题名

一種無警性的文件秘密傳送策略研究

并列篇名

A Scheme of Non-sensible Document in Transit with Secret Hiding

DOI

10.6382/JIM.200301.0169

作者

王旭正(Shiuh-Jeng Wang);呂政國(Cheng-Kuo Lu)

关键词

資訊安全 ; 資料加密法 ; 資訊隱藏法 ; Information Hiding ; Security ; Cryptography ; Steganography

期刊名称

資訊管理學報

卷期/出版年月

9卷2期(2003 / 01 / 01)

页次

169 - 182

内容语文

繁體中文

中文摘要

在現今網際網路普及的時代,為了建立一個安全的網路傳輸環境,使秘密資訊在網路上能夠被安全的傳輸。先前許多的學者已提出許多的資料保護法,大致上可區分為兩類,一為將資料先進行加密傳輸,再進行解密輸出的「資料加密法」,另一類為將秘密資訊隱藏在備藏資料裡的「資訊隱藏法」。本文試著提出一種新的作法,藉著一張圖片,配合內含之中英文的說明文字,去建立代碼數字索引表格;再將欲隱藏的秘密資訊,轉成代碼的形式。並根據代碼數字索引表格,可將秘密資訊的代碼轉成數字索引檔,最後將其數字索引檔藏入我們傳輸的圖片中。如此一來,在所有的傳輸過程中,傳送的資料都是可見的明文及圖片,不易被非法者懷疑,又可隱藏大量的秘密資訊。

英文摘要

In now knowledge explosive era, the message transmission is so rapid and convenient via Internet propagation. For the grade of confidential document, however, we need to pay much attention to the message transit in network systems so as to safeguard the secrecy and integrity. Basically, there are two catalogs to encrypt the secret message, one the data encryption cipher, the other one is the information hiding cipher. In this paper, the later one with the information hiding manner is used to embed the secret message into a host image. According to the content of this chosen host image, the bilingual words associated with this image are used to build the index tables which are the relations between the bilingual words and the confidential document. Afterwards, all index tables are embedded into the host image and only this embedded image is required to transit in the network systems. In such a way, all messages transmitted in the network are kind of visible forms, not random-number forms. Comparing to the previous literatures, a general image is transmitted only instead of the cipher documents suspicious to network interceptors. Apparently, the intentional attacks by those who focus on the random-form messages are evitable. Therefore, a novel and efficient scheme aiming at hiding confidential document is achieved in this paper.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. 葉文宏 Yeh, Wen-Hung、黃景彰 Hwang, Jing-Jang(2001)。一個在欺人耳目的文件中隱藏中文秘密資訊的作法 A Scheme of Hiding Secret Chinese Information in Confused Documents。資訊管理學報 Journal of Information Management,7(2)
    連結:
  2. Bauter, F. L.(1997).Decrypted Secret: Methods and Maxims of Cryptography.Berlin:Spring-Verlag.
  3. Bender, W.,Gruhl, D.,Morimoto, N.,Lu, A.(1996).Techniques for Data Hiding.IBM Systems Journal,35(3/ 4)
  4. Curiger, A.,Stuber, B.(1992).Specifications for the IDEA Chip.ETH Zurich, Institute for Integrate System.
  5. Davis, R. M.(1978).Computer Security and the Data Encryption Standard.National Bureau of Standards Special Publication.
  6. Highland, H. J.(1995).Data Encryption: A Non-mathematical Approach - Part 5.Computers & Security,14(2)
  7. Kahn, D.(1967).The Codebreakers.New York:Macmillan.
  8. Kaufman, C.,Perlman, R.,Speciner, M.(1995).Network Security: Private Communication in a Public World.Englewood Cliffs, NJ:
  9. Lai, X.,Massey, J.(1991).Proceeding of Eurocrypt '90.Berlin:Spring-Verlag.
  10. Schneier, B.(1994).Applied Cryptography.New York:Wiley.
  11. 王旭正 Wang, Shiuh-Jeng,Yang, Kai-Sheng(2001).Second International Workshop on Information Security Applications.Korea:
  12. 林祝興 Lin, Chu-Hsing,Lee, Tien-Chi(1998).A Confused Document Encrypting Scheme and its Implementation.Computers & Security,17(6)
  13. 葉文宏 Yeh, Wen-Hung,黃景彰 Hwang, Jing-Jang(2001).Hiding Digital Information Using a Novel System Scheme.Computers & Security,20(6)
被引用次数
  1. 侯永昌、杜淑芬(2005)。中英文秘密文件的分享與隱藏。資訊管理學報,12(2),141-161。