首页 | 本学科首页   官方微博 | 高级检索  
     

文本的冗余变换以及伪装传输
引用本文:张蒲生,苏运霖.文本的冗余变换以及伪装传输[J].网络安全技术与应用,2004(4):27-30.
作者姓名:张蒲生  苏运霖
作者单位:1. 广东轻工职业技术学院,广州,510300
2. 广州暨南大学计算机科学系,广州,510632
基金项目:国家“十五”重大科技攻关项目(2001BA101A10)资助。
摘    要:本文研究了文本冗余变换以及伪装传输。其技术路线是首先通过一个文本生成器产生一段有意义的参考文本来掩饰将要传输的机密文本,然后将不具有冗余度的文本文件通过冗余变换使之具有冗余度,再对具有冗余度的参考文本和机密文本进行一次性码本的编码,最后两者异或运算形成隐藏密码嵌入图像或声音中,实现机密文本的伪装传输。

关 键 词:冗余  参考文本  机密文本  伪装

Redundancy Transform of Text and Steganography Transmission
Zhang Pusheng Su Yunlin.Dept. of Computer Engineering,Guangdong Light Industry Technical CollegeGuangzhou .Dept. of Computer Science Jinan University Guangzhou.Redundancy Transform of Text and Steganography Transmission[J].Net Security Technologies and Application,2004(4):27-30.
Authors:Zhang Pusheng Su YunlinDept of Computer Engineering  Guangdong Light Industry Technical CollegeGuangzhou Dept of Computer Science Jinan University Guangzhou
Affiliation:Zhang Pusheng1 Su Yunlin21.Dept. of Computer Engineering,Guangdong Light Industry Technical CollegeGuangzhou 5103002.Dept. of Computer Science Jinan University Guangzhou 510632
Abstract:We research redundancy transform of text and steganography transmissionhere. The route of technology is: first, to hide the transmission of secret text throughreference text produced to same size of secret text by a text creater, then it transformswithout redundant digit into with redundant digit by redundancy handling of the text, one-time pads is coded on the redundant secret text and reference text, and last, two code isform to hide-cryptogram by exclusive OR operation, and then inlay it into image and soundto realize the transmission of secret text steganography.
Keywords:redundancy  reference text  secret text  steganography
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号