文本载体信息隐藏及相关技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术发展和应用的不断深入,信息安全越来越被世界各国所重视。信息隐藏技术是近年来信息安全领域的一个研究热点,它在数字媒体的版权保护,隐蔽通信等都有着广泛的应用。信息隐藏的两个主要技术分支即信息伪装和数字水印,其中信息伪装技术通过隐藏通信过程的存在来获得通信的安全性。
     信息隐藏的载体主要包括图像、视频、文本、音频等等,其中文本载体作为信息隐藏的一种重要载体类型,在人们工作生活中扮演着越来越重要的角色,文本载体中的产权保护、内容验证等安全问题也已成为人们必须考虑的重要问题。本文对文本载体信息隐藏以及隐写分析等相关技术进行了比较详细的研究与实践,主要研究内容和创新点如下:
     1.对文本载体的概念、范畴等做了阐释,明确文本载体信息隐藏的研究方向和内容,即文本信息隐藏和文本图像信息隐藏,对文本结构、冗余性、隐藏安全性做了理论的分析,建立了文本信息隐藏的理论基础。
     2.总结和分析了TXT、WORD、PDF等几种常见办公格式文本,以及HTML、XML、CSS、XSL等几种基于Web应用格式文本信息隐藏的各种方法,同时深入剖析这些文件的结构特点、冗余特性。
     3.针对WORD信息隐藏的特点,提出了一种基于字体缩放技术的WORD信息隐藏方法,该方法对WORD字体缩放比例进行编码,实现了单个字符嵌入3比特信息容量,并对秘密消息采用混沌序列加密,增强了算法的安全性。同时对实现WORD信息隐藏的两种方式即VBA技术和VC的Office自动化技术,从时间代价、难易程度等方面做了分析对比。
     4.将基于Web应用的文本载体信息隐藏作为重要的研究内容。利用级联样式表(CSS)文件描述RGB颜色值的不同编写方法,提出了基于颜色名称的CSS信息隐藏方法;根据CSS文本结构和规则编写方式,提出了基于规则结构的CSS信息隐藏方法,该算法在分析CSS规则编写特点基础上,从数学模型上建立CSS等价规则的多种定义,推导出相应的定理和推论,以此设计出基于CSS等价规则的嵌入和提取算法,实验结果表明该算法具有很高的嵌入容量和安全性;利用XML文本的结构特点和XSL转换XML过程中的方法特点,提出了基于XML查询重写的信息隐藏算法,该算法建立了路径查询自动机,利用修改XML路径查询结果,制定嵌入秘密消息与查询重写的相应规则,来实现信息隐藏。
     5.在详细分析了两种具有代表性的二值文本图像嵌入算法的优点和问题基础上,提出了一种新的基于分块的二值文本图像信息隐藏算法。该算法先对图像做分块处理,计算图像块特征值,选择视觉效果好的块作为嵌入的图像块,嵌入采用一种大容量的嵌入方法,对嵌入过程中存在的多个像素翻转选择,利用像素可翻转标准来做最优判定。实验结果表明该算法既提高了单个图像块中的嵌入容量,又保持了良好的视觉效果。
     6.分析了已有的二值文本图像隐写分析研究成果,对二值文本图像隐写分析做了有益的探索,提出了基于模式分析的二值文本图像隐写分析算法。算法提出了二值图像“模式”的概念,按照人体视觉的影响程度,将图像模式分成三类,建立了二值图像嵌入位置模式库,通过统计分析二值文本图像的模式在嵌入信息前后的变化特征,提出了基于模式分析的二值文本图像隐写分析算法,实验也证明该算法是一种性能较佳的检测算法。
     文章的最后,对本文工作进行了总结,并对文本载体信息隐藏及相关技术指出了研究方向。
With the further development and application for information technique, information security has been absorbing much more attention by every country in the world. Information hiding has become a hot interest area in the research of information security, which has wide applications in many fields such as copyright protection of digital media, hidden communication. Steganography and watermarking are two main sub-disciplines of information hiding. Steganography is the art and science of communicating in a way which hides the existence of the communication.
     The carriers of information hiding mainly include image, video, text, audio and so on. Text carrier is acting as a more and more important role in people’s work and life, which is a very important carrier type in the information hiding. The property right protection and content validation of text carrier have been considered significant by people. Detailed researches and practice are completed in this paper on text carrier information hiding, steganalysis and other correlated techniques. The main works and creations are as follows:
     1. The conception and category of text carrier is explainded. The research direction of text carrier information hiding is oriented . The structure, redundancy and hiding security for text carrier are analyzed in theory, and the theoretical base of text carrier is founded.
