用户名: 密码: 验证码:
文本信息隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着因特网的迅猛发展和多媒体技术的广泛应用,信息隐藏技术已经成为信息安全领域一个新的研究热点。目前的研究主要是利用图像、声音、视频等载体来进行信息隐藏,由于文本自身的一些特殊性,在以文本为载体的隐藏技术方面研究的较少。而事实上,人们每天利用互联网传输和交换着大量的文本数据,这使得利用文本数据进行信息隐藏成为一种非常重要的隐秘通信渠道。鉴于此,本文就基于文本的信息隐藏技术作了相关研究。
     本文首先介绍了信息隐藏和数字水印的基本概念和理论,如其特性、分类、应用等。然后重点分析了文本信息隐藏技术,介绍了当前常用的基于文本信息隐藏算法,并对各种算法进行分析和比较。
     文本数字水印是文本信息隐藏的一个重要应用领域,本文在深入研究目前文本数字水印技术及目前文本信息隐藏算法缺陷的基础上,提出了一种基于英文文本的零水印新方法。该算法首先通过文本中的标点符号来确定文本特征,然后通过将加密后的水印信息和加密后的文本特征相异或,将水印信息加到宿主信息中。实验证明该算法具有完好的隐蔽性和较强的鲁棒性。零水印技术是从基于图像信息隐藏技术提出来的,因为在此以前的所有图像信息隐藏方法都或多或少的对载体图像进行了修改,这样做使得水印的鲁棒性和安全性受到了限制。零水印就是不对原始载体数据进行修改的一种新的数字水印技术。
     最后,本文分析了文本零水印技术,并提出了一种基于文本的信息零隐藏方法。该方法重点研究了信息的隐蔽性。该算法不修改文本载体信息,通过文本字符的unicode码的奇偶性并结合一定的规则,将信息嵌入到文本内容中去。该方法已经通过编程实现,并对其进行了部分鲁棒性测试,结果证明该方法具有大容量性、隐秘性强,鲁棒性较好等特点。作者认为该方法具有两点创新之处(1)完好的隐蔽性;(2)抵抗文本再生(打印、扫描、重录入)。但是该方法,只能应用于信息的隐秘性,不能应用于版权保护,还有待改进。
With dramatic advance of Internet and wide application of the multimedia technology, information-hiding techniques have become a new hot topic in the domain of the information security. Today's information hiding techniques mainly use image, audio and video as cover objects. Techniques using text as cover object are relatively fewer because of its speciality.But as a matter of fact, a large number of text data are transferred or exchanged on Internet by people every day. Which makes it is a very import secret communication channel to use text as cover objects.Since this,the text hiding techniques are discussed in detail in this paper.
     In the thesis, firstly we introduce the basic concepts and theoretics of information hiding technologies and digital watermarking, such as charachteristics, classification and application and so on. Then we analyze the iformation hiding techniques based on text in detail and give a survey of today's popular algorithms of text document information hiding and their advantages and shortcomings.
     Text watermarking is a very important application area of text information hiding. After studying the deficiency of present text information hiding and text watermarking, a novel zero-watermarking algorithm based on English text content is proposed in this paper. In this algorithm the text characters are firstly determined by the punctuations, and then by XOR the encrypted characters and the encrypted watermarking information, the watermark is embedded into the text. The experimental results show that the algorithm has complete hiding effectiveness and strong robustness. Zero watermarking is proposed from images based information hiding technology. Before this, all watermarking algorithms, for embedding watermark information, authors modify more or less original image data through various methods to limit its robustness and security. Zero watermarking is a new digital watermarking technology without modifying the data of original cover.
     Finally, this paper analyzes the zero text watermarking technology and proposed a text based information hiding method. The method focuses on the hidden nature of the information. In the process of the embedding, not modify any original cover data, hidden information is embedded into the text according to the character' Unicode odd or even and with some special rules. The method has been finished by programming and had some robust testing. The experimental results prove that the method has a large capacity, good hiding effectiveness and strong robustness and so on. In my opinion, the method has two following innovations: (1) complete hiding effectiveness; (2) Resist text regeneration (such as print, scan, copy). However, the method can only be applied to information hiding, not be used for copyright protection, yet to be improved.
