期刊文献+
共找到1,938篇文章
< 1 2 97 >
每页显示 20 50 100
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
1
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images 被引量:4
2
作者 Yanping Zhang Juan Jiang +2 位作者 Yongliang Zha Heng Zhang Shu Zhao 《International Journal of Intelligence Science》 2013年第2期77-85,共9页
Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called em... Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance. 展开更多
关键词 information hiding EMBEDDING Capacity EMBEDDING EFFICIENCY Security Peak-Signal-to-Noise-Rate(PSNR)
下载PDF
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:4
3
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 Coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
4
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
5
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree ... Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree structure vector quantization (CPTSVQ). The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 Digital image information hiding tree structure vector quantization vector quantization.
下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:1
6
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
下载PDF
A Survey of Image Information Hiding Algorithms Based on Deep Learning
7
作者 Ruohan Meng Qi Cui Chengsheng Yuan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2018年第12期425-454,共30页
With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hi... With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algorithms has been developed.Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.Ensuring that the stego image cannot be distinguished from the cover image,and sending secret information to receiver through the transmission of the stego image.At present,the model based on deep learning is also widely applied to the field of information hiding.This paper makes an overall conclusion on image information hiding based on deep learning.It is divided into four parts of steganography algorithms,watermarking embedding algorithms,coverless information hiding algorithms and steganalysis algorithms based on deep learning.From these four aspects,the state-of-the-art information hiding technologies based on deep learning are illustrated and analyzed. 展开更多
关键词 STEGANOGRAPHY DEEP learning STEGANALYSIS WATERMARKING coverless information hiding.
下载PDF
On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography
8
作者 Sahib Khan M A Irfan +4 位作者 Arslan Arif Syed Tahir Hussain Rizvi Asma Gul Muhammad Naeem Nasir Ahmad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第3期529-546,共18页
This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding... This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information,while the low and high frequency coefficients are kept unaltered.The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image,while no changes in the high DCT coefficient preserve the quality of the edges.As the medium frequency components have less contribution towards energy and image details,so the modification of these coefficients for data hiding results in high quality stego images.The distortion due to the changes in the medium frequency coefficients is insignificant to be detected by the human visual system.The proposed methods demonstrated a hiding capacity of 43:11%with the stego image quality of a peak signal to the noise ration of 36:3 dB,which is significantly higher than the threshold of 30 dB for a stego image quality.The proposed technique is immune to steganalysis and has proved to be highly secured against both spatial and DCT domain steganalysis techniques. 展开更多
关键词 DCT STEGANOGRAPHY image PROCESSING information SECURITY data hiding steganalyisis
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
9
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic Protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information hiding Key Exchange MODULAR ELLIPTIC Curve Secure Communication
下载PDF
AN OPTIMAL INFORMATION HIDING ALGORITHM FOR SPEECH IN THE FRACTIONAL FOURIER TRANSFORM DOMAIN
10
作者 Xi Ji Zou Cairong +1 位作者 Bao Yongqiang Wang Qingyun 《Journal of Electronics(China)》 2010年第4期564-570,共7页
With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is ... With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is developing rapidly. In order to stand against the stegano-analysis, the paper proposed an optimal information hiding algorithm for speech in the Fractional Fourier Transform (FrFT) domain based on the Minimum Mean Square Error (MMSE) criterion. The results of simulation and experiments show that speech modified by the proposed algorithm has no remarkable changes both in time and frequency domains, which can effectively resist the time and frequency analysis, Otherwise, the algorithm is robust to general signal process attack, and the difference is imperceptible between the original and modified speech. 展开更多
关键词 Fractional Fourier Transform (FrFT) Speech information hiding Minimum Mean Square Error (MMSE)
下载PDF
The Research on Audio Information Hiding Technology
11
作者 Yuan Kaiguo Yang Yu Yang Yixian (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2007年第4期6-9,共4页