     2. Some normal text carriers such as TXT, WORD, PDF, and other text carriers based on Web application for information hiding such as HTML, XML. CSS and XSL are summarized and analyzed. The structure and redundancy characteristics are deeply anatomized for those documents.
     3. A new information hiding algorithm based on font zooming for WORD is proposed. The algorithm coding for the scaling of WORD font, could embed 3 bits in each character. The algorithm increases the security from chaos sequence encryption for secret message. We made analysis comparison to the two ways of achieving information hiding for WORD, such as VBA and Office Automation technique for VC, by the side of time cost, difficulty extent etc.
     4. We take the information hiding for text carrier based on Web application as an important research content. A CSS(Cascading Style Sheet) information hiding algorithm based on color name is proposed, using the different compiling methods of describing RGB color for CSS document. A new CSS information hiding algorithm based on rule structure is proposed, according to CSS document structure and rule compiling mode. Some definitions about CSS equivalence rule are founded, some corresponding theorems and deductions are deduced on the basis of mathematics model, thus the embedding and extracting arithmetics are worked out, and the experimental results indicate this information hiding algorithm has quite large embedding capacity and security. A type of information hiding algorithm based on XML query rewriting is proposed, according to the structure characteristic of XML document and the XML translating method characteristic by XSL. The path query automaton is founded, and we constitute the rules between embedding message and query rewriting to achieve information hiding by modifying path query results for XML.
     5. A new information hiding algorithm based on partitioned for binary text image is proposed, on the basis of analyzing the virtues and questions of two representational embedding algorithm for binary text image in detail. The algorithm partition image into blocks firstly, then calculate the characteristic value for each image blocks, and choose fine vision image blocks as embedding blocks. The embedding method adopt a great capacity embedding method, utilizing pixel flippability criterion to determine the best flipping pixel where have several pixel flipping lacations to choose. The experimental results indicate this algorithm could not only increase capacity in each image block, but also preserve fine vision effect.
     6. Some beneficial explores are done about steganalysis for binary text image, a steganalysis algorithm based on pattern analysis for binary text images is proposed on the bases of analyzing existent research achievements. The“pattern”conception for binary image is put forward in the algorithm, and classify the patterns into three categories according to human vision extent, thus establish an embedding location pattern storeroom. The steganalysis algorithm based on pattern analysis is proposed based on statistic analyzing the changing characteristics of the patterns for binary text images before and after embedding messages. The experimental results indicate this algorithm is a fine detection algorithm.
     Finally, we summarize our research work, and indicate the research directions of information hiding and correlated techniques for text carrier.
引文
[1] R.J. Anderson ed. Proceedings of the 1st International Workshop on Information Hiding[C], LNCS 1174, Cambridge, U.K., May 30-June 1, 1996.
    [2] F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information Hiding-A Survey[C]. Proceedings of the IEEE, special issue on protection of multimedia content, July 1999, 87(7):1062-1078.
    [3] S. Katzenbeisser, F. A. P. Petitcolas编,吴秋新,钮心忻,杨义先等译.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社, 2001.
    [4] Department of Computer and Information Science, National Chiao Tung University. Steganography[EB/OL], http://debut.cis.nctu.edu.tw/Research/Steganography/steganography.htm
    [5] Duncan Sellars. An Introduction to Steganography. http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.ps.gz
    [6] Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding-a survey, Proceedings of the IEEE[C], 1999, 87(7):1062~1078.
    [7] Stefan Katzenbeisser, F.A.P.Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking[M], Artech House, Inc., 2000.
    [8] E.H.Wilkins, A History of Italia Literature[M], London: Geoffrey Cumberlege, Oxford University Press, 1954.
    [9]钮心忻.信息隐藏与数字水印[M].北京邮电大学出版社,2004.
    [10] D.Brewster,“Microscope”, in Encyclopedia Britannica or the Dictionary of Arts, Sciences, and General Literature[J], vol. XIV, Edinburgh, IX-Application of photography to the microscope, pp.801~802,8th ed.,1857.
    [11] B.Newman, Secrets of German Espionage[M]. London: Robert Hale Ltd,1940.
    [12]张涛.图像隐写分析技术研究[D].郑州:信息工程大学博士学位论文, 2003.11.
    [13] B. W. Lampson. A note on confinement problem[J]. Communications of the ACM, Oct. 1973, 16(10):613-615.
    [14]杨义先,钮心忻等.数字水印理论与技术[M].高等教育出版社,2006.
