期刊文献+

基于小波变换技术的煤矿重要信息的网络安全传输与保存技术

Research on Security Transmission and Preservation of Important Information in Coal Mine on Network Based on Wavelet Transformation
下载PDF
导出
摘要 为了在网络上安全传输与保存煤矿重要信息,给出了一种把信息隐藏在风景图像中,从而迷惑攻击者的方法。利用小波变换技术把重要信息隐藏在图像中,不改变图像的视觉效果和质量,然后在网络上传输隐藏了信息的图像,并把图像保存在服务器的数据库中。当我们要使用重要信息时,再从这幅图像中提取出来。仿真实验说明该方法是有效的,能在网络上安全传输保存煤矿的重要信息。本文还发现把信息嵌入到载体图像的小波变换后的中频分量中是最佳方案。 In order to transmit the important information of coal mine safely on the network and save it safely,a method of hiding the information in a landscape image to confuse the attacker is developed in the paper.The important information of coal mine is hidden in a landscape image by using wavelet transformation.The hiding does not change the visual effect and quality of the image.The image is then transmitted over the network and is saved in the server database.When we want to use the important information of the coal mine,the hidden important information of coal mine is then extracted from this image.The simulation experiment proves that the method given in this paper is effective and with the help of method,the important information of coal mine can be safely transmitted on the network and can be safely saved in the server database.It is also found that the best scheme is to embed the information into the medium frequency component of the carrier image decomposed by wavelet transformation.
作者 阿淑芳 李敏 姚宇 余生晨 E Shufang;LI Ming;YAO Yu;YU Shengchen(XingTai College of Hebei,XingTai,054000,China;Yuwu Coal Industry Co.Ltd,Shanxi Lu’an Environmental Energy Development Co.Ltd,Changzhi,221000,China;School of Computing,North China Institute of Science and Technology,Yanjiao,065201,China)
出处 《华北科技学院学报》 2019年第6期70-74,79,共6页 Journal of North China Institute of Science and Technology
基金 中央高校基本科研业务费资助(JSJ1207B,3142013093)。
关键词 煤矿重要信息 安全传输与保存 小波变换 图像隐藏 伪装信息 The important information of coal mine Security transmission and preservation Wavelet transformation Image hiding Camouflage information
  • 相关文献

参考文献5

二级参考文献32

  • 1陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 2(美)PeteLdshin著.IPv6详解[M].北京:机械工业出版社,2000.4.69-79.
  • 3(美)ChristianHuitema著 陶文星 胡文才译.新因特网协议IPv6(第二版)[M].清华大学出版社,1999.4.98-116.
  • 4[1]R J Aderson,R M Needham,A Shamir. The steganographic file system[C].Proc of Information Hiding98,1998:73-82
  • 5[2]Johnson N F,Jajodia S.Exploring steganography:seeing the unseen[J].Computer, 1998; (2): 26-34
  • 6[3]Smith J R,Comiskey B O.Modulation and information hiding in images[C].Proceedings of the First Information Hiding Workshop, Cambridge, U.K., 1996.5
  • 7[1]J Cox,J Kilian,T Leighton et al. Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997;6(12)
  • 8[2]JPEG2000 final committee draft[S].version 1.0,ISO/IEC FCD15444-1,2000
  • 9[3]Shapiro J M.Embedded image coding using zerotree of wavelet coefficients[J].IEEE Trans on Signal Processing, 1993 ;41 (12) :3445~3462
  • 10[4]A Said,W A Pearlman.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Trans on Circutes and System for Video Technology, 1996;6(3) :243~250

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部