英文摘要
|
In 1998, Lin & Lee proposed a new document protection scheme which utilized a meaningful cheating document to protect the secret document from hackers. Afterward some researchers extended and improved their scheme. However, there are still lots of spaces for improvement. The purpose of our study is aimed at reforming their method via recording the code differences instead of recording the code indices, coupled with a secret sharing scheme. Compared with other studies, ours have the following advantages: 1. we can utilize any text as a cheating message; 2. different secrets can use the same cheating message in common; 3. we can handle a bilingual secret document easily without any special treatment; 4. we can recover the code difference table even if one of the share messages is lost; 5. we can decrease the risk of blabbing out the secret; 6. all the files delivered to the receivers are meaningful without giving rise to attentions of hackers.
|
参考文献
|
-
Wang, S. J.,Lu, C. K.(2003).A Scheme of Non-sensible Document in Transit with Secret Hiding.Journal of Information Management,9(2),169-182.
連結:
-
Yeh, W. H.,Hwang, J. J.(2001).A Scheme of Hiding Secret Chinese Information in Confused Documents.Journal of Information Management,7(2),183-191.
連結:
-
黃景彰(2001)。資訊安全-電子商務之基礎。
連結:
-
Lin, C. H.,Lee, T. C.(1998).A Confused Document Encrypting Scheme and Its Implementation.Computers & Security,17(6),543-551.
-
Naor, M.,Shamir, A.(1994).Visual Cryptography.Advances in Cryptology-Eurocrypt` 94, Lecture Notes in Computer Science,950,1-12.
-
Neil, F. J.,Sushil, J.(1998).Exploring Steganography: Seeing the Unseen.IEEE computer,31(2),26-34.
-
Wang, S. J.,Yang, K. S.(2001).A Scheme of High Capacity Embedding on Image Data Using Modulo Mechanism.The Second International Workshop on Information Security Applications (WISA),Korea:
-
Yeh, W. H.,Hwang, J. J.(2001).Hiding Digital Information Using a Novel System Scheme.Computers & Security,20(6),533-538.
-
鄭諸璋、Ken Lunde(2002)。中日韓越資訊處理。台北:美商歐萊禮股份有限公司台灣分公司。
|