Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2645-2649.DOI: 10.11772/j.issn.1001-9081.2014.09.2645
Previous Articles Next Articles
GUO Wei1,LIU Huiping2
Received:
2014-03-05
Revised:
2014-05-03
Online:
2014-09-30
Published:
2014-09-01
Contact:
GUO Wei
国伟1,刘会平2
通讯作者:
国伟
作者简介:
基金资助:
质检公益性行业科研专项
CLC Number:
GUO Wei LIU Huiping. Information hiding technology based on digital screening and its application in covert secrecy communication[J]. Journal of Computer Applications, 2014, 34(9): 2645-2649.
国伟 刘会平. 数字加网信息隐藏技术在隐秘保密通信中的应用[J]. 计算机应用, 2014, 34(9): 2645-2649.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2645
[1]LI J, XU J, LOU Q. The research of real protection management system for the wide-band net information security [J]. Microcomputer Information, 2004, 20(2): 97-98. (李锦伟,徐进,楼巧萍.宽带网络信息安全实时保护管理系统的研究[J]. 微计算机信息,2004,20(2):97-98.)
[2]LIN Y. Design of peer-to-peer communication network security model based on IP technology [J]. Microcomputer Information, 2005, 21(10X): 1-2. (林永和.基于IP技术的端对端通信网络安全模型分析设计[J]. 微计算机信息,2005,21(10X): 1-2.)
[3]WANG Y. Internet communication security based on IPSec protocol [J]. Microcomputer Information, 2003, 19(12): 123-128. (王艳芳.基于IPSec安全协议的Internet通信安全[J].微计算机信息,2003,19(12):100-102.)
[4]CHEN J. Theory and method for research on covert secrecy communication based on steganography [D]. Zhengzhou: Information Engineering University, 2012. (陈嘉勇.基于隐写术的隐蔽保密通信理论与方法研究[D].郑州:信息工程大学,2012.)
[5]CHEN J, ZHANG W, HAN T, et al.An efficient adaptive image steganographic method for ±k embedding [J]. Acta Automatica Sinica, 2013, 39(10): 1594-1601. (陈嘉勇, 张卫明, 韩涛, 等. 高效±k自适应图像隐写术[J]. 自动化学报, 2013,39(10):1594-1601.)
[6]ZHANG H, PING X. Spatial steganography detection using merged DCT features [J]. Journal of Information Engineering University, 2012, 13(6): 646-649. (张昊,平西建.使用混合DCT特征检测空域隐写术[J].信息工程大学学报,2012,13(6):646-649.)
[7]〖CM(27〗BENDER W, GRUHL D, MORIMOTO N, et al.Techniques for data hiding [J]. IBM System Journal, 1996, 35(3/4): 313-336.
[8]WU D-C, TSAI W-H. A steganographic method for images by pixel-value differencing [J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626.
[9]LIU J, HAN T, ZHANG W, et al.A histogram-preserving steganography based on wet paper coding and graphic matching theory [J]. Journal of Electronics & Information Technology, 2011, 33(3): 592-596. (刘九芬,韩涛,张卫明,等.一种基于湿纸编码和图匹配理论的直方图保持隐写算法[J].电子与信息学报,2011,33(3):592-596.)
[10]CHEN J, LIU J, ZHU Y, et al.Cryptographic secrecy of steganographic matrix encoding [J]. Journal on Communications, 2012, 33(6): 174-179. (陈嘉勇,刘九芬,祝跃飞,等.隐写术中矩阵编码的保密安全性[J].通信学报,2012,33(6):174-179.)
[11]CHEN J, WANG C, ZHANG W, et al.A secure image steganographic method in encrypted domain [J]. Journal of Electronics & Information Technology, 2012, 34(7): 1721-1726. (陈嘉勇,王超,张卫明,等.安全的密文域图像隐写术[J].电子与信息学报,2012,34(7):1721-1726.)
[12]TAN Y. Comparative study of information hiding method based on text typesetting format [J]. Computer and Modernization, 2013(6): 52-56. (谭瑛.基于文本排版格式的信息隐藏方法比较研究[J].计算机与现代化,2013(6):52-56.)
[13]〖CM(26*2〗HUANG S. Research on information hiding based on PDF file [D]. Changsha: Hunan University, 2011. (黄思敏.基于PDF文件的信息隐藏技术研究[D].长沙:湖南大学,2011.)
[14]〖CM(26*2〗LIU Y, SUN X, LUO G. A novel information hiding algorithm based on structure of PDF document [J]. Computer Engineering, 2006, 32(17): 230-232. (刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法[J].计算机工程,2006,32(17):230-232.)
〖HJ1.45mm〗[15]TAN G. Digital watermarking algorithm for PDF document [J]. Computer Engineering and Applications, 2012, 48(32): 85-88. (谭国律.PDF文档中的一种数字水印算法[J].计算机工程与应用,2012,48(32):85-88.)
[16]ZHAO L, GU Z, FANG Z, et al.An anti-fake method based on visual characteristic and morphology screen coding [J]. Journal of Optoelectronics · laser, 2008, 19(11): 1526-1529. (赵立龙,顾泽仓,方志良,等.一种基于视觉特性及形态网屏编码的纸介质信息防伪方法[J].光电子·激光,2008,19(11):1526-1529.)
[17]GUO W, LIU Y, YANG B, et al.Research on information hiding technology in paper based document [J]. China Printing and Packaging Study, 2013(2): 30-34. (国伟,刘宇鑫,杨斌,等.印刷纸介质文档中的信息隐藏技术研究[J].中国印刷与包装研究, 2013(2):30-34.)
[18]SU Y. The random problem on the FM screening [J]. Journal of Institute of Surveying and Mapping, 2001, 18(3): 226-228. (苏永宪.调频加网中的随机问题[J].测绘学院学报,2001,18(3):226-228.)
[19]ZHOU X, SHI R, AN J, et al.Study of FM screening efficiency based on multiplicative congruence pseudo-random algorithm [J]. China Printing and Packaging Study, 2011(3): 15-20. (周啸,史瑞芝,安敬,等.基于乘同余伪随机算法的调频加网效率研究[J]. 中国印刷与包装研究,2011(3):15-20.) |
[1] |
SHE Wei, MA Tianxiang, FENG Haige, TIAN Zhao, LIU Wei.
Blockchain covert communication method based on contract call concealment#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[2] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[3] | Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE. Differential and linear characteristic analysis of full-round Shadow algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3839-3843. |
[4] | Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN. Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3717-3722. |
[5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[7] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[8] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
[9] |
DENG Yilin, YU Fajiang.
Pseudo-random number generator based on LSTM and separable self-attention mechanism#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[10] | . Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection [J]. Journal of Computer Applications, 0, (): 0-0. |
[11] | . Dynamic searchable encryption scheme based on puncture pseudorandom function [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | . fedPF: Federated learning for personalization and fairness [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Review of research on conflict-based cache side-channel attacks and eviction sets [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | . Secure and efficient frequency estimation method based on shuffled differential privacy [J]. Journal of Computer Applications, 0, (): 0-0. |
[15] | . Blockchain-based model for notarization of simulation testing data in autonomous driving [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||