引文
[1]陈克非.信息安全-密码的作用与局限,通信学报,2001,22(8):93-99
    [2]Biham E,Shamir A.Differential cryptanalysis of DES-like cryptosystems,Journal of Cryptography,1991,4(1):3-72
    [3]Harpes C,Kramer G,Massey J L.A generalization of linear cryptanalysis and the applicability of matsue's piling-up lemma.Processding of Eurocrypt'95.Lecture Notes in Computer Science,Springer-Verlag,Berlin,1995
    [4]Matsui M.Linear cryptanalysis method for DES cipher.Proceedings of Eurocrypt '93.Lecture Notes in Computer Science,Springer-Verlag,Berlin,1993
    [5]Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding--a survey.Proceedings of the IEEE,1999,87(7):1062-1077
    [6]刘世栋,杨林,王建新.信息隐藏原理及数字水印技术的若干问题和趋势,计算机工程与应用,2003.12:158-160,179
    [7]吴秋新,钮心忻,杨义先等译.信息隐藏技术-隐写术与数字水印,北京:人民邮电出版社,2001
    [8]汪小帆,戴跃伟,茅耀斌.信息隐藏技术-方法与应用,北京:机械工业出版社,2001
    [9]Bender W,Gruhi D,Morimoto N,et al.Techniques for data hiding.IBM System Journal.1996.313-336
    [10]I J Cox,Matthew L.Miller,Jeffrey A.Bloom.Digital watermarking.2002
    [11]刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报.2000,21(8).39-48
    [12]易开详,石教英,孙鑫.数字水印技术研究进展.中国图像图形学报.2001,6A(2).111-117
    [13]Q Ruanaidh J J,W J bowling,F M Boland.Watermarking digital images for copyright protection.In:IEEE proceeding on Vision,Signal and Image Processing.1996,8,143(4).250-256
    [14]I J Cox,Matthew L Miller.A review of watermarking and the importance of perceptual modeling.In:SPIE Proceeding on Human Vision and Electronic Imaging.1997,3016.92-99
    [15]尤新刚,周琳娜,郭云彪.信息隐藏学科的主要分支及术语,北京电子技术应用研究所,信息隐藏全国学术研讨会(CIHW2000/2001)论文集.西安:西安电子科技大学出版社,2001.43-50
    [16]Stefan Katzenbeisser,Fabien A.P.Petitcolas,Information Hiding Techniques for Steganography and Digital Watermarking.Artech House,Inc.2000
    [17]Meadows C,Moskowitz I.Convert channels--A context-based review.Information hiding.First Internation Workshop,Proceeding,vol.1174 of Lecture Notes in Computer Science,Springer,1996:23-38
    [18]Marvel L M,Boncelet C G,Retter C T.Spread Spectrum Image Steganogrphy.http://citeseer.nj.nec.comlmarv1995pread.html
    [19]F.Hartung,M.Kutter,Multimedia watermarking techniques,Proc.of IEEE,1999,87(7):1079-1107
    [20]P.W.Wong,N.Memon,Secret and public key image watermarking schemes for image authentication and ownership verification,IEEE Trans.on Image Processing,2001,10(10):1593-1601
    [21]G.Vovalzis,I.Pilas.The use of watermarks in the protection of digital multimedia products.Proceedings of the IEEE,1999,87(7):1197-1207
    [22]Christine I.Podilchuk,Edward J.Delp.Digital watermarking:Algorithms and applications.Signal Processing Magazine,2001,14(4):33-46
    [23]Stefan Katzenbeisser,Fabien A.P.Petitcolas,吴秋新等译.Information Hiding Techniques for Steganography and Digital Watermarking[M],北京:人民邮电出版社,2001
    [24]Fahicn A.P.Petitcolas,Ross J.Anderson,Markus G.Kuhn.Information HidingSurvey [J]
    [25]Cox I J,Killian J,Leighton T,Shamoon T.Secure spread spectrum watermark for images,Video and Audio.Proc.Of ICIP,Lausane,Switzerland,1996(3):243-246
    [26]Wang Y.A New WaterMarking Method of Digital Audio Content for Copyright Protection[A].Pro of ICSP'98[C],1998
    [27]Bassia P,Pitas.Robust Audio Waterking in the Time Domain.Proceeding of EUSIPCO'98[C].Rhodesk,Greece,1998
    [28]Boney L,Tewfik A H,Hamdy Kn.Digital watermarks for audio signals[A].International Conference on Multimedia Computing and Systems[C].Hiroshima,Japan,1996
    [29]Swanson M D,Zhu B,Tewfikah,et al.Robust audio watermarking using perceptual masking[J].Signal Processing.1998,66(3):337-335
    [30]Serdean C V,et al.DWT-based high-capacity blind video watermarking,invarant to geometrical attacks[J],IEE Proc-Vis Image Signal Process,2003,150(1):51-58
    [31]Chotikamthom N.Document image data hiding technique using character spacing width sequence coding.Journal on Selected Areas in Communications,1998;16:561-572
    [32]Brassil J T,Low S,Maxemchuk N F.Copyright protection for the electronic distribution of text document.Proceedings of IEEE.1999;11(12):1181-1196
    [33]Atllah M J,Raskin V,Hempelmann C F,et al.Natural language watermarking:design,analysis,and a proof of concept implementation and tamperproofing.In:Proc Int Workshop on Information Hiding,(IHW),The Netherlands,2002
    [34]张勇,赵东宁,李德毅.关系数据库数字水印技术[J].计算机工程与应用,2003,39(25):193-195
    [35]张守和,杨义先,钮心忻,等.软件水印综述[J].软件学报,2003,14(2):268-276
    [36]Stefan Katzenbeisser Fabien A.P.Petitcolas(美).信息隐藏技术--隐写术与数字水印吴秋新,钮心忻,杨义先,罗守山,杨晓兵,译.北京:人民邮电出版社,2001.
