期刊文献+

一种新的动态网页程序的防篡改系统 被引量:3

A novel web application tamper proof method
下载PDF
导出
摘要 动态网页技术越来越多地应用于互联网,确保动态网页脚本的安全性的需求与日俱增,该文实现了一种新的基于脆弱性数字水印技术的动态网页应用程序防篡改系统,阐明了能够应用在动态网页防篡改系统中的脆弱性数字水印提取算法应该具有的特性,评估了系统运行的效率,证明了该系统嵌入水印和检测水印的过程的高效性,还对比证明了该系统相对于入侵检测系统有着更广泛的保护范围。 Web application is more and more used in current popular Internet sites; the security of the web application has become a very important issue. These papers implements a novel Web application tamper proof system,and analyzes the property that one feasible message digest algorithm should have in our scheme. This paper compares the new proposed system with intrusion detection system,and analyzes why this system can prevent more kinds of malevolence attack. The performance of the system is also evaluated by simulation results.
出处 《微计算机信息》 2010年第3期71-73,共3页 Control & Automation
基金 基金申请人:卢宏涛 项目名称:基于模式识别技术的网页防篡改水印研究 颁发部门:国家自然科学基金委(60573033)
关键词 动态网页 数字水印 哈希函数 主成份分析 入侵检测 Web Application watermarking Hash function PCA intrusion detection
  • 相关文献

参考文献5

  • 1C Wu, C Chang, S Yang, An Efficient Fragile Watermarking for Web Pages Tamper-Proof, Advances in Web and Network Technologies, and Information Management, 2007: 654-663.
  • 2Qijun Zhao, Hongtao Lu, PCA-based web page watermarking, Pattern Recognition Volume 40. Issue 4, , 2007:1334-1341.
  • 3徐蕾,黄玉军,汤光明.利用数字水印技术验证文本信息的篡改[J].微计算机信息,2005,21(12X):64-65. 被引量:7
  • 4Xiaoyun Wang, Hongbo Yu. How to Break MD5 and Other Hash Functions. Advances in Cryptology-Eurocrypt 05, LNCS3494:1- 18, 2005.
  • 5Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sungdeok Cha. Web Server Attack Categorization based on Root Causes and Their Locations. Proceedings of the Intemational Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2, p.90. 2004.

二级参考文献2

共引文献6

同被引文献19

  • 1全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 2顾流,万仲保,石红芹.基于web页信息隐藏的研究与实现[J].微计算机信息,2006,22(08X):186-187. 被引量:10
  • 3Sun Peng, Lu Hongtao. Two Efficient Fragile Web Page Watermarking Schemes. Fifth International Conference on Information Assurance and Security, 2009.IEEE Press.2009 (2): 326 - 329.
  • 4i LI C L, WANG Y H, MA B, et al. Tamper detection and self-recovery of biometric images using salient re- gion-based authentication watermarking scheme [ J ]. Computer Standards and Interfaces, 2012,34 (4) : 367 - 379.
  • 5ZHAO Q J, LU H T. A PCA-based watermarking scheme for tamper-proof of web pages[ J]. Pattern Recogni- tion,2005,38 : 1321 - 1323.
  • 6KATZENBEISSER S, PETICOLAS A P. Information hiding techniques for steganography and digital water- marking [ M ]. Boston : Artech House ,2000.
  • 7SUI X H, LUO H. A new steganography method based on hypertext [ C ]//Proc of Asia-Pacific Radio Sci- ence Conference. Qingdao : IEEE Press ,2004 : 181 - 184.
  • 8HUANG H J, ZHONG S H, SUN X M. An algorithm of webpage information hiding based on attributes [ C ]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Har- bin : IEEE Press ,2008:257 - 260.
  • 9廖琬明,张玉贤,李东晓,张明.基于小波变换的脆弱-鲁棒双重音频水印[J].浙江大学学报(工学版),2009,43(4):721-726. 被引量:12
  • 10李建国,马小虎,沈晓峰.一种基于重复标记属性的多网页信息隐藏方法[J].计算机应用与软件,2009,26(8):62-63. 被引量:7

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部