期刊文献+
共找到4,059篇文章
< 1 2 203 >
每页显示 20 50 100
Survey of information security 被引量:40
1
作者 SHEN ChangXiang ZHANG HuangGuo +2 位作者 FENG DengGuo CAO ZhenFu HUANG JiWu 《Science in China(Series F)》 2007年第3期273-298,共26页
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive ... The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc. 展开更多
关键词 information security CRYPTOLOGY trusted computing network security information hiding
原文传递
信息隐藏技术及其应用 被引量:14
2
作者 刘峰 张鹏 《天津通信技术》 2001年第1期1-4,共4页
随着数字化和网络化的飞速发展,数字信息隐藏技术成为当前信息科学领域研究的热点,而其中数字水印是当前研究最为活跃的一个分支。因此对信息隐藏系统的基本模型、基本特性、算法实现、应用领域及研究动态进行了介绍。
关键词 信息 隐藏 数字 水印 版权保护
原文传递
数据库中的知识隐藏 被引量:14
3
作者 郭宇红 童云海 +1 位作者 唐世渭 杨冬青 《软件学报》 EI CSCD 北大核心 2007年第11期2782-2799,共18页
伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐... 伴随着数据共享、隐私保护、知识发现等多重需求而产生的PPDM(privacy preserving data mining),成为数据挖掘和信息安全领域近几年来的研究热点.PPDM中主要考虑两个层面的问题:一是敏感数据的隐藏与保护;二是数据中蕴涵的敏感知识的隐藏与保护(knowledge hiding in database,简称KHD).对目前的KHD技术进行分类和综述.首先介绍KHD产生的背景,然后着重讨论敏感关联规则隐藏技术和分类规则隐藏技术,接着探讨KHD方法的评估指标,最后归结出KHD后续研究的3个方向:数据修改技巧中基于目标距离的优化测度函数设计、数据重构技巧中的反向频繁项集挖掘以及基于数据抽样技巧的通用知识隐藏方法设计. 展开更多
关键词 知识隐藏 KHD(knowledge hiding in database) 敏感规则 隐私保护 反向挖掘
下载PDF
确定性的终结——大数据时代的伦理世界 被引量:16
4
作者 朱锋刚 李莹 《自然辩证法研究》 CSSCI 北大核心 2015年第6期112-116,共5页
现代技术遮蔽了生活世界中其他维度的生存空间,塑造着伦理情景的格局。互联网改变了人们生存的时空秩序;数字技术颠覆了信息传播模式。伦理情景的确定性消解,开放性和不确定性成为其新的重要特征。主体是确定的,与之相对的客体是匿名的... 现代技术遮蔽了生活世界中其他维度的生存空间,塑造着伦理情景的格局。互联网改变了人们生存的时空秩序;数字技术颠覆了信息传播模式。伦理情景的确定性消解,开放性和不确定性成为其新的重要特征。主体是确定的,与之相对的客体是匿名的、未知的。技术所造成的这种伦理情景是现代主体无法逃避的。随着伦理客体的隐匿未知,主体的义务、责任、权利甚至自由的基本内涵变得不确定。大数据为伦理世界带来的最大改变就是确定性的终结。 展开更多
关键词 数字技术 隐匿 陌生的熟人
原文传递
从潜阳封髓丹谈阳气通达与潜藏 被引量:12
5
作者 文秀华 《中国中医药信息杂志》 CAS CSCD 2021年第5期122-125,共4页
阳气主卫外,但相火必潜藏于肾以温肾水,且阳气务以上下通达为要;如虚阳浮越,相火上逆,上下不通,则怪病丛生,常法不效。潜阳封髓丹乃潜阳丹与封髓丹合方化裁而成,具有导龙入海之功、引火归元之妙,专为阳虚火浮、阴不敛阳、真寒假热一证... 阳气主卫外,但相火必潜藏于肾以温肾水,且阳气务以上下通达为要;如虚阳浮越,相火上逆,上下不通,则怪病丛生,常法不效。潜阳封髓丹乃潜阳丹与封髓丹合方化裁而成,具有导龙入海之功、引火归元之妙,专为阳虚火浮、阴不敛阳、真寒假热一证而设。本文结合案例阐述了潜阳封髓丹在临床中的运用。 展开更多
关键词 潜阳封髓丹 阳气 通达 潜藏 病案
下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
6
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
下载PDF
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:10
7
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 Coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
下载PDF
A Fusion Steganographic Algorithm Based on Faster R-CNN 被引量:10
8
作者 Ruohan Meng Steven G.Rice +1 位作者 Jin Wang Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2018年第4期1-16,共16页
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret ... The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret message should not be damaged on the process of the cover media.In order to ensure the invisibility of secret message,complex texture objects should be chosen for embedding information.In this paper,an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message.Firstly,complex texture regions are selected based on a kind of objects detection algorithm.Secondly,three different steganographic methods were used to hide secret message into the selected block region.Experimental results show that the approach enhances the security and robustness. 展开更多
关键词 Faster R-CNN fusion steganography object detection CNNS information hiding.