    [15] C. Kurak, J. McHugh. A cautionary note on image downgrading[C], In Proceedings of the 8th IEEE Annual Computer Science vol. 1525, Portland, Oregon, USA, April 14-17,1998. [ 16 ] K.Tanaka, Y.Nakamura, K.Matsui. Embedding secret information into a dithered multilevel image[C]. Proceeding of IEEE Military Communication Conference, 1990: 216-220.
    [17] David Aucsmith ed., Proceedings of the 2nd International Workshop on Information Hiding[C], Lecture Notes on Computer Science, LCNS 1525,Springer-Verlog, Portland, Oregon, USA, April 14-17, 1998.
    [18] Andreas Pfitzmann ed., Proceedings of the 3rd International Workshop on Information Hiding[C], Lecture Notes on Computer Science, vol.1768, Dresden, Germany, Sept.29-Oct.1, 1999.
    [19] Ira S. Moskowitz ed., Proceedings of the 4th International Workshop on Information Hiding[C], Lecture Notes on Computer Science, vol.2137, Pittsburgh, PA, USA, April 25-27, 2001.
    [20] F.A.P.Petitcolas ed., Proceedings of the 5th International Workshop on Information Hiding[C], Lecture Notes on Computer Science, vol.2578, NoordWijkerhout, The Netherlands, Oct.7-9, 2002.
    [21] J.Fridrich, Proceedings of the 6th International Workshop on Information Hiding[C], Lecture Notes on Computer Science, vol.3200, Toronto, Canada, May 23-25, 2004.
    [22] M.Barni, J.Herrera Joancomartí, S.Katzenbeisser, F.Pérez-González(Eds), Proceedings of the 7th International Workshop on Information Hiding[C], Lecture Notes on Computer Science, vol.3727, Barcelona, Spain, June 6-8, 2005.
    [23]会议网站, 2006, http://ih2006.jjtc.com.
    [24]会议网站, 2007, http://ih07.irisa.fr/ih07/Home.html.
    [25] IEEE PROCEEDINGS OF THE IEEE, Special Issue on Identification and Protection of Multimedia Information[C], Volume 87, No.7, July 1999.
    [26] IEEE Communication Society, IEEE Journal on Selected Areas in Communications, Special Issue on Copyright & Privacy Protection[J], 16(4), May 1998. [ 27 ] IEEE Communication Society, Magazine of IEEE Multimedia, Special Issue on Multimedia and Security[J], 8(4), Oct-Nov., 2001.
    [28] IEEE Signal Processing Society, IEEE Transaction on Signal Processing. Special Issur on Signal Processing for Data Hiding in Digital Media & Secure Content Delivery[J], 51(4), April, 2003.
    [29] Wai-Chi Fang, Jeng-Shyang Pan, Chin-Shieh, and Hsiang-Chen Huang(Eds.), Proceedings of the 2nd International conference on Intelligent Information Hiding and Multimedia Signal Processing[C], IEEE Computer Society, 18-20 December 2006.
    [30] Jana Dittmann, Klara Nahrstedt, Petra Wohlmacher eds., Proceedings of Multimedia and Security Workshop at ACM International Multimedia Conference’99[C], Orlando, Florida, USA, Oct.30-Nov.5, 1999.
    [31] Ping Wah Wong, Edward J. Delp eds., Security and Watermarking of Multimedia Contents[J], II, III, IV, V, SPIE Vol.3657, Vol.3971, Vol.4314, Vol.4675, Vol.5020, April 1999-Aprial 2003, SPIE.
    [32] EURASIP Journal, Signal Processing, Special Issue on watermarking[J], Vol.66, Issue 3, 28 May 1998.
    [33] EURASIP Journal, Signal Processing, Special section on Information theoretic aspects of digital watermarking[J], Vol.81, Issue 6, June 2001.
    [34] EURASIP Journal, Applied Signal Processing[J], Vol.2002, No.2. Special Issue on Emerging Applications of Multimedia Data Hiding, February 2002.
    [35] EURASIP Journal, Signal Processing, Special Issur on Security of Data Hiding Technologies[J]. Elsevier Science, 2003.
    [36] CIHW2000/2001论文集[C],西安电子科技大学出版社,2001年9月.
    [37] CIHW2002论文集[C],机械工业出版社,2002年8月.
    [38] CIHW2004论文集[C],中山大学学报,2004增刊(2),Vol.43,2004年11月.
    [39] CIHW2006论文集[C],哈尔滨工业大学学报,2006年增刊,Vol.38,2006年8月.
