期刊文献+

基于信息隐藏技术的网页认证协议与算法研究 被引量:1

Research of Web Pages Authentication Protocols and An Algorithm Based on Information Hiding Technique
下载PDF
导出
摘要 为了解决网页可能被篡改的问题,提出了两个基于信息隐藏的网页认证协议,分析并比较了两个协议的特点。然后提出了一种利用GIF图像的调色板来隐藏网页的数字签名的方法,实现了极佳的透明性和较大的嵌入容量。理论分析和实验结果表明,提出的协议和算法可用于保护现有的网站和网页系统。 In order to protect the integrity of web page content, two authentication protocols are proposed based on information hiding technique. The properties of two protocols are analyzed and compared. A method is also proposed to hide a web page's digital signature into the GIF image's palette. The method achieves perfect transparency and high embedding capacity. Theo-retical analysis and experiments demonstrate that the proposed protocols and the algorithm can protect the current websites and web pages for practical purpose.
作者 周庆 黄羽
出处 《电子信息对抗技术》 2015年第1期64-69,76,共7页 Electronic Information Warfare Technology
基金 国家自然科学基金项目(61003246)
关键词 网页篡改 网页识别 数字印章 信息嵌入 GIF web page tampering web page recognizing GIF electronic seal information em-bedding
  • 相关文献

参考文献12

  • 1中国互联网络信息中心(CNNIC)[R].第31次中国互联网络发展状况统计报告.北京:中国互联网络信息中心(CNNIC),2013.
  • 2蔡宗吟,梁荣,周庆.在数字印章中嵌入信息的方法及其实现[J].计算机工程与应用,2012,48(12):78-82. 被引量:1
  • 3DIFFIE W, IIELLMAN M. New Directions in Cryp- tography [ J ]. IEEE Trans on Information Theory, 1976, 22(6) : 644-654.
  • 4PARNAS D L. On the Criteria to Be Used In Decom- posing Systems Into Modules [J].Communications of the ACM, 1972, 15(12): 1053-1058.
  • 5TSENG Y C, PAN H K. Data Hiding in 2-color Ima- ges[J]. IEEE Trans on Computers, 2002, 51 (7): 873 -878.
  • 6WU MIN, LIU BEDE. Data Hiding in Binary Image for Authentication and Annotation [ J ]. IEEE Trans onMultimedia, 2004, 6(4): 528-538.
  • 7YANG HUIJUAN, KOT A C. Pattern-Based Data Hiding for Binary Image Authentieation by Connectivity -Preserving[J]. IEEE Trans on Multimedia, 2007, 9 ( 3 ) : 475-486.
  • 8DINESH P MEHTA, SARTAJ SAHNI. Handbook of Data Structures and Applieations [ M ]. Boca Raton, FL: CRC Press, 2004.
  • 9SIMMONS G J. Symmetric and Asymmetric Encryption [J]. ACM Computing Surveys (CSUR), 1979, 11 (4) : 305-330.
  • 10丁玮,孔祥维,尤新刚,胡岚.GIF图像掩密算法的统计安全性比较[J].中山大学学报(自然科学版),2004,43(A02):152-155. 被引量:1

二级参考文献21

  • 1Zeng Wenjun, Lei Shaw-Min. Efficient Frequency Domain Selective Scrambling of Digital Video[J]. IEEE Transactions on Multimedia, 2003, 5(1): 118-129.
  • 2Durstenfeld R. Algorithm 235: Random Permutation[J]. Communications of the ACM, 1964, 7(7): 420.
  • 3Yang Huijuan,Kot A C.Pattern-based data hiding for bi-nary image authentication by connectivity-preserving[].IEEE Transactions on Multimedia.2007
  • 4Bresenham J E.A linear algorithm for incremental digital display of circular arcs[].Communications of the ACM.1977
  • 5Frank Hartung,Martin Kutter.Multimedia watermarking techniques[].Proceedings of Tricomm.1999
  • 6Cox IJ,Kilian J,Leighton FT,et al.Secure spread spectrum watermarking for multimedia[].IEEE Transactions on Image Processing.1997
  • 7Min Wu,Bede Liu.Data hiding in binary image for authentication and annotation[].IEEE Transactions on Multimedia.2004
  • 8FRIDRICHJ.Anewsteganographicmethodforpalette_basedimages[].IS&TPICS.1999
  • 9KWANM.Invariantwatermarkingusingfeaturepoints[].IEEETrans.2003
  • 10www.jjct.com steganography toolmatrix.htm .

共引文献2

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部