期刊文献+

基于网络聊天环境的秘密信息隐蔽通信研究

Secret Information Hiding Communication Research Based on Network Chat Environment
下载PDF
导出
摘要 针对网络聊天环境中独有的语言特点,提出一种基于聊天环境的秘密信息隐蔽通信新方法,用聊天语句中每个汉字笔画数的奇偶性嵌入秘密信息,利用聊天环境中经常使用的表情符号标识秘密信息嵌入位置,将秘密信息分块嵌入到多个聊天语句中传输,达到信息隐蔽通信的目的.实验表明,该方法简单易用,隐蔽性、安全性也较为理想. For the unique linguistic features of the language environment for chatting in network,a new method of secret information hiding communication is proposed based on the network chatting environment.According to the parity of strokes of each Chinese character,secret information is embedded into the chat statement.The emoticon icons often used in chat environment are used to represent the secret information embedding position.Secret information is embedded into multiple chat statement,so as to achieve the purpose of information hiding communication.Experiments show that the method is simple and easy to use,and concealment and security are also ideal.
作者 王东 熊世桓
出处 《内蒙古师范大学学报(自然科学汉文版)》 CAS 北大核心 2014年第5期597-601,共5页 Journal of Inner Mongolia Normal University(Natural Science Edition)
基金 贵州省优秀科技教育人才省长专项资金(黔省专合字(2012)82) 贵阳市科技计划项目(筑科合同[2013101]10-6号)
关键词 信息隐藏 表情符号 网络聊天 即时通信 information hiding emoticons network chat instant messenger
  • 相关文献

参考文献11

  • 1陈萍,孙利.基于表情符号的信息伪装算法设计与实现[J].太原理工大学学报,2012,43(4):456-459. 被引量:2
  • 2BRASSIL J,LOW S, MAXEMCHUK N,et al. Electronic marking and identification techniques to discourage document copying[J]. IEEEJon Select Areas in Commun,1995,13(8) :1495-1504.
  • 3BRASSII. J, LOW S, MAXEMCHUK N F. Copyright protection for the electronic distribution of text documents [J]. Proc of the IEEE,1999,87(7) :1181-1196.
  • 4HUANG Ding,YAN Hong. Interword distance changes represented by sine waves for watermarking text images [J]. I EEE Trans on Circuits and Systems for Video Technology, 2001,11 (12):1237-1245.
  • 5LOW S, MAXEMCHUK N. Capacity of text marking channel [J]. Signal Processing Letters,2000,7(12) :345-347.
  • 6Atallah M J, McDonough C J, Raskin V, et al. Natural I.anguage Protossing for Information Assurance and Security: An Overview and Implementations[C]// Shaefer M. Proceedings of Workshop on New Paradigms in Information Security,Cork, Ireland, NSPW'00. New York : ACM Press, 2000 : 51-65.
  • 7Atallah M J, V Raskin, Crogan M, et al. Natural Language Watermarking: Design, Analysis, and a Proof of-Concept Implementation [C]// Moskowitz I S. Information Hiding.. The 4th International Workshop. Pittsburgh, PA, USA, 2001:185-199.
  • 8甘灿,孙星明,刘玉玲,向凌云.一种改进的基于同义词替换的中文文本信息隐藏方法[J].东南大学学报(自然科学版),2007,37(A01):137-140. 被引量:18
  • 9叶云霞,周安民,余玉华.一种基于汉字结构的文本信息隐藏方法[J].四川大学学报(自然科学版),2009,46(3):663-666. 被引量:1
  • 10李凌云.网络聊天用语的语言特征[J].社科纵横(新理论版),2008(2):181-182. 被引量:3

二级参考文献32

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部