    [40] CIHW2007论文集[C],东南大学学报(自然科学版),2007年增刊(I),Vol.37,2007年9月.
    [41] R.J.Anderson, F.A.Petitcolas. On The Limits of Steganography[J]. IEEE Journal of Selected Areas in Communications. 16(4), pp:474-481, May 1998.
    [42] J.R.Hemandez,J-F.Delaigle,B.M.M.Macq.Improving Data Hiding by Using Convolutional Codes and Soft-Decision Decoding[C]. Proc. SPIE, Vol.3971. San Diego,CA. Jan. 2000.
    [43] Brian Chen, Gregory W. Womell. An Information-Theoretic Approach To The Design of Robust Digital Watermarking Systems[C]. Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 1999 (ICASSP-99), Special Session on Steganography: Information Embedding, Digital Watermarking, and Data Hiding, vol. 4, Phoenix, AZ, pp. 2061-2064, Mar. 1999.
    [44] Jonathan K.Su, Joachim J.Eggers, Bemd Girod. Capacity of Digital Watermarks Subjected To An Optimal Collusion Atack[C]. European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, September 2000.
    [45] Ira S.Moskowitz, Garth E.Longdon, Li Wu Chang. A New Paradigm in Steganography[C]. Proceedings, New Security Paradigms Workshop. pp:41-50, Sept. 2000.
    [46] Sviatoslav Voloshynovskiy, Frederic Deguillaume, Shelby Pereira, Thierry Pun. Optimal Adaptive Diversity Watermarking With Channel State Estimation[J]. In SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents Ill, No. paper 4314-74, San Jose, CA, USA, January 21-26 2001.
    [47] Piere Moulin, Aleksandar Ivanovic. The Watemlark Selection Game[C]. Proc. Conf on Info. Sciences and Systems. Baltimore, MD, March 2001.
    [48] Pierre Moulin, M.Kivanc Mihcak. The Parallel-Gaussian Watermarking Game[C]. Proc. 35th Conf. On Information Science and Systems, Baltimore, MD, March 2001.
    [49] Jonathan K. Su, Joachim J. Eggers, Bemd Girod. Illustration of The Duality Between Channel Coding and Rate Distortion with Side Information[C]. 34th Asilomar Conf. Signal, Systems, Computers. Asilomar,CA,USA, Oct.29-Nov.1,2000.
    [50] StegoDos– Black Wolf’s Picture Encoder v0.90B[EB/OL]. . ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip.
    [51] A. Brown. S-Tools for Windows[EB/OL]. . ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip, 1996.
    [52] R.G. van Schyndel, A. Z. Tirkel, C. F. Osborne. A digital watermark[C]. Proceedings of IEEE International Conference on Image Processing, Vol.2, Austin, Texas, USA, 1994:86-90.
    [53] T.Aura. Invisible Communication. EET 1995, Technical Report[EB/OL]. Helsinki University of Technology, Finland, Nov. 1995. http://deadlock.hut.fi/ste/ste_html.html.
    [54] Y K Lee, L Chen. High Capacity Image Steganographic Model[C]. IEE Proceedings Vision, Image and Signal Processing. Vol.147, Issue 3, June 2000:288-294.
    [55] E. Kawaguchi, R. O. Eason. Principle and applications of BPCS-Steganography[C]. Proceedings of SPIE, Multimedia Systems and Applications, Vol. 3528, 1998:464-473.
    [56] H Hirohisa. A data embedding method using BPCS principle with new complexity measures[C]. Proc. of Pacific Rim Workshop on Digital Steganography, Jul. 2002:30-47. [ 57 ]柳葆芳,平西建,邓宇虹.基于融合的数据隐藏算法[J] .电子学报, 2001, 29(11):1445-1448.
    [58] M. D. Swanson, B. Zhu, A. H. Tewfik. Data Hiding for Video-in-Video[C]. Proceedings of International Conference on Image Proceeding, Vol. II, Santa Barbara. Oct., 1997: 676-679.
    [59] M. Ramkumar, A. N. Akansu, A. A. Alatan. A Robust Data Hiding Scheme for Images Using DFT[C]. Proceedings of IEEE International Conference on Image Processing, Kobe, JAPAN,Vol. II, 1999:211-215.
    [60] N. Kaewkamnerd, K. R. Rao. Wavelet based image adaptive watermarking scheme[J]. Electronics Letters, 36(4):312-31317, Feb.2000.
    [61] I. J. Cox, J. Kilian, T. Leighton, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 6(12): 1673-1687,1997.
