分密级数字水印在电子政务文档中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术和网络通信技术的发展,我们在电子政务中面临的主要问题之一是资料管理的安全。资料的使用和传输等方面的安全是本文研究的主要问题。传统的密码学和一般的访问控制系统只能保证相关部分的安全,比如用户登录、权限控制等,针对的是电子政务系统中的部分管理。因此,研究设计一种综合的方案实现资料分密级的保护,有重要的理论意义和实用价值。
     数字水印技术用来保护多媒体信息安全,它结合传统的数据加密技术,实现信息的隐藏、访问控制等。分密级数字水印是在数字水印的基础上,根据水印特性,将各类数字水印技术应用到不同密级文件,从而保证密级文件的安全。本文在研究过程中,主要针对分密级数字水印展开讨论。并将其应用到电子政务的资料管理中,来验证它的实用性。
     基于电子政务中资料的特殊性,论文设计了一个综合安全保护方案一分密级数字水印保护方案。该方案在登录模块实现了水印与指纹结合的保护,然后根据不同密级文件的安全要求,研究应用智能技术和数据库水印技术等,对资料数据进行分析、处理。根据不同的密级和不同的实用价值,选择相应的水印来实现数据发布、存储、传输,以及事后追踪的安全保护。最后给出了分密级数字水印的应用和发展前景。
With the development of the computer technology and the network communication technology, one of the important issues we are faced with is the safety of document management in the Electronic government system. The security of the document and document transmission is the major focus in the present work. Traditional cryptography and the common access control system only guarantee the safety of the relevant section. For example, the users' login, authority control and document stored etc, which are dealing with the partial document management of Electronic government system. Therefore, research in a comprehensive plan for achieving the protection of classification has the important significance, both theoretically and practicability.
     The technologies of digital watermark protect the security of multimedia technology information, which combines traditional data encryption, the information for the hidden and the access control and so on. Classification digital watermark which is on the basis of the digital watermark, according to the feature of watermark, apply the different digital watermark technologies application to the classification documents, therefore protect the safety of the classification documents. In the research course of the thesis, the discussions are mainly aimed at the operation of the classification digital watermark. And it has been applied to the document management of Electronic Government, to verify its practical value.
     Based on the particularity of the electronic document, this thesis designs a comprehensive security plan-a protection scheme of classification digital watermark. The plan, in the login module, uses the protection form the combination of watermarks and fingerprints, and then according to the security requirements of the classification files, the intelligence technology and the database watermarking technology etc are also studied and applied, which to analyze and dispose the document data. According to the different classification and the different practical value, selects the corresponding watermark that to complete the security protection of data's issue, storage, transport, and the subsequent trace. At last we give the application of digital watermark and the prospects of its development.
引文
[1]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].科学出版社,2004,12.
    [2]陈明奇,钮心忻.数字水印的研究进展和应用[J].通信学报,2001:71-79.
    [3]苏奎.云计算在电子政务建设中的应用探讨[J].金卡工程·经济与法,2010,8:344.
    [4]赵翔,郝林.数字水印综述[J].计算机工程与设计,2006:1946-1950.
    [5]A. K. Bhattacharjya and H.Ancin. Data Embedding in Text for A Copier System[J]. International Conference on Image Processing (ICIP'99).1999,2:245-249.
    [6]J. R.Hernandez, M.Amado, and F.Perez-Gonzalez. DCT-domain Watermarking Techniques for Still Images:Detector Performance Analysis and A New Structure[J].IEEE Transactions on Image Processing,2000,9:55-68.
    [7]C.H.Huang, J.L.Wu and D.Y.Chen. A Blind Watermarking Algorithm with Semantic Meaningful Watermarks Signals[J]. Conference Record of the Thirty-Fourth Asilomar Conference On Systems and Computers, Oct.29-Nov.1,2000,2:1827-1830.
    [8]P.W.Wong. A Public Key Watermark for Image Verification and Authentication [J]. International Conference On Imag Processing(ICIP'98), Oct.4-7, 1998,1:455-459.
    [9]J.W.Huang and Y.Q.Shi. Embedding Gray Level Images. The 2001 IEEE International Symposium on Circuits and Systems(ISCAS'2001), May 6-9,2001,5: 239-242.
    [10]C.H.Chou and T.L.Wu.Embedding Color Watermarks In Color Images[J]. IEEE Fourth Workshop On Multimedia Signal Processing, Oct.3-5,2001:327-332.
    [11]李金,吴利予,高尚伟,王峰,吕普铁.彩色数字水印技术研究[J].自动化技术与应用,2002,21:47-49.
    [12]Z.Zhao and N.H.Yu. A Novel Watermark Embedding Algorithm[J].2002 International Conference on Machine Learning and Cybernetics, Nov.4-5,2002,4: 1929-1934.