下载PDF
远程线程注入木马的攻防研究 被引量:5
9
作者 韩芳 栾国森 《计算机与数字工程》 2008年第3期96-97,共2页
针对目前最新的采用远程线程注入技术实现木马隐身的关键技术,提出一种基于API拦截技术的方法实现这种新型木马的拦截。测试结果表明,这种拦截技术对远程线程注入式木马的拦截是有效的。
关键词 木马 隐身 API拦截技术 拦截
下载PDF
The Internet of data: a new idea to extend the IOT in the digital world 被引量:6
10
作者 Wei FAN Zhengyong CHEN +1 位作者 Zhang XIONG Hui CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第6期660-667,共8页
Increasingly powerful computational technology has caused enormous data growth both in size and complexity. A key issue is how to organize the data to adapt the challenges of data analysis. This paper borrows ideas fr... Increasingly powerful computational technology has caused enormous data growth both in size and complexity. A key issue is how to organize the data to adapt the challenges of data analysis. This paper borrows ideas from the Internet of things (IOT) into the digital world and organize the data entities to form a network, the Internet of data (IOD), which has huge potential in data-intensive applications. In the IOD, data hiding technology is utilized to embed virtual tags, which record all the activities of the data entities since they are created, into every data entity in the system. The IOD aims to organize the data to be interconnected as a network and collect useful information for data identification, data tracing, data vitalization and further data analysis. 展开更多
关键词 Internet of data (IOD) virtual tags Internet of things (lOT) data-intensive applications data vitalization data hiding
原文传递
A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC 被引量:6
11
作者 Ke Niu Xiaoyuan Yang Yingnan Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期489-498,共10页
A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decod... A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the original compressed video carrier. The experimental results show that the proposed algorithm is simple, has higher capacity and invisibility than other existing schemes, and can adjust the relationship between capacity and invisibility according to embedded load. 展开更多
关键词 reversible video data hiding H.264/AVC motion vector histogram modification modified referenceframe
原文传递
A Generative Method for Steganography by Cover Synthesis with Auxiliary Semantics 被引量:6
12
作者 Zhuo Zhang Guangyuan Fu +2 位作者 Rongrong Ni Jia Liu Xiaoyuan Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第4期516-527,共12页
Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capac... Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capacity,it inevitably leaves traces of rewriting that can eventually be discovered by the enemy.The method of Steganography by Cover Synthesis(SCS)attempts to construct a natural stego image,so that the cover image is not modified;thus,it can overcome detection by a steganographic analyzer.Due to the difficulty in constructing natural stego images,the development of SCS is limited.In this paper,a novel generative SCS method based on a Generative Adversarial Network(GAN)for image steganography is proposed.In our method,we design a GAN model called Synthetic Semantics Stego Generative Adversarial Network(SSS-GAN)to generate stego images from secret messages.By establishing a mapping relationship between secret messages and semantic category information,category labels can generate pseudo-real images via the generative model.Then,the receiver can recognize the labels via the classifier network to restore the concealed information in communications.We trained the model on the MINIST,CIFAR-10,and CIFAR-100 image datasets.Experiments show the feasibility of this method.The security,capacity,and robustness of the method are analyzed. 展开更多
关键词 information hiding STEGANOGRAPHY STEGANOGRAPHY without modification STEGANOGRAPHY by COVER Synthesis(SCS) GENERATIVE adversarial networks
原文传递
Steganalytic method based on short and repeated sequence distance statistics 被引量:4
13
作者 WANG GuoXin PING XiJian XU ManKun ZHANG Tao BAO XiRui 《Science in China(Series F)》 2008年第10期1466-1474,共9页
According to the distribution characteristics of short and repeated sequence (SRS), a steganaiytic method based on the correlation of image bit planes is proposed. Firstly, we provide the conception of SRS distance ... According to the distribution characteristics of short and repeated sequence (SRS), a steganaiytic method based on the correlation of image bit planes is proposed. Firstly, we provide the conception of SRS distance statistics and deduce its statistical distribution. Because the SRS distance statistics can effectively reflect the correlation of the sequence, SRS has statistical features when the image bit plane sequence equals the image width. Using this characteristic, the steganalytic method is fulfilled by the distinct test of Poisson distribution. Experimental results show a good performance for detecting LSB matching steganographic method in still images. By the way, the proposed method is not designed for specific steganographic algorithms and has good generality. 展开更多
关键词 information hiding STEGANALYSIS statistics of short and repeated sequence distance
原文传递
