Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2645-2649.DOI: 10.11772/j.issn.1001-9081.2014.09.2645
Previous Articles Next Articles
GUO Wei1,LIU Huiping2
Received:
2014-03-05
Revised:
2014-05-03
Online:
2014-09-01
Published:
2014-09-30
Contact:
GUO Wei
通讯作者:
国伟
作者简介:
基金资助:
质检公益性行业科研专项
CLC Number:
GUO Wei LIU Huiping. Information hiding technology based on digital screening and its application in covert secrecy communication[J]. Journal of Computer Applications, 2014, 34(9): 2645-2649.
国伟 刘会平. 数字加网信息隐藏技术在隐秘保密通信中的应用[J]. 计算机应用, 2014, 34(9): 2645-2649.
[1]LI J, XU J, LOU Q. The research of real protection management system for the wide-band net information security [J]. Microcomputer Information, 2004, 20(2): 97-98. (李锦伟,徐进,楼巧萍.宽带网络信息安全实时保护管理系统的研究[J]. 微计算机信息,2004,20(2):97-98.)
[2]LIN Y. Design of peer-to-peer communication network security model based on IP technology [J]. Microcomputer Information, 2005, 21(10X): 1-2. (林永和.基于IP技术的端对端通信网络安全模型分析设计[J]. 微计算机信息,2005,21(10X): 1-2.)
[3]WANG Y. Internet communication security based on IPSec protocol [J]. Microcomputer Information, 2003, 19(12): 123-128. (王艳芳.基于IPSec安全协议的Internet通信安全[J].微计算机信息,2003,19(12):100-102.)
[4]CHEN J. Theory and method for research on covert secrecy communication based on steganography [D]. Zhengzhou: Information Engineering University, 2012. (陈嘉勇.基于隐写术的隐蔽保密通信理论与方法研究[D].郑州:信息工程大学,2012.)
[5]CHEN J, ZHANG W, HAN T, et al.An efficient adaptive image steganographic method for ±k embedding [J]. Acta Automatica Sinica, 2013, 39(10): 1594-1601. (陈嘉勇, 张卫明, 韩涛, 等. 高效±k自适应图像隐写术[J]. 自动化学报, 2013,39(10):1594-1601.)
[6]ZHANG H, PING X. Spatial steganography detection using merged DCT features [J]. Journal of Information Engineering University, 2012, 13(6): 646-649. (张昊,平西建.使用混合DCT特征检测空域隐写术[J].信息工程大学学报,2012,13(6):646-649.)
[7]〖CM(27〗BENDER W, GRUHL D, MORIMOTO N, et al.Techniques for data hiding [J]. IBM System Journal, 1996, 35(3/4): 313-336.
[8]WU D-C, TSAI W-H. A steganographic method for images by pixel-value differencing [J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
[9]LIU J, HAN T, ZHANG W, et al.A histogram-preserving steganography based on wet paper coding and graphic matching theory [J]. Journal of Electronics & Information Technology, 2011, 33(3): 592-596. (刘九芬,韩涛,张卫明,等.一种基于湿纸编码和图匹配理论的直方图保持隐写算法[J].电子与信息学报,2011,33(3):592-596.)
[10]CHEN J, LIU J, ZHU Y, et al.Cryptographic secrecy of steganographic matrix encoding [J]. Journal on Communications, 2012, 33(6): 174-179. (陈嘉勇,刘九芬,祝跃飞,等.隐写术中矩阵编码的保密安全性[J].通信学报,2012,33(6):174-179.)
[11]CHEN J, WANG C, ZHANG W, et al.A secure image steganographic method in encrypted domain [J]. Journal of Electronics & Information Technology, 2012, 34(7): 1721-1726. (陈嘉勇,王超,张卫明,等.安全的密文域图像隐写术[J].电子与信息学报,2012,34(7):1721-1726.)
[12]TAN Y. Comparative study of information hiding method based on text typesetting format [J]. Computer and Modernization, 2013(6): 52-56. (谭瑛.基于文本排版格式的信息隐藏方法比较研究[J].计算机与现代化,2013(6):52-56.)
[13]〖CM(26*2〗HUANG S. Research on information hiding based on PDF file [D]. Changsha: Hunan University, 2011. (黄思敏.基于PDF文件的信息隐藏技术研究[D].长沙:湖南大学,2011.)
[14]〖CM(26*2〗LIU Y, SUN X, LUO G. A novel information hiding algorithm based on structure of PDF document [J]. Computer Engineering, 2006, 32(17): 230-232. (刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法[J].计算机工程,2006,32(17):230-232.)
〖HJ1.45mm〗[15]TAN G. Digital watermarking algorithm for PDF document [J]. Computer Engineering and Applications, 2012, 48(32): 85-88. (谭国律.PDF文档中的一种数字水印算法[J].计算机工程与应用,2012,48(32):85-88.)
[16]ZHAO L, GU Z, FANG Z, et al.An anti-fake method based on visual characteristic and morphology screen coding [J]. Journal of Optoelectronics · laser, 2008, 19(11): 1526-1529. (赵立龙,顾泽仓,方志良,等.一种基于视觉特性及形态网屏编码的纸介质信息防伪方法[J].光电子·激光,2008,19(11):1526-1529.)
[17]GUO W, LIU Y, YANG B, et al.Research on information hiding technology in paper based document [J]. China Printing and Packaging Study, 2013(2): 30-34. (国伟,刘宇鑫,杨斌,等.印刷纸介质文档中的信息隐藏技术研究[J].中国印刷与包装研究, 2013(2):30-34.)
[18]SU Y. The random problem on the FM screening [J]. Journal of Institute of Surveying and Mapping, 2001, 18(3): 226-228. (苏永宪.调频加网中的随机问题[J].测绘学院学报,2001,18(3):226-228.)
[19]ZHOU X, SHI R, AN J, et al.Study of FM screening efficiency based on multiplicative congruence pseudo-random algorithm [J]. China Printing and Packaging Study, 2011(3): 15-20. (周啸,史瑞芝,安敬,等.基于乘同余伪随机算法的调频加网效率研究[J]. 中国印刷与包装研究,2011(3):15-20.) |
[1] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[3] | . Adaptively secure outsourced attribute-based encryption with keyword search [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[5] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[6] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[7] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[8] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[9] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[10] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
[11] | ZHANG Shipeng, LI Yongzhong, DU Xiangtong. Intrusion detection model based on semi-supervised learning and three-way decision [J]. Journal of Computer Applications, 2021, 41(9): 2602-2608. |
[12] | . Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Nonlinear scrambling diffusion synchronization image encryption based on dynamic network [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[15] | QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao. Blockchain storage expansion model based on Chinese remainder theorem [J]. Journal of Computer Applications, 2021, 41(7): 1977-1982. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||