文献17

  • 1朱勤,于守健,乐嘉锦.数据库水印研究与进展[J].计算机工程与应用,2006,42(29):198-201. 被引量:17
  • 2阎晓华,王冰.基于信息隐藏技术的PE病毒防治[J].计算机应用与软件,2007,24(6):9-11. 被引量:1
  • 3Barni M,Podilchuk C I,Bartolini F,et al.Watermark embedding: Hiding a signal with in a cover image[J].IEEE Comm Magazine, 2001,39(8) : 102-108.
  • 4Hernandez M J R,Kutter M.Information retrieval in digital water- marking[J].IEEE Comm Magazine, 2001,39(8 ) : 110-116.
  • 5Agrawal R,Kiernan J.Watermarking relational databases [C]//Proceedings of the 28th International Conference on VLDB,2002.
  • 6Hartung F,Girod B.Fast public-key watermarking of compressed video[C]//Preceedings of the IEEE International Conference on Image Processing (ICIP97), Santa Barbara, CA, USA, 1997,1:528- 531.
  • 7Li Yingjiu, Swarup V, Jajodia S, Fingerprinting relational databases: Schemes and speeialties[J].IEEE Transactions on Dependable and Secure Computing, 2005,2( 1 ) : 34-45.
  • 8Guo Fei,Wang Jian-min,Zhang Zhi-hao,et al.An improved algorithm to watermark numeric relational data[C]//Lecture Notes in Computer Science 3786:Proceedings of WISA 2005,2006:138-149.
  • 9Jack T B,Steven L,Nicholas F M. Copyright protection for the Eled Ronie distribution of text documents [ J ]. IEEE, 1999,87(7) :1181-1196.
  • 10刘冬晖.基于UML的学生成绩管理系统的分析与设计.科技与教育,2008,(6):75-76.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部