    [37]白剑,杨榆,徐迎辉,等.基于文本的信息隐藏算法.计算机应用,2005,11(4):32-35
    [38]白金茹,胡铁.基于文本文档的信息隐藏技术.全国第四届信息隐藏学术研讨会,2002,10-16
    [39]Hartung F,Kutter M.Multimedia watermark techniques Proc of IEEE,1999,87(7):1077-1079
    [40]程玉柱,孙星明,黄华军.一种新的基于混沌映射的文本零水印算法.计算机应用,2005.25(12):2753-2754,2758
    [41]CHAPMAN M,DAVIDA G.A software system for concealing ciphertext as innocuous text[A].ICICS' 97-International Conference on Informtion and Communications Security[C].Beijing,China,1997,P.335-345.
    [42]The texthide(version 1.0)software[EB/OL].http://www.compris.com.
    [43]Bender W,eral.Techniques for data hiding.IBM Systems Journal,1996,35(3&4):313-336
    [44]M AXEMCHUK N,LOW S.Marking text documents[J].Proc.IEEE Int.Conf.Image Processing 1997(ICIP'97),Vol.3,Santa Barbara,CA,Oct,1997,P.13-16.
    [45]J.Brassil,S.Low,N.Maxemchuk,and L O' Gorman.Electornic marking and identification techniques to discourage document copying.In Proc.Inforcom'94,1994,p.1278-1287.
    [46]J.Brassil,S.Low,N.Maxemchuk,and L O' Gorman.Electornic marking and identification techniques to discourage document copying.IEEE J.Select.Areas Common.Vol.13,1995,p.1495-150.
    [47]黄华,齐春,李俊,朱伟芳.一种新的基于超文本的信息隐藏方法.计算机工程,2005,31(12):136-137
    [48]D.Huang,H.Yan.Interword distance changes represented by sine waves for watermarking text images.IEEE Transactions on Circuits and Systems for Video Technology,2001,11(12):1237-1245
    [49]王炳锡,陈琦,邓峰森,等.数字水印技术。西安电子科技大学出版社,2003.
    [50]S.Low,N.F.Maxemchuk,A.M.Lapone.Document identification for copyright protection using centroid detection.IEEE Transactions on Communications,1998 46(3),372-383
    [51]黄花,齐春,李俊,等.文本数字水印.中文信息报,2001,15(5):52-57
    [52]戈英民,郑岗.一种利用字符特征变化的文本数字水印方法.开发应用2005,21(3):36-39
    [53]睢新光,罗慧.一种新的基于超文本的信息隐藏方法.计算机工程,2005,31(12):136-137
    [54]Gonzalez R C,Woods E.Digital Image Processing(2~(nd)Edition).Boston,MA,USA:Addison-Wesley Longman Publishing CO.,Inc.,1992
    [55]刘豪,孙星明,刘晋飚.基于字体颜色的文本数字水印算法.计算机工程.2005,31(15):129-131.
    [56]曹卫兵、戴冠中、夏煜、慕德俊基于文本的信息隐藏技术计算机应用研究2003年第10期39-41
    [57]巩晓婷 陈建华 基于文本的信息隐藏技术研究
    [58]Young-Won Kim,Kyung-Ae Moon,and I1-Seok Oh.A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics.2003 IEEE Proceedings of the Seventh Internatinal Conference on Document Analysis and Recognition.
    [59]温泉,孙锬锋,王树勋.零水印的概念与应用.2003,31(2):214-216
    [60]邱发林,李伟,周绍景Unicode及中文到Unicode转换
    [61]http://baike.baidu.com/view/40801.htm
    [62]Fabien A.P.Petitcolas,Ross J.Anderson,Markus G.Kuhn.Information Hiding-A Survey[J].Proceedings of the IEEE,1999,87(7):1063-1077
    [63]Ingemar J.Cox,M.L.Miller,J.A.Bloom.Watermarking Applications and Their Properties[C].In:International Conference on Information Technology 2000,147-196
    [64]钮心忻,杨义先,吴志军.信息隐藏理论与关键技术研究[J].电信科学,2004,20(12):28-30

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700