用户名: 密码: 验证码:
基于手写技术电子公文系统的设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
电子公文系统是借助计算机网络技术,使传统的政府间的报告、请示、批复、公告、通知、通报等在保证信息安全的前提下通过数字化的方式在不同的政府部门间实现快速传递的系统。它大大提高了公文处理的效率,节约了办公资源。是近年来计算机应用领域的研究热点。
     本课题的总体目标是开发一个基于手写技术的电子公文系统,该系统具有传统的电子公文系统的处理流程,同时将手写批注、电子图章及数字水印等新的技术应用到这个系统当中。从这个总体目标出发,论文将基于手写技术的电子公文系统分为三个子系统,先后开发了公文管理子系统,公文批示子系统,发文接收子系统。
     本文在介绍了系统开发前的一些技术难点的研究工作的基础上,详细介绍了系统各部分的功能实现。论文首先介绍了手写批注功能的实现方法,给出了几种目前实现手写批注功能的方法,将他们进行了对比,并说明了自行研究的实现方法的优点。然后介绍了论文选择的公文加密算法,以及数字水印技术的一些基础知识,并详细介绍了基于彩色静止图像的水印嵌入算法和水印提取算法程序实现细节。
     本文介绍的手写批注的实现方法具有实用、方便、先进的特点。本文介绍的数字水印实现方法给出了一种安全可靠的信息隐藏的方法。
Electronic Document System can transfer report, referendum, replying, bulletin and information among departments quickly through computer network on the premise of information security. It can improve the efficiency of disposing document greatly, and save work resource. These days it becomes the studying hotspot in computer field.
    Designing an Electronic Document System based on handwritten technology is the target of this paper. The system has the traditional Electronic Document System processing flow. Some new technologies such as handwritten remark, electronic stamp and digital watermark were applied to the system. For this target, the System was divided into three subsystems-Document managing subsystem, Document remarking subsystem and Dispatch's documents receiving subsystem.
    After introducing some difficulties which were studied before the beginning of the design, the paper introduces the realization of each part's functions. First, the paper introduces the realization of handwritten remark, lists several methods that have been usually used at present, and narrates the advantage of our method contrasting with others. Second, the paper introduces the encrypting algorithm for document and the knowledge of digital watermark, in addition, it explains the realization detail of watermark's embedding and distilling algorithm based on stillness color bitmap.
    The realization method of handwritten remark which is introduced in this paper have characteristic such as practicability, convenience, advancement, etc. The scheme of watermark realization provides a reliable method of information hiding.
引文
[1] 计算机世界市场研究中心.2001-2002年中国中心城市信息化建设发展研究年度报告.http://www.redalder.com/reports/ccw/ch_r-ccw0231.asp
    [2] 李广乾.全球电子政务发展现状与趋势.北京:国务院发展研究中心,http://www.gzst.net.cn/gzst_web/gzst_s_html/ztlm/bwzg_7.htm
    [3] 李导龄,江涛.电子政务蕴藏无限商机.http://www.citychina.org/news/news4.htm.2002,4
    [4] 李龙.全文批注系统.湖南:湖南金智高科技发展有限责任公司.http://www.goldsoft.net/qz.htm, 2003, 6
    [5] 陶以政,何铁宁.Delphi中自动存取MS—Office文档对象应用研究.计算机与现代化,2002,(1):7-11.
    [6] 骆懿玲.Office VBA在CAI系统中的应用.计算机应用与软件,2003,(9):95-96
    [7] 叶志敏,杨剑.用DELPHI程序操纵WORD.扬州大学学报:自然科学版,1998,1(4):67-70.
    [8] TeixeiraS,pachecoX,等.Delphi5开发人员指南.北京:机械工业出版社,2000.73-96
    [9] Marco Cantu. Delphi 6从入门到精通.北京:电子工业出版社,2002.248-289
    [10] Microsoft. Microsoft Office 2000 开发策略白皮书 http://www.microsoft.com/msdn/
    [11] 翁亮,吴贵臣等.安全电子时间戳系统的设计方案.通信学报,2003,24(2):64-70
    [12] 丁海斌.论信息化时代电子文档的信息安全.辽宁大学学报,2003,31(3):21-25
    [13] 施荣华.一种有效的动态密钥对分配方案.小型微型计算机系统,1997,18(12):55-58.
    [14] Bruce Schneier著.应用密码学(吴世忠等译).北京:机械工业出版社,2000-1
    [15] 王育民,刘建伟.通信网的安全——理论与技术.西安,西安电子科技大学出版社,1999
    [16] 施荣华,胡湘陵.一种基于复合问题的双重认证存取控制方案.小型微型计算机系统,1998,19(7):49-52.
    [17] 吴文玲,冯登国.简评美国公布的15个AES候选算法.软件学报.1999,10(3):225-230.
    
