英文摘要
|
In now knowledge explosive era, the message transmission is so rapid and convenient via Internet propagation. For the grade of confidential document, however, we need to pay much attention to the message transit in network systems so as to safeguard the secrecy and integrity. Basically, there are two catalogs to encrypt the secret message, one the data encryption cipher, the other one is the information hiding cipher. In this paper, the later one with the information hiding manner is used to embed the secret message into a host image. According to the content of this chosen host image, the bilingual words associated with this image are used to build the index tables which are the relations between the bilingual words and the confidential document. Afterwards, all index tables are embedded into the host image and only this embedded image is required to transit in the network systems. In such a way, all messages transmitted in the network are kind of visible forms, not random-number forms. Comparing to the previous literatures, a general image is transmitted only instead of the cipher documents suspicious to network interceptors. Apparently, the intentional attacks by those who focus on the random-form messages are evitable. Therefore, a novel and efficient scheme aiming at hiding confidential document is achieved in this paper.
|
参考文献
|
-
葉文宏 Yeh, Wen-Hung、黃景彰 Hwang, Jing-Jang(2001)。一個在欺人耳目的文件中隱藏中文秘密資訊的作法 A Scheme of Hiding Secret Chinese Information in Confused Documents。資訊管理學報 Journal of Information Management,7(2)
連結:
-
Bauter, F. L.(1997).Decrypted Secret: Methods and Maxims of Cryptography.Berlin:Spring-Verlag.
-
Bender, W.,Gruhl, D.,Morimoto, N.,Lu, A.(1996).Techniques for Data Hiding.IBM Systems Journal,35(3/ 4)
-
Curiger, A.,Stuber, B.(1992).Specifications for the IDEA Chip.ETH Zurich, Institute for Integrate System.
-
Davis, R. M.(1978).Computer Security and the Data Encryption Standard.National Bureau of Standards Special Publication.
-
Highland, H. J.(1995).Data Encryption: A Non-mathematical Approach - Part 5.Computers & Security,14(2)
-
Kahn, D.(1967).The Codebreakers.New York:Macmillan.
-
Kaufman, C.,Perlman, R.,Speciner, M.(1995).Network Security: Private Communication in a Public World.Englewood Cliffs, NJ:
-
Lai, X.,Massey, J.(1991).Proceeding of Eurocrypt '90.Berlin:Spring-Verlag.
-
Schneier, B.(1994).Applied Cryptography.New York:Wiley.
-
王旭正 Wang, Shiuh-Jeng,Yang, Kai-Sheng(2001).Second International Workshop on Information Security Applications.Korea:
-
林祝興 Lin, Chu-Hsing,Lee, Tien-Chi(1998).A Confused Document Encrypting Scheme and its Implementation.Computers & Security,17(6)
-
葉文宏 Yeh, Wen-Hung,黃景彰 Hwang, Jing-Jang(2001).Hiding Digital Information Using a Novel System Scheme.Computers & Security,20(6)
|