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs 被引量:5
14
作者 TANG ChunMing PEI DingYi +1 位作者 WANG XiaoFeng LIU ZhuoJun 《Science in China(Series F)》 2008年第2期128-144,共17页
A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., r... A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-interactive witness indistinguishable (NlWl) proof system and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses em- ployed in these two protocols (NlWl and NIWT) cannot also be distinguished by the verifiers. Combined with the E-protocol, we then construct NlWl and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations, Finally, based on our NlWl and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak's scheme under the existence of trapdoor permutations. 展开更多
关键词 delegateable signature non-interactive zero-knowledge non-interactive witness indistinguishable non-interactive witness hiding ∑-protocol
原文传递
Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information 被引量:5
15
作者 ZHANGWei-ming LIShi-qu +1 位作者 CAOJia LIUJiu-fen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期315-318,共4页
The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extra... The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance ofstego-key, and the theoretic conclusion is used to analyze the actual extracting attack on LeastSignificant Bit(LSB) steganographic algorithms. 展开更多
关键词 information hiding STEGANOGRAPHY extracting attack difficulty ofextraction unicity distance
下载PDF
On the orders of transformation matrices (mod n) and two types of generalized Arnold transformation matrices 被引量:5
16
作者 YANGLizhen CHENKefei 《Science in China(Series F)》 2004年第5期655-668,共14页
In this paper, we analyze the structure of the orders of matrices (mod n), and present the relation between the orders of matrices over finite fields and their Jordan normal forms. Then we generalize 2-dimensional Arn... In this paper, we analyze the structure of the orders of matrices (mod n), and present the relation between the orders of matrices over finite fields and their Jordan normal forms. Then we generalize 2-dimensional Arnold transformation matrix to two types of n-dimensional Arnold transformation matrices: A-type Arnold transformation matrix and B-type transformation matrix, and analyze their orders and other properties based on our earlier results about the orders of matrices. 展开更多
关键词 SCRAMBLING Jordan normal form information hiding.
原文传递
Steganalysis of stochastic modulation steganography 被引量:3
17
作者 HE Junhui1,2 & HUANG Jiwu1,2 1. School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China 2. Guangdong Province Key Laboratory of Information Security, Guangzhou 510275, China 《Science in China(Series F)》 2006年第3期273-285,共13页
Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic mo... Stochastic modulation steganography embeds secret message within the cover image by adding stego-noise with a specific probabilistic distribution. No method is known to be applicable to the estimation of stochastic modulation steganography. By analyzing the distributions of the horizontal pixel difference of images before and after stochastic modulation embedding, we present a new steganalytic approach to accurately estimate the length of secret message in stochastic modulation steganography. The pro- posed method first establishes a model describing the statistical relationship among the differences of the cover image, stego-image and stego-noise. In the case of stegoimage-only steganalysis, rough estimate of the distributional parameters of the cover image's pixel difference is obtained with the use of the provided stego-image. And grid search and Chi-square goodness of fit test are exploited to estimate the length of the secret message embedded with stochastic modulation steganography. The experimental results demonstrate that our new approach is effective for steganalyzing stochastic modulation steganography and accurately estimating the length of the secret message. 展开更多
关键词 information hiding STEGANOGRAPHY STEGANALYSIS stochastic modulation statistical distribution models of difference.
原文传递
数字水印技术研究 被引量:7
18
作者 路亚峰 张贤 +2 位作者 赵玉奎 杨和平 何林 《电子测量技术》 2009年第8期95-99,共5页
数字水印技术是近年来随着因特网的日益普及,多媒体信息交流达到了前所未有的深度和广度,但作品侵权随之也更加容易,篡改也更加方便的背景下出现的数字产品版权保护技术,是当前国际学术界的研究热点之一。本文首先论述了数字水印的基本... 数字水印技术是近年来随着因特网的日益普及,多媒体信息交流达到了前所未有的深度和广度,但作品侵权随之也更加容易,篡改也更加方便的背景下出现的数字产品版权保护技术,是当前国际学术界的研究热点之一。本文首先论述了数字水印的基本特征、基本原理、算法、分类,然后分析了针对数字水印的攻击方法、数字水印的主要应用领域,最后探讨了数字水印技术的展望。 展开更多
关键词 信息隐藏 数字水印 版权保护 数字水印算法
下载PDF
当前传统私家园林意境的隐退 被引量:6
19
作者 李岚 李新建 《新建筑》 北大核心 2003年第6期71-73,共3页
意境是中国传统私家园林审美的灵魂,然而在现代游园中,园林的意境正逐渐隐退。分析了园林意境生成的机理,从游赏性质、经典游线、空间尺度等几方面探讨意境隐退的原因,并提出相应的解决措施。
关键词 私家园林 传统园林 空间尺度 园林艺术
下载PDF
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network 被引量:7
20
作者 Chuanlong Li Yumeng Jiang Marta Cheslyar 《Computers, Materials & Continua》 SCIE EI 2018年第8期313-324,共12页
Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of... Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes. 展开更多
关键词 GAN CNN texture synthesis STEGANOGRAPHY WATERMARK image concealing information hiding
下载PDF
上一页 1 2 203 下一页 到第
使用帮助 返回顶部