    
    [18] 杨义先,孙伟,钮心忻.现代密码新理论.北京:科学出版社,2002.
    [19] Barni M., Podilchuk C. I., Bartolini F.. Watermark embedding: Hiding a signal within a cover image. IEEE Communications Magazine, 2001,39(8):102-108
    [20] Choi Y., Aizawa K.. Universal watermark estimation scheme based on error probabilities. Proceedings of SPIE - The International Society for Optical Engineering, 2001,4314:643-650
    [21] De Rosa A., Barni M., Bartolini F.. Watermark capacity measure incorporating a model of the human visual system. Proceedings of SPIE - The International Society for Optical Engineering, 2001, 4314:483-494
    [22] Trepanier R. J., Turner N.. Application of watermark quality measurement by image analysis. Annual Meeting - Technical Section, Canadian Pulp and Paper Association, 2002, C:C87-C92
    [23] Y Choi, IAizawa. Digital Watermarking Using Inter—Block Correlation. Proceedings of the International Conference on Image Processing (ICIP99), 1999, Vol2: 216-220
    [24] James Rumbaugh,Ivar Jacobson,等.UML参考手册.北京:机械工业出版社.2001.23-59
    [25] 施伯乐,丁包康,等.数据库系统教程(第2版).北京:高等教育出版社.2003.1-75
    [26] Wright, Marie A. The Advanced Encryption Standard. Network Security, 2001, 10: 11-13
    [27] Wright, Marie A. The Evolution of the Advanced Encryption Standard. Network Security, 1999, 11: 11-14
    [28] Asenjo, Juan C. The Advanced Encryption Standard—Implementation and Transition to a New Cryptographic Benchmark. Network Security, 2002, 7: 7-9
    [29] Triantafillou Evangelos, Pomportsis Andreas, etal. The design and the formative evaluation of an adaptive educational system based on cognitive styles. Computers and Education, 2003, 41 (1): 87-103
    [30] Peyravian Mohammad, Matyas Stephen M, etal. Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computers and Security, 2000, 19 (3): 282-288
    
    
    [31] Chen Chien-Yuan, Ku Cheng-Yuan, etal. Cryptanalysisof short secret exponents modulo RSA primes. Information Sciences, 2004, 160 (1-4): 225-233
    [32] Chang Chin-Chen, Hwang Shin-Jia. A simple approach for generating RSA keys. Information Processing Letters, 1997, 63 (1): 19-21
    [33] Hong Hyun-Soo, Lee Ho-Kyu, etal. The better bound of private key in RSA with unbalanced primes. Applied Mathematics and Computation, 2003, 139 (2-3): 351-362
    [34] J Eggers Joachim, Girod Bernd. Quantization effects on digital watermarks. Signal Processing, 2001, 81 (2): 239-263
    [35] Lin Phen-Lan. Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software, 2002, 55 (3): 261-271
    [36] Kim Bum-Soo, Choi Jae-Gark, etal. Robust digital image watermarking method against geometrical attacks. Real-Time Imaging, 2003, 9 (2): 145-167
    [37] Barni Mauro, Bartolini Franco, etal. Copyright protection of digital images by embedded unperceivable marks. Image and Vision Computing, 1998, 16 (12-13): 897-906
    [38] Jian Zhao, Koch Eckhard. A generic digital watermarking model. Computers & Graphics, 1998, 22 (4): 409-420
    [39] 毛新宇.存取控制中强认证技术的研究[硕士学位论文] .中南大学,2002.
    [40] 甘元驹.通用手写签名技术与应用[硕士学位论文] .中南大学,2003

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700