Audio information hiding technology is an important branch of stenography. This article introduces the basic concepts, principles, characteristics and the typical models of the audio information hiding. It then classi... Audio information hiding technology is an important branch of stenography. This article introduces the basic concepts, principles, characteristics and the typical models of the audio information hiding. It then classifies the audio information hiding methods, according to the domain used by them including time, frequency, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and the compressed., and discusses several mainstream algorithms in various domains. It finally points out that the audio information hiding technology cannot solve the problem of re-record attacks, but it also brings forward the possible solutions to this problem. 展开更多
关键词 The Research on Audio information hiding Technology LSB DCT IEEE
下载PDF
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding
12
作者 Qiudong SUN Wenxin MA +1 位作者 Wenying YAN Hong DAI 《Journal of Software Engineering and Applications》 2009年第5期383-387,共5页
For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were s... For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based JNDs (just noticeable difference) were calculated with a visual model. According to the different codes of each two watermark bits, the average values of two corresponding detail sub-bands were modified by using one of JNDs to hide information into carrier image. The experimental results show that the hidden information is invisible to human eyes, and the algorithm is robust to some common image processing operations. The conclusion is that the algorithm is effective and practical. 展开更多
关键词 Sub-Band Feature ENCODING REDUNDANT ENCODING Visual Model DISCRETE WAVELET Transformation information hiding
下载PDF
A Distributed Secret Sharing Method with QR Code Based on Information Hiding
13
作者 Pengcheng Jiang Yu Xue 《Journal of Cyber Security》 2021年第4期217-225,共9页
QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ... QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof. 展开更多
关键词 QR code image encryption information hiding secret sharing
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
14
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 信息隐藏 矢量地图 指纹认证 指纹图像 文件描述 编程算法 向量图 匹配率
下载PDF
An IP-SAN System Based on Information Hiding Technology
15
作者 ZHENG Wei, ZHANG Yang, SHEN Ge, JIANG Weihua (Department of Computer Science & Engineering, Northwestern Polytechnical University,Xi′an, 710072, China) 《现代电子技术》 2003年第11期83-86,共4页
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, online data is increasing rapidly, hence the need for high performance SAN (Storage Area Network)... With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, online data is increasing rapidly, hence the need for high performance SAN (Storage Area Network) becomes more and more urgent. Currently, IPSAN, which is based on iSCSI technology, is used widely. Meanwhile, it also faces some challenges. In this paper, we point out the security problem in SAN system, and present a new secure storage model, which is based on traditional IPSAN system and takes full advantage of information hiding technology, to improve the safety of the storage system. 展开更多
关键词 IP-SAN 信息隐藏 启动程序 存储网络
下载PDF
STUDY ON AUDIO INFORMATION HIDING METHOD BASED ON MODIFIED PHASE PARTITION
16
作者 TongMing HaoChongyang +1 位作者 LiuXiaojun ChenYanpu 《Journal of Electronics(China)》 2005年第3期307-311,共5页
Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose th... Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference. 展开更多
关键词 声频信号 信息隐藏 听知觉 相位编码
下载PDF
The Information Hiding Technology Based on the Similar Sample Blocks
17
作者 Tzu-Chuen Lu Siang-Ru Liao Chun-Ming Chang 《通讯和计算机(中英文版)》 2012年第4期434-443,共10页
关键词 信息隐藏技术 样本块 类似 标准图像 个人形象 秘密信息 隐藏方法 灰度图像
下载PDF
A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING
18
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第2期304-309,共6页
The proposed secure communication approach adopts the proposed algorithm of Analysis-By-Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication ... The proposed secure communication approach adopts the proposed algorithm of Analysis-By-Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information. This approach is more reliable, covert and securable than traditional and chaotic secure communication. 展开更多
关键词 信息安全 语音信息 信息隐藏 语音信道 信息网络
下载PDF
Destructive Method with High Quality and Speed to Counter Information Hiding
19
作者 Feng Liu Xuehu Yan Yuliang Lu 《国际计算机前沿大会会议论文集》 2019年第1期320-322,共3页
Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have... Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, and have good detection for some specific information hiding algorithms. However, huge time consumption is needed and only suitable for offline usage with this method. In this paper, a destructive method with high quality and speed is proposed to counter information hiding. The experimental result presents that the extracting error rate of hiding information is around 50%, which means the method can destroy the possible covert communication completely. At the same time, the quality of covers after the destructive operation is good and the average time of operating an image is millisecond. 展开更多
关键词 information hiding STEGANALYSIS HIGH QUALITY and SPEED Destructive
下载PDF
An Approach to Hide Secret Speech Information
20
作者 吴志军 段海新 李星 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期134-139,共6页
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information ... This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4 Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers’ recognition. 展开更多
关键词 隐藏方法 信息 分析 合成 预报
下载PDF
上一页 1 2 97 下一页 到第
使用帮助 返回顶部