首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
阐述了信息隐藏技术的基本原理、信息隐藏系统的一般模型和设计要求,分析了信息隐藏技术的两个主要分支——隐写术和数字水印对性能指标的不同要求,探讨了以数字图像作为载体的隐藏算法的实现方法,以及信息隐藏技术在通信保密和版权保护等方面的应用。  相似文献   

2.
提出了一种基于GSM基站技术对移动终端完备身份信息的识别方案。利用GSM网络的单向认证特性以及位置更新原理,设计了一种多次对终端不同类型身份请求的机制。模拟基站利用空中接口实现与移动终端交互信令,完成对包括TMSI、IMSI、IMEI及IMEISV在内完备身份信息的识别。该方案在网络原有VLR发生数据丢失,TMSI不可用时,能有效对终端的其他身份信息进行获取识别。测试表明,系统可以有效地对基站管控范围内终端的各类身份信息进行准确地识别与管理。  相似文献   

3.
身份认证解锁移动终端作为解锁移动终端的主要技术手段,其技术的发展直接影响到移动终端的安全性。本文着重介绍了身份认证解锁技术的发展历程,并对该技术的专利申请情况进行了简要分析。  相似文献   

4.
在充分利用并融合多种安全技术的基础上,提出并实现了一种针对整合分布的Web资源以构建资源信息平台的身份认证方案.采用本方案建立起来的统一身份认证系统为国家科技基础条件平台的建设提供了安全认证框架.  相似文献   

5.
基于隐写术的信息隐藏技术   总被引:1,自引:0,他引:1  
李友  张定会 《信息技术》2010,(7):119-122
随着信息技术的高速发展,信息安全变得越来越重要,伴随着逐渐发展起来的信息隐藏技术,成为近年来信息安全领域的研究热点。介绍了信息隐藏技术的概念和发展,分析了信息隐藏技术的几个分支之间的区别与联系,并着重论述了隐写术的发展、一般模型、基本原理及其基本算法。最后指出了隐写术的发展趋势。  相似文献   

6.
在社会信息化的进程中,信息已经成为社会发展的重要资源。随着互联网的快速发展,越来越多的信息通过网络进行传播,信息的保密性、真实性、完整性逐渐成为研究焦点。介绍了图像中信息隐藏技术的概念、分类和发展,对矢量量化信息隐藏技术进行了重点分析,指出了信息隐藏技术的发展趋势。  相似文献   

7.
一种基于块相似性隐藏信息的新方法   总被引:1,自引:0,他引:1  
提出了一种基于块相似性在图像中隐藏图像的新方法。对于每个水印图像块,总是先在主图像中查找匹配块,然后将水印图像块插入到主图像中相应空间位置上。在提取水印图像时,假定在知道映射位置的情况下,不需要原始水印图像能够提取出水印图像。该仿真技术对低通滤波和JPEG压缩都有较好的鲁棒性。  相似文献   

8.
本文描述了信息隐藏技术中的基本概念,对信息隐藏技术的原理、模式以及信息隐藏系统的特性进行分析,讨论了现在信息隐藏技术的主要的分支领域,信息隐藏的应用软件,信息隐藏技术存在的问题以及对信息隐藏技术未来发展方向的展望。  相似文献   

9.
随着移动终端国际认证标准的日新月异,为了使移动终端制造商和相关认证检测实验室更加明确主流的国际认证标准和流程。本文结合具体实际情况,以手机为例,详细的介绍了移动终端国际认证的具体要求。  相似文献   

10.
随着移动终端国际认证标准的日新月异,为了使移动终端制造商和相关认证检测实验室更加明确主流的国际认证标准和流程。本文结合具体实际情况,以手机为例,详细的介绍了移动终端国际认证的具体要求。  相似文献   

11.
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestation of trusted computing and uses the encrypting transfer and signature validation for its implementation. Aiming at two access mode of trusted mobile terminal under mobile Internet, self access and cross-domain access, the authentication process of each mode is described in details. The analysis shows that the scheme implements anonymous authentication on mobile Internet and is correct, controllable and unforgeable.  相似文献   

12.
《现代电子技术》2015,(22):51-54
提出一种基于移动设备的USB Key身份认证方案,主要用于解决在移动设备端传统身份认证技术中存在的安全问题。在移动设备端使用USB Key身份认证技术可以很好地提高移动设备对用户身份认证的安全性。主要从两方面进行论述:移动设备端是如何获取USB Key中的数字证书并进行身份认证,从而保证移动设备环境下的安全;移动设备端的用户是如何进行身份认证,从而保证应用服务的安全性。通过安全性分析和实验可得出,这种身份认证技术可有效地抵御移动设备端账户和服务攻击。  相似文献   

13.
针对隐写技术主要存在对失真的感知度较大及处理的图像普遍压缩程度过大的问题,研发了一种新的隐写术,该技术以KLT为前提,引入一种迭代聚类的算法得到所需解,对数据进行分析,利用KLT对需要进行隐藏的图形进行处理,最终使用最低有效位对需要保密的信息进行隐藏处理。需要获取信息时,可以根据原始像素矩阵利用反向线性变换运算的办法获取源图像。实践证明,这种方法无论是从容量方面,还是信噪方面都要优于常用算法,并且获取的图像失真较小。  相似文献   

14.
主要研究利用图像低位平面数据位的运算来减小对载密图像修改的信息隐藏算法.在嵌入信息时对秘密信息进行连续多次随机变换的同时与载体信息进行位运算,以此求出对载体图像修改量最小的嵌入方式.从而实现在相同嵌入量的条件下尽量减少对载体图像的修改,提高了载密图像的质量.实验结果表明,该算法能有效地减少载体图像的失真,在嵌入大量信息...  相似文献   

