首页 | 本学科首页   官方微博 | 高级检索  
     检索      

隐藏攻击技术研究
引用本文:盛承光,程胜利.隐藏攻击技术研究[J].交通与计算机,2006,24(4):112-115.
作者姓名:盛承光  程胜利
作者单位:武汉理工大学,武汉,430063
摘    要:Internet上的保密通信和数字产品版权是信息隐藏技术研究的强大推动力。介绍了信息隐藏技术的基本模型与特性、主要的隐藏算法,阐述了当前主要的隐藏攻击技术。提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。

关 键 词:信息隐藏  隐藏攻击  信息嵌入
收稿时间:2005-11-23
修稿时间:2006-04-21

Research on Hiding Attack Techniques
SHENG Chengguang,CHENG Shengli.Research on Hiding Attack Techniques[J].Computer and Communications,2006,24(4):112-115.
Authors:SHENG Chengguang  CHENG Shengli
Institution:Wuhan University of Technology, Wuhan 430063, China
Abstract:The intense demand of secure communication and copyright protection of digital products on the Internet have accelerated the development of information hiding techniques. This paper introduced the basic model and characteristics of information hiding techniques, and major algorithms. At the same time, it expounded the leading hiding attack techniques. In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
Keywords:information hiding  hiding attack  information embedding
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号