    [62] L. M. Marvel, C. G. Boncelet, Jr., et al. Spread spectrum image steganography[J]. IEEE Transactions on Image Processing, August, 8(8):1075-1083,1999.
    [63] R Z Liu, T N Tan. An SVD-based watermarking scheme for protecting rightful ownership[J]. IEEE Transactions on Multimedia, Vol. 4, No. 1, March, 2002:121-128.
    [64] D. Yu, F. Sattar. Robust image watermarking based on independent component analysis[C]. IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Vol. IV, 2002: IV/4177.
    [65] J. J. Chae, B. S. Manjunath. A technique for image data hiding and reconstruction without host image[C]. Proceedings of SPIE Vol. 3657, Security and Watermarking of Multimedia Contents, 1999:386-396.
    [66]杨秀清,马红卫,顾新,杨世勇.信息隐藏技术的应用展望[J].信息安全与通信保密,pp:16-18,21,2006年8期.
    [67]杨秀清,王群.信息隐藏技术的应用展望(上)[J].数字通信世界,pp:56-58,2006年6期.
    [68]杨秀清,王群.信息隐藏技术的应用展望(下)[J].数字通信世界,pp:72-74,2006年7期.
    [69] Greg Kipper.Investigator’s Guide to Steganography[M], U.S.:Auerbach Publications,2004.
    [70] G.Schott, Schola StegaNographica:In Classes Octo Distributa(Whipple Collection)[M]. Cambridge, U.K.:Cambridge Univ, 1680.
    [71] E L.Baner, Decrypted Secrets-Methods and Maxims of Cryp-tology[J].Berlin, Heidelberg, Germany:Springer-Verlag, 1997.
    [72] The texthide(version1.0)software. http://www.compris.com[EB/OL].
    [73]王冰,张仲选.基于载体信息值比较的信息隐藏方法[J].西北大学学报(自然科学版), 2004,34(4).
    [74] Brassil J T, Low S H, Maxemchuk, L.N.F.&O’Gorman, 1994:Electronic Marking and Identification Techniques to Discourage Document Copying[C], in Procceddings of IEE INFOCOM’94, Toronto, Canada, pp:1278-1287,1994.
    [75]杨洁,张瑞敏.基于行移和字移编码的二值文本数字水印技术[J].西安邮电学院学报,11卷3期,pp:101-105,2006年.
    [76]舒后,何薇,齐亚莉.文本数字水印技术研究[J].北京印刷学院学报,2006年14卷1期,pp:24-28.
    [77]曹卫兵,戴冠中等.基于文本的信息隐藏[J].计算机应用研究,2003年第10期,pp:39-41.
    [78]李丽娟,熊淑华.基于文本的信息隐藏技术研究[J].现代电子技术,2006年29卷5期,pp: 67-69,75.
    [79]陈芳,王冰.基于文本字体的信息隐藏算法[J].计算机技术与发展,2006年16卷1期,pp: 20-22.
    [80]唐承亮,肖海清,向华政.基于文字RGB颜色变化的脆弱性文本数字水印技术[J].计算机工程与应用,2005年41卷,36期,pp: 6-8.
    [81]刘豪,孙星明,刘晋飚.基于字体颜色的文本数字水印算法[J].计算机工程,2005年31卷15期,pp:129-131.
    [82]巩晓婷,陈建华.基于文本颜色的信息隐藏技术[J].福建电脑,2005年9期,pp:9-10.
    [83]陈振,陈建华.基于Word文本颜色的信息隐藏方法[J].福建电脑,2006年2期,pp:41-42.
    [84]刘玉玲,孙星明.通过改变文字大小在Word文档中加载数字水印的设计与实现[J].计算机工程与应用,2005年41卷12期,pp:110-112.
    [85]吴颖斌,王春红,乔超.基于文本的信息隐藏技术[J].现代计算机,下半月版,2006年6期,pp: 79-81.
    [86]胡晶晶,孙星明.基于单词间字符统计特征的文本数字水印[J].计算机工程,2005年31卷,23期,pp: 116-118.
    [87]李向辉,钟诚.提高Word文本文档信息隐藏容量的方法研究[J].计算机技术与发展,2006年16卷9期,pp: 97-99.
    [88]王海春,邱寄帆,邱敦国.一种基于Word文档的数字密写设计与实现[J].微计算机信息,2006年10期,pp: 47-48,268.
    [89] M.Chapman, G. David. A software system for concealing ciphertext as innocuous text[C]. ICICS’97 International Conference on Information and Communications Security, pp: 335-345. Beijing,China, 1997.
