期刊文献+

基于React Native图像隐写的研究和实现 被引量:1

Research and Implementation of React Native Image Steganography
下载PDF
导出
摘要 针对移动办公中图像信息传输的安全问题,阐述了React Native应用框架的基本概念以及交互原理,介绍了移动办公软件的图像隐写结构设计,并分析了终端隐写实验结果,以及多终端适配实验以及性能优化,实验结果表明:该终端应用软件提高了机密信息的嵌入容量,保证了机密信息传输的安全,且适配多型号的手机应用。 For image information transmission in mobile office, security issues, this paper expounds the basic concepts of the React Native application framework and the principle of interaction, this paper introduces the structure of image steganalysis mobile office software design, and analyzes the steganographic results, terminal and terminal adapter experiment and the performance optimization, the experimental results show that the terminal application software improves the secret information embedding capacity, ensure the security of confidential information transmission, and fit more types of mobile applications.
作者 郝骏 郑紫微 段欢 HAO Jun;ZHENG Zi-wei;DUAN Huan(Institute of Communication Technology, Ningbo University, Ningbo 315211 , China)
出处 《无线通信技术》 2019年第1期36-41,共6页 Wireless Communication Technology
基金 宁波市自然科学基金(2015A610140) 浙江省信息与通信工程重中之重学科开放基金项目(xkxl1524)
关键词 移动办公 React NATIVE 图像隐写 嵌入容量 信息安全 mobile office React Native image steganography embedding capacity information security
  • 相关文献

参考文献2

二级参考文献25

  • 1周继军,杨义先.图像LSB隐藏游程检测算法[J].西安邮电学院学报,2005,10(1):1-5. 被引量:1
  • 2罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(3):463-473. 被引量:22
  • 3刘春庆,梁光岚,王朔中,张新鹏.应用二值图像信息隐藏技术实现彩色图像中的安全隐写[J].应用科学学报,2007,25(4):342-347. 被引量:5
  • 4Jessica Fridrich, Miroslav Goljan, and Rui Du, Detecting LSB Steganography in Color and Gray- Scale Images, Magazine of IEEE Multimedia, Special Issue on Multimedia and Security, 2001: 22-28.
  • 5Westfeld, A.and Pfitzmann, A.: Attacks on Steganographic Syslems.In:Pfitzmann A.(eds.)3rd International Workshop.Lecture Notes in Computer Science, Vol. 1768.
  • 6Westfeld, A.: High Capacity Despite Better Steganalysis (F5: Steganographic Algorithm) . In.. Moskowitz, I.S. (eds.)Information Hiding.4th International Workshop.Lecture Notes in Computer Science, Vol.2137.Springer-Verlag, Berlin Heidelberg New York, 2001: 289-302.
  • 7Fridrich, J.,Goljan, M.,and D.Hogea.Steganalysis of JPEG Images.. Breaking the F5 Algorithm.5th Information Hiding Workshop, Noordwijkerhout, Netherlands, 2002.. 7-9.
  • 8N.Provos, Defending against statistical steganalysis, in,Proceedings of the 10th USENIX Security Symposium, 2001: 323-336.
  • 9Fridrich J.,Goljan M.,and Hogea D., "Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002, ACM Press, 2002.
  • 10Fridrich J.,Goljan M.,and Hogea D., "Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002, ACM Press, 2002. B.Chen and G.Wornell.Quantization index modulation:A class of provably good methods for digital watermarking and information embedding[J]. IEEE Trans.Information Theory, 2001,47(4).

共引文献8

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部