期刊文献+

基于文本的信息隐藏技术研究 被引量:5

Research on the Technology of Information Hiding Based on Text Document
下载PDF
导出
摘要 信息隐藏技术是近几年来信息安全领域出现的一种新技术,不同于传统的密码学技术。它主要研究如何将机密信息隐藏于另一公开的信息中,然后通过公开信息的传输来传递机密信息。作为信息隐藏载体的公开信息可以是一般的文本文件、数字图像、数字视频和数字音频等等。而该文主要介绍了现有的几种基于文本的信息隐藏技术。 Information hiding is a tradition cryptology technology. is transferred. The open informatio kind of new technique appearing in the area of information security over the past few years It studies how secret information is hidden in another transferring open information by which n as the carrier of information hiding can be the general version document , digital graphic being unlike the secret digita information video and digital audio , etc.In this paper, we mainly introduces existing few kinds of information hiding based on text documen.
机构地区 湖南科技大学
出处 《计算机安全》 2008年第8期60-63,共4页 Network & Computer Security
关键词 文本 信息隐藏 信息安全 text document information hiding information security
  • 相关文献

参考文献7

二级参考文献34

  • 1StefanKatzenbeisser etal(美) 吴秋新 钮心忻 杨义先 罗守山 杨晓兵 译.信息隐藏技术--隐写术与数字水印 [M].北京:人民邮电出版社,2001..
  • 2Katzenbeisser, S. C. Principles of Steganogtaphy. In: S. Katzenbeisser and F. A. P. Petitcolas(eds. ) ,Information Hiding[ C ]. Techniques for Steganography and Digital Watermarking. Boston: Artech, 2000,17- 41.
  • 3Brassil, J., N. F. Maxemchuk, and L. O' Gonnan. Electronic Marking and Identification Technique to Discourage Document Copying[C] .Proceedings of INFOCOM '94,1994,1278- 1287.
  • 4Maxemchuk, N. F. 1994. Electronic Document Distribution[ J ]. AT&T Technical Journal, September/October, 73 - 80.
  • 5Low, S. H., N. F. Maxemchuk, and A. M. Lapnoe. Document Identification for Copyright Protection Using Centroid Detection[J]. IEEE Transactions on Communication, 1998,46(3) ,372 - 383.
  • 6Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg. Natural Language Processing for Information Assurance and Security:An Overview and Implementations [ C ]. In: M. Shaeffer ( ed. ), NSPW' 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51 - 65.
  • 7Mikhail J., Atallah, Samuel S., Wagstaff, Jr.. Watermarking with Quadratic Residues[C]. Working Paper,Department of Computer Science, Purdue University, 1996.
  • 8Mikhail J. Atallah, Victor Raskin, Mchael Crogan, Christian Hempelimann, Flofian Kerschbaum, Dina Mohamed and Sanket Naik. Natural Language Watetmarking:Design,Analysis, and a Proof-of- Concept Implementation[C]. Informarion Hiding 2001 : 185 - 199.
  • 9Mikhail J. Atallah, Craig J. Mcdonough, Victor Raskin. Natural Language for Information Assurance and Security:An Overview and Implementation[C] .Published in: M. Schaefer( ed. ) ,Proceedings. New Security Paradigm Workshop.September 18th-22nd,Ballycotton, Cork Ireland.New York:ACM Press,2000, pp.51-65.
  • 10Nirenburg, S., and V. Raskin 2003. Ontological Semantics. Camhridge[ M ], MA: MIT Press (forthcoming). Prepublication draft, http://crl.nmsu. edu/Staff. Pages/Technical/sergei/book/index - book. html.

共引文献108

同被引文献29

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部