15.
The growth of image processing tools and applications has made it easy for multi-media content such as music, audio, and video to be manipulated or forged during transmission over the Internet. Efforts, such as information hiding in steganography, have been unable to secure data transmission and prevent its manipulation. Usage of coding theory, including cryptography, is not full proof in the sense that an unauthorized intruder may inject (tampering) and incorporate unintended data to the messages, which can tamper the transmitted data. There is a need for more transparent message information hiding schemes along with information content verification and authentication, as well as accurate tampering detection. In particular, as it is well known, in many current steganography methods, widely used for image information hiding, there are various technical challenges associated with hiding large amounts of image information in images. Some of these challenges relate to which locations, in a given carrier image, information has to be hidden in order to guarantee transparency of the resulting watermarked images, to the ability to extract hidden information accurately, to the performance of hidden secret information authentication and verification at the receiving end, to the dependency of the hidden information on a given carrier image, to the robustness of information hiding schemes to affine transformations such as rotation, and to the amount of data and number of full-scale images one can embed in a given single image carrier. Additionally, as it is well known, many of the existing stenography methods are based on the Discrete Fourier Transform (DFT), the Discrete Cosine Directors (DCT), or the Discrete Wavelength Transform (DWT) methods, which result in high Bit Error Rate (BER) of the extracted data. In this paper we present a secure high capacity image information hiding scheme where two full separate arbitrary full-scale gray level images (versus binary), one hidden information image and one authentication watermark image are hidden/embedded in the Tchebichef moments of a carrier image with very high imperceptibility. Here the second watermark image is used for identification and content integrity verification and authentication of the hidden secret image. Both the hidden secret hidden image and the authentication watermark image are of the same size as that of a given arbitrary carrier image. In particular, with the cost of computer memory getting lower and the bandwidth of transmission channels getting larger, we show how three different watermarked images, but the same to a naked eye, are produced and transmitted to achieve the desired advantages of high accuracy, security, authentication and verification of the recovered information. To the best of our knowledge, this two-full-scale gray images data hiding and hidden secret image information verification and authentication method is the first attempt of its sort. We show here the robustness of the proposed scheme to affine transformations such as rotation, scaling, and translation, the proposed scheme's high image malicious tampering detection and tampering localization and its high quality extracted recovered and authenticated hidden secret images. Additionally, in order to as much as possible keep the integrity of the received information, when watermarked images are rotated during transmission, a new image rotation estimation and recovery algorithm is presented as part of the proposed information hiding scheme. We show the effect of intended tampering attacks namely, cropping, noise, low-pass and high-pass filtering on the presented scheme. We also show how the extracted information accuracy is generally independent of the carrier image, and we present a mathematical analysis for characterizing the conditions under which transparency of the hidden embedded information is generally achieved for any given arbitrary carrier image. The case of how to extract the hidden information when one or two of the watermarked images is (are) lost is also tackled. Finally, experimental results on real images are presented to illustrate the efficiency and capabilities of the proposed method.  相似文献   

16.
High Efficiency Video Coding (HEVC) is well-known as an internationally popular video coding standard, and HEVC-based steganography has received increasing attention. In this paper, a new adaptive HEVC video information hiding method based on Prediction Unit (PU) partition mode and double-layer embedding strategy is proposed. Double-layer embedding is a method to complete the first-layer embedding using the mapping rules of PU partition mode, and to perform the second-layer embedding after the first-layer embedding. The cost assignment function designed in this paper can accurately evaluate the second-layer data embedding distortion. The frame position, motion properties and block size of PU are taken into consideration for the second-layer data embedding, and the syndrome-trellis codes (STCs) are used to minimize the embedding distortion. Experimental results show that the proposed adaptive double-layer embedding algorithm has better embedding efficiency and less embedding distortion in most cases.  相似文献   

17.
18.
李维科  李方伟 《通信学报》2005,26(11):137-139
提出了一种改进的基于EIGamal签名的移动用户认证方案。与原方案相比,新方案使得网络中心的安全性进一步提高,同时通过对认证过程的改进,使得用户的计算量得以降低。分析结果表明,该改进方案不仅具有更低的计算复杂度,而且具有更高的安全性,符合移动通信系统要求。  相似文献   

19.
提出了一种改进的基于ElGamal签名的移动用户认证方案。与原方案相比,新方案使得网络中心的安全性进一步提高,同时通过对认证过程的改进,使得用户的计算量得以降低。分析结果表明,该改进方案不仅具有更低的计算复杂度,而且具有更高的安全性,符合移动通信系统要求。  相似文献   

20.
近场无线通信(NFC)是一种已经被广泛应用的短距无线通信技术.其中最常见的是将NFC技术应用于移动支付和门禁访问控制等应用.从技术上讲,这些应用利用NFC模拟卡模式将NFC设备模拟成银行卡或门禁卡,然后等待外部阅读器验证.在这类应用场景下,选取合适的安全认证方案是非常重要的.首先,介绍了现有的NFC认证系统和安全方案并分析了系统安全需求和潜在的安全风险.然后,采用Hash、AES和口令Key动态更新机制,提出了一种适用于NFC移动设备的双向认证安全方案,并设计了自同步机制.最后,利用GNY逻辑以形式化证明的形式证明了方案的安全性,分析表明该方案能解决伪造、重放攻击、窃听、篡改、异步攻击等安全问题.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号