    [13]H.T.Ge, F.L. Su and Y.Zhu.Color Image Text Watermaking Using Wavelet Transform and Error-correcting Code[J].6th International Conference on Signal Processing, Aug.21-25,2000,2:942-945.
    [14]R.Tachibana, S.Shimizu, S.Kobayashi and T. Nakamura. An Audio Watemarking Method Using a Two-dimensional Pseudo-random Array[J]. Signal Processing,2002, 82; 1455-1469.
    [15]I.S.Reed and G.Solomon. Polynomial Codes over Certain Finite Fields[J]. SIAM Journal of Appliied Mathematics,1960,8:300-304.
    [16]R.Lancini, F.Mapelli and S.tubaro. A Robust Video Watermarking Technique in the Spatial Domain.4th EURASIP-IEEE Region 8 International Symposium on Video/Image Processing and Multimedia Communications(VIPromCom), June 16-19,2002: 251-256.
    [17]J.Yang, M.H.Lee and J.Y.Park.Enhancing Robustness of information Hiding against Interference of Communication with Turbo Code. IEEE International Symposium on Cricuits and Systems (ISCAS'2002), May 26-29,2002,1:13-16.
    [18]M. Barni, F.Bartolini, V.Cappellini and A.Piva. A DCT-domain System for Robust Image Watermarking.Signal Processing.1998,66:357-372.
    [19]M.L.Miller, J.A.Bloom and I.J.Cox. Digital watermarking. Morgan Kaufmann[M], 2002.
    [20]A.Nikolaidis, S Tsekeridou, A.Tefas and V.Solachidis. A Survey on Watermarking Application Scenarios and Related Attacks[J].International Conference on Image Processing.2001,3:991-994.
    [21]杨义先,钮心忻.多媒体信息伪装综论[J].通信学报.2002,23:32-38.
    [22]S.Voloshynovskiy, S.Pereria, T.Pun, J.J.Eggers and J.K.Su.Attack on Digital Watermarks:Classfication, Estimation Based Attacks and Benchmarks[J].IEEE Communication Magazine.2001,39:118-126.
    [23]李梅,费耀平.数字水印技术及其在电子政务安全领域的应用[J].信息网络安全博士之窗,2006,3:42-43.
    [24]陈洪梅,陈远.电子政务信息的安全要求和保障措施[J].情报技术,2004,5:44-45.
    [25]贾玉叶,郝林.基于银行卡信息安全的数字水印技术方案[J].计算机工程与设计,2011,4:1229-1231.
    [26]张烽.电子政务网络中统一身份认证研究[J]. Value Engineering,2010:151-152.
    [27]郭书涛,杨世平.基于指纹与数字水印的网络实名制系统研究与设计[J].信息与电脑(理论版),2010,7:167-169.
    [28]濮方俐,谢海宁,严裕程.面向密级公文分级查询的数据库加密方法[J].广西电力,2004,5:57-59.
    [29]Sujoy Roy,Ee-Chien Chang.Watermarking with Retrivel.Multimedia Systems, 2004,9:433-440.
    [30]温泉,孙锬峰,王树勋.零水印的概念与应用[J].电子学报,2003,2:214-216.
    [31]王国栋,刘粉林,刘媛,姚刚.一种能区分水印或内容篡改的脆弱水印算法[J].电子学报,2008,7:1350-1351.
    [32]张静,张春田.用于PDF文档认证得数字水印算法[J].天津大学学报,2003,3:215-219.
    [33]王蓓蓓,王希常.一种面向内容认证的文档图像半脆弱数字水印算法[J].信息技术与信息化-计算机应用技术,2009,6:105-107.
    [34]张力,肖薇薇,纪震,张基宏.智能水印检测器的设计及应用[J].信号处理,2003,2:137-140.
    [35]朱磊,沈焕生.一种基于数字水印和信息内容的网络信息安全技术[J].解放军理工大学学报,2010,2:20-22.
    [36]刘爽,孙光明,刘奕.基于数字水印的档案数据库安全策略研究[J].情报科学,2010,2:271-273.
    [37]倪永军,苏国庆,周必水.数字水印技术在移动电子政务中的应用[J].电子政务,2008,3-4:106-108.
    [38]陈身洪.电子政务信息安全问题的探析[J].知识窗,2011,1:80.
    [39]刘小勇.数字水印发展的历史与发展前景[J].计算机光盘与软件,2010,7:101-102.
    [40]百度百科.文档透明加密http://www.hackdos.com/Article/1/11/html/7650_2.html.
    [41]Hunnish.数字水印和多媒体信息安全的研究背景及其意义.2005,3.
    [42]GOOGLE.关于数字签名在电子政务中的应用情况http://www.google.com.2011
    [43]邓晓军.PKI技术及其应用分析[J].计算机技术与发展,2008,6:144-146.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700