    [90] P.Wayner, Mimic Function, Cryptlogia, XVI-3, pp:193-214, July 1992.
    [91] P.Wayner, Strong technical steganography, Cryptlogia, XIX-3, pp:285-299, July 1995.
    [92] V.Raskin, M.Atallah, C.McDonough, and S.Nirenburg. Natural language processing for information assurance and security: an overview and implementation[C]. In Proceedings of the New Security Paradigms Workshop, pp:51-65, Ballycotton, Ireland, September 2000.
    [93] A.Essam,EI-Kwae aand Li Cheng, HIT:A new approach for hiding multimedia information in text[C]. Security and watermarking of multimedia contents IV, Proceeding of SPIE Vol.4675, pp: 132-140, 2000.
    [94] Compris[company], 2007:Textsign[EB/OL], http://www.compris.com/TextSign/.
    [95] Compris[company], 2007:TextHide[EB/OL], http://www.compris.com/ TextHide/en/.
    [96] K.Marsui, K Tanaka. Video-steganography:how to secretly embed a signature in a picture[P]. IMA Intellectual Property Project,l(1):l87-206, 1994.
    [97] Brassil J T, Low S H, Maxemchuk N F, Copyright Protection for the Electronic Distribution of Text Documents[J]. Proc of IEEE,l 999,87: 1181-l196.
    [98] Low S H, Maxemchuk N F, Lapone A M. Document identification for copyright protection using centroid detection[J]. IEEE Trans on Comm, 1998, 46(3):372-83.
    [99] Low S H, Maxemchuk N F, Brassil J T et a1. Document marking and identification using both line and word shifting[C]. In:Infocom 95, IEEE, Computer Society Press, 1995.
    [100] Maxemchuk N F, Low S H. Marking text documents[J]. Proc IEEE Int Conf On Image Processing, 1997.
    [101] N.Chotikakamthom. Electronic Document Data Hiding Technique Using Inter-Character space[J], IEEE, 1998.
    [102] N.Chotikakamthorn. Document image data hiding techniques using character spacing with sequence coding[J].IEEE Int Conf Image Processing,1999.
    [103]白剑,杨榆,徐迎晖等.基于文本的信息隐藏算法[J].计算机系统应用.2005(4):32-35.
    [104] Lu H,Shi X,Shi Y Q,et a1.Watermark embedding in DC components of DCT for binary imges[C].Proc IEEE Int Workshop on Mul-timedia Signal Processing,US Virgin Islands, pp:300-303, 2002.
    [105]王慧琴,李人厚.二值文本数字水印技术的研究与仿真[J].系统仿真学报,2004,16(3):521-524.
    [106]李丽娟,熊淑桦.基于文本的信息隐藏技术研究[J].现代电子技术,2006(5):67-70.
    [107] Bayer B E. An optimum method for two-color rendition of continuous-tone pictures[C]. 9th Proc IEEE Int Conf Commun, 1973, pp:2611-2615.
    [108] Flo Yd R W, Steinberg. Adaptive algorithm for spatial gray scale[C]. Proc SID Int Symp Tech Papers, 1975, pp:36-37.
    [109] Fu M S,Au O C.Data hiding for halftone images[J].SPIE Conf on Security and Watermarking of Multimedia Contents II.2000.3971:228-236.
    [110] Fu M S,Au O C.Improved halftone images data hiding with intensity selection[C].IEEE Intemational Symposium on Circuits and Systems,2001(5):243-246.
    [111]张冠男,王树勋,温泉.一种基于随机误差分散技术的半色调水印方法[J].吉林大学学报(工学版),2004,34(4):639-643.
    [112] Wang H S A.Data hiding techniques for printed binary images[C].The Intemational Conference on Information Technology:Coding and Computing, 2001:2-4.
    [113] Baharav Z,Shaked D.Waterm arking of dither halftoned images[J].SPIE Security and Waterm arking of Multimedia Contents,1999(1):307-3l3.
    [114] Chen J,Chen T-Sh.A novel data embedding method for two-color facsimile images[C] . Proceedings of International Symposium on Multimedia Information Processing,Chung-Li,Taiwan,1998.
    [115] Pan G,Wu Y,Wu Z.A novel data hiding method for two color imges[J].Computer Science Information and Communication Security , Springer-Vertag, pp:261-270, Nov.2001.
    [116]刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方案[J].东南大学学报(自然科学版),2003.33(增刊).
    [117] Wu M,Tang E,Liu B.Data Hiding in digital binary images[C].IEEE Int’1 Conf on Multimedia and Expo,2000.
