期刊文献+

信道信息隐藏中秘密信息的预处理研究 被引量:3

Study of Pretreating Secret Information in Information Hiding System Based on Channel Coding
原文传递
导出
摘要 文章研究了基于信道编码的信息隐藏技术,提出了新的秘密信息预处理方法—采用RS码M公钥密码体制对秘密信息进行编码。理论分析和实际计算表明,该方法能够极大地提高秘密信息的安全性。 In this paper, information hiding using channel coding as carrier is studied. This paper also proposes a new method for pretreating secret information, which encodes secret information using the RS codes M public key cipher system. Theoretical analysis and actual computing show that this method can greatly improve the security of secret information.
作者 徐甫 刘玉君
出处 《信息安全与通信保密》 2007年第6期195-197,共3页 Information Security and Communications Privacy
关键词 信道编码 信息隐藏 RS码 M公钥密码体制 channel coding information hiding RS codes M public key cipher system
  • 相关文献

参考文献6

二级参考文献15

  • 1[1]Katzenbeisser S,Petitcolas F著,吴新秋等译.信息隐藏技术--隐写术与水印.北京:人民邮电出版社,2001
  • 2[2]Fridrich J, Goljan M. Practical Steganalysis - State of the Art.Proceeding SPIE PhotonicsWest, vol. 4675, Electronic Imaging 2002,Security and Watermarking of Multimedia Contents, San Jose, Cali fomia, January, 2002:1 ~ 13
  • 3KATZENBEISSERS PETITCOLASFAP.吴秋新 钮心 杨义先 等译.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001.1,2.
  • 4刘玉君.信道编码[M].郑州:河南科学技术出版社,2001.9.
  • 5王新梅 肖国镇.纠错码-原理与方法[M].西安:西安电子科技大学出版社,2001..
  • 6AHSAN K,KUNDUR D.Practical Data Hiding in TCP/IP.Http://citeseer.nj.nec.com/Ahsan99Practical.Htlm.
  • 7A. Menezes, Evan Oorschot, and S.Vanstone, Handbook of Applied Cryptography. BocaRaton, FL:CRC,1997
  • 8Berlekamp, E. R. Algebraic Coding Theory, McGraw-Hill Book Company, New York, U.S.A. 1968
  • 9Massey, J. L,Shift-Register Synthesis and BCH Decoding,IEEE Trans. on Information Theory, 15(1969), 122-127
  • 10T. Johansson and EJonsson."Theoretical Analysis of a Correlation Attack Based on Convolutional Codes", IEEE Trans. On Information Theory, 48(8), 2002, 2173- 2181

共引文献40

同被引文献23

  • 1李红妹.基于多载波OFDM物理层信道编码技术的研究[J].信息安全与通信保密,2006,28(2):64-67. 被引量:4
  • 2SHOKROLLAHI A. Raptor Codes[J]. IEEE Transactions on Information Theory, 2006,52(06):2551-2555.
  • 3LUBY M. LT Code[C]//Proceedings of the ACM Symposium on Foundations of Computer Science (FOCS)[s. 1.]: IEEE Press, 2002: 6-7.
  • 4ABOUEI J, BROWN J D, PLATANIOTIS K N, et al. On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks[J]. IEEE Transactions on Signal Processing, 2011,59(03):1116-1127.
  • 5CAO Rui, YANG Liuqing. Decomposed LT Codes for Cooperative Relay Communications[J]. IEEE Journal on Selected Areas in Communications, 2012, 30(02): 407-414.
  • 6PUDUCHERI S, KLIEWER J, FUJA T E. Didtributed LT Codes[C]//IEEE Int. Symp. Information Theory. Seattle, WA: IEEE Press, 2006:987-991.
  • 7PUDUCHERI S, Performance Transactions 3740-3754. KLIEWER J, FUJA T E. The of Didtributed LT Code on Information Theory, 20 Design and s[J]. IEEE 07, 53(10).
  • 8YUAN X, LI Ping. On Systematic LT Code[J]. IEEE Commun. Letters, 2008, 12(09) : 681-683.
  • 9ARIKAN E. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels[J]. IEEE Transactions on Information Theory, 2009, 55(07) :1173-1177.
  • 10ARIKAN E. Channel Combining and Splitting for Cutoff Rate Improvement [J]. IEEE Trans. Inf. Theory, 2006, 52(02): 628-639.

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部