期刊文献+

一种简单实用的中文信息隐写算法 被引量:1

Simple and practical information hiding algorithm for Chinese text
下载PDF
导出
摘要 信息隐写是信息安全的重要研究方向之一,其主要研究如何将秘密信息嵌入到特定载体之中,以达到安全通信或版权保护等目的。分析了文本信息隐写的研究现状和存在的不足,设计了一种基于简化字、繁体字替换的中文信息隐写算法。算法对隐写信息进行分段,通过"解释"的方式嵌入分段信息,分段长度可以根据不同的应用需要灵活调整,算法最高嵌入率约为2%。另外,算法可以抵抗对载体文本的重新排版等传统攻击方法。 Information Hiding(IH) is an important research direction of information security. IH mainly researches how to embed secret information into carriers, in order to achieve the objectives of secure communication, watermarking, and so on. This paper analyzes the current status of IH based on text and its shortcomings. A novel information hiding algorithm based on substi- tution of different forms of Chinese characters is proposed. It splits the secret information, and then embeds the sector information into the cartier text by explanation. The sector length can be adjusted according to application requirements. The highest embedding rate of the algorithm is about 2%. In addition, this algorithm can resist traditional attacking method such as re-layout.
出处 《计算机工程与应用》 CSCD 2013年第15期88-91,共4页 Computer Engineering and Applications
基金 国家自然科学基金重大研究计划(No.90818005) 国家自然科学基金(No.60773032 No.60703071) 教育部博士点基金(No.2006CB303006) 江苏省自然科学基金(No.BK2007060)
关键词 信息隐写 简化字 繁体字 分段 information hiding simplified Chinese characters traditional Chinese characters section
  • 相关文献

参考文献13

  • 1Bennett K.Linguistic steganography: survey, analysis, and robust- ness concerns for hiding information in text, CERIAS tech report 2004-13[R].Purdue University,2004.
  • 2Brassil J T, Low S, Maxemchuk N F.Copyright protection for electronic distribution of text documents[J].Proceedings of the IEEE(USA), 1999,87(7) : 1181-1196.
  • 3Brassil J, Low S, Maxemchnk N, et al.Electronic marking and identification techniques to discourage document copying[C]// Proc Infocom, Toronto, Canada, 1994: 1278-1287.
  • 4Leary P.The second cryptographic Shakespeare: a monograph wherein the poems and plays attributed to William Shake- speare are proven to contain the enciphered name of the concealed author,Francis Bacon[M].2nd ed.Omaha,NE:West- chester House, 1990.
  • 5Maher K.TEXTO[EB/OL].[2012-09-21 ].ftp://tip.funet.fl/pub/crypt/ steganography/texto.tar.gz.
  • 6Mark C.Hiding the hidden: a software system for conceal- ing ciphertext as innocuous text[D].University of Wisconsin- Milwaukee, 1997.
  • 7Chen Zhili, Huang Liusheng, Yu Zhenshan, et al.Linguistic steg- anography detection using statistical characteristics of corre- lations between words[C]//LNCS 5284: Information Hiding 2008, USA, 2008 : 224-235.
  • 8Chen Zhili, Huang Liusheng, Yu Zhenshan, et al.A statistical algorithm for linguistic steganography detection based on dis- tribution of words[C]//ARES2008, Spain,2008 : 558-563.
  • 9Chen Zhili, Huang Liusheng, Yu Zhenshan, et al.Effective linguistic steganography detection[C]//CIT Workshops, Aus- tralia, 2008 : 224:229.
  • 10Bergmair R.Towards linguistic steganography:a systematic investigation of approaches,systems,and issues,A-4061[R]. Vienna,Austria:University of Derby,2004.

二级参考文献1

共引文献1

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部