首页 | 本学科首页   官方微博 | 高级检索  
     

信息隐藏技术浅析
引用本文:李永义,冯硕. 信息隐藏技术浅析[J]. 信息与电脑, 2010, 0(2)
作者姓名:李永义  冯硕
作者单位:唐山广播电视大学网络中心;
摘    要:从信息隐藏技术理论提出后,相关技术得到了很快的发展。ICMP隧道、HTTP隧道、TCP/IP头部携带数据等技术,是黑客常用的入侵手段,而位图填充等技术则广泛应用于数据保密领域。信息隐藏技术发展较晚,技术较复杂,随着应用的深入,必将得到长足发展。

关 键 词:隧道  rootkit  填充  

simple analysis on the Technique of Data Ensconcing technique
Li yongyi , Feng shuo Tangshan Radio , TV University,Network Center. simple analysis on the Technique of Data Ensconcing technique[J]. China Computer & Communication, 2010, 0(2)
Authors:Li yongyi & Feng shuo Tangshan Radio & TV University  Network Center
Affiliation:Li yongyi & Feng shuo Tangshan Radio & TV University,Network Center,063000
Abstract:After the theories on data ensconcing being put forward,associated techniques get rapid progress.ICMP channel,HTTP channel and filling in data in the head of TCP/IP are popularly ways used by hackers.Whereas,techniques,such as filling data in the bits image file,are widely applied in the field of data secrecy.Techniques on ensconcing data are complicated and of short history.With widely application,they should be well developed.
Keywords:Channel  rootkit  fill in  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号