    [118] Tseng Y,Pan H K.Secure and invisible data hiding in 2-color images[C].IEEE Symposium on Computers and Communications,2000.
    [119] Pan H K,Chen Y Y,Tseng Y C.A secure data hiding scheme for two-color images[C].IEEE Symposium on Computer and Communications,2000.
    [120] KOCH E, ZHAO J. Embedding robust labels into images for copyright protection[J], International Congress on Intellectual Property Rights for Specializied Information,1995. [ 121 ] Yang H, Alex C. Data Hiding for text document image authentication by connectivity-preserving[J].IEEE: 505-508, 2005.
    [122]傅祖芸.信息论-基础理论与应用[M].电子工业出版社,pp:63,2005年.
    [123] P Moulin,Joseph A O’Sullivan. Information-Theoretic Analysis of Information Hiding[J].IEEE Trans on Information Theory,2003,49(3): 563-593.
    [124] CACHIN C.An information-theoretic model for steganography[C].Information Hiding:Second Intenaioml Workshop,vo1.1525 of lecture Notes in Computer Science,Portland,Oregon,U.S.A.Berlin:Spfinger-Verlag,1998.
    [125]林代茂,胡岚,郭云彪,周琳娜.广义信息隐藏技术的机理与模型[J].北京邮电大学学报.,第28卷第1期,pp: 1-5,2005年2月.
    [126]林代茂,胡岚,郭云彪,周琳娜.广义信息隐藏技术的安全问题[J].第五届全国信息隐藏研讨会,中山大学学报,第43卷增刊第A02期,pp: 14-16,2004年11月.
    [127] dolami.文本的四种编码方式[J].软件杂志,pp: 45,2002年第11期.
    [128]鹿文鹏,薛若娟.Unicode与UTF-8编码转换方法研究[J].计算机时代,2005年第九期,pp: 44-45.
    [129] Mark Chapman, George I. Davida, and Marc Rennhard, A practical and effective approach to large-scale automated linguistic steganography[J], ISC2001, LNCS2200,Springer-Verlag, Berlin Heidelberg, pp: 156-165.
    [130] Mark Chapman, George I. Davida, Plausible Deniability Using Automated Linguistic Steganogtaphy[J], Lecture Notes in Coputer Science, Vol.2437, Oct.1-3, 2002, Springer-Verlag, Berlin Heidelberg, pp: 276-287.
    [131] Nicetext home page[EB/OL], 2002, http://www.nicetext.com/nicetext/index.html.
    [132] Bailer, W., 2001: webStego Steganography Tool[EB/OL], http://www.wbailer.com/wbstego.
    [133] neobyte solutions, 2003: InvisibleSecrets[web page][EB/OL], http://www. invisiblesecrets.com.
    [134] Steganos, 2003: SteganosII [web page] [EB/OL], http://www. steganos.com.
    [135] Matthew Kwan, 2001: Snow [web page] [EB/OL], http://www.darkside.com.au/snow.
    [136] Brian Murphy, Syntactic Information Hiding in Plain Text[J]. Masters Thesis, CLCS, Trinity College Dublin, 2001.
    [137]胡岚,尤新刚.现有的超文本信息隐藏技术分析[C].CIHW2002论文集,西安电子科技大学出版社,pp:62-67,2001年.
    [138]白剑,徐迎辉等.利用文本载体的信息隐藏算法研究[J].计算机应用研究,pp:147-148,2004年第12期.
    [139]赵敏之,孙星明,向华政.基于虚词变换的自然语言信息隐藏算法研究[J].计算机工程与应用,pp:158-160,2006年第3期.
    [140]赵敏之,孙星明,向华政.基于不完整语义理解的文本数字水印算法研究[J].计算机应用研究,2006年23卷6期:118-120.
    [141]肖海清,伊美林.基于不完整语义理解的文本数字水印[J].吉首大学学报:自然科学版,2006年27卷1期:27-31,42.
    [142] Mikhai, Atallah J, Victor Raskin, Michael Crogan, et al. Natural language watermarking: Design, analysis, and a proof-of-concept implementation[C]. Pittsburgh: 4th International Information Hiding Workship, 2001: 185-199. [ 143 ] Mikhai, Atallah J, Victor Raskin, Christian F Hempehnann. Natural language watermarking and tamper proofing[C]. Berlin: 5th International information Hiding Workshop, 2002: 196-212.
    [144]刘玉玲,孙星明,甘灿.抗检测的中文文本信息隐藏算法研究[C].Proc.of CIHW2006,哈尔滨工业大学学报,第38卷,增刊,pp:773-775,779,2006年7月.
    [145] http://premium.microsoft.com/msdn/library/Microsoft word 97 binary file format.htm[EB/OL].
    [146] Rafael C. Gonzalez, Richard E. Woods等著,阮秋琦,阮宇智等译.数字图像处理(第二版)[M].北京:电子工业出版社,2003.3.
    [147]刘豪,孙星明,刘晋飚.基于字体颜色的文本数字水印算法[J].计算机工程,Vol.31,No.15,pp: 129-131,2005年8月.
    [148]陈萍,郭水旺,陈华丽.基于字体颜色的文本信息隐藏算法[J].科学技术与工程,Vo1.7,No.14, pp:3544-3546,2007年7月.
    [149]欧浪,孙星明,刘玉玲.基于字符亮度的自适应文本信息隐藏算法[J].计算机应用研究,Vo1.24,No.5,pp:130-132,2005年5月.
    [150] Paul Lormax.VB与VBA技术手册[M].北京:中国电力出版社,2002年.
    [151] Microsoft. Microsoft Office 2000/Visual Basic Programmer's Guide[M]. Microsoft Press, 2000.
    [152]周鸣杨.Visual C++界面编程技术[M].北京:北京希望电子出版社,2003年2月.
    [153]顾兆军,张俊.PDF文件链接信息提取与修改[J].计算机工程,Vol.31,2005年.
    [154] Adobe Systems Incorporated.PDF Refefence Fifth Edition[EB/OL].http://partners.adobe.com/public/developer/en/pdf/PDFReference 16.pdf.2005.10.27.
    [155]钟尚平,陈铁睿.基于PDF文档作为掩体的信息隐写方法[J].计算机工程,Vol.32, No.3,2006年2月.
    [156]刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法[J].计算机工程,Vol.32, No.17,2006年9月.
    [157]毕强,杨达,刘甲学,宋绍成.超文本信息组织技术[J].科学技术文献出版社,2004年6月.
    [158]超文本标记语言简明导引[EB/OL],http://game88.myetang.com/study/html/html0.htm.
    [159]朱颖.解析HTML的增强超文本标记[EB/OL].http://tech.sina.com.cn,2000.11.17.
    [160]顾流,万仲保,石红芹.基于Web页信息隐藏的研究与实现[J].微计算机信息,2006年08期:186-187,87.
    [161]龙银香.基于HTML标记的信息隐藏方法[J].微计算机信息,2006年07期:129-131.
    [162]灯芯工作室.用XML轻松开发Web网站[M].北京:北京希望电子出版社,2001年2月.
    [163] Shingo, Kyoko MAKINO, Ichiro MURASE, Osamu TAKIZAWA, A proposal on information hiding methods using XML[J], Kyoko MAKINO, Shingo Inoue Osamu Takizawa Osamu Takizawa,2003,12(06): 1-2.
    [164] Takizawa.Yamanura, Nakagawa, etal., A proposal of steganography on plain text and XML[C]. the 7th annual meeting of the association for natural language processing, C2-4, pp: 135-138,Mar.2001.
    [165]吴晶,王文书.XML中的信息隐藏[J].西北民族大学学报:自然科学版,2005年26卷1期:72-76,80.
    [166]吴晶,王文书.基于XML语言的信息隐藏方法[J].中国安全科学学报,2005年15卷12期:78-80.
    [167] Kynm Bartlett著,周哲,和亲玉等译.CSS入门经典(第2版)[M].北京:人民邮电出版社,2007年3月.
    [168]威廉·费勒著,胡迪鹤译.概率论及其应用(第3版)[M].北京:人民邮电出版社,2006年5月.
    [169] KhunYeeFung著,汉扬天地科技发展有限公司译.XSLT精要:从XML到HTML[M].北京:清华大学出版社,2002年10月.
    [170] David GrossAmblard,Querypreserving Watermarking of Relational Databases and XML Documents [J],ACM, PODS 2003, June 912, San Diego, CA, 2003.
    [171] R. Agrawal and J. Kiernan. Watermarking Relational Databases[C]. In International Conference on Very Large Databases (VLDB), 2002.
    [172] G. Wolfe, J. L. Wong, and M. Potkonjak.Watermarking graph partitioning solutions[J]. In DAC,pp: 486-489, 2001.
    [173] T. Milo, D. Suciu, and V. Vianu. Typechecking for XML Transformers[C]. In Symposium on Principles of Databases Systems (PODS), 2000.
    [174] S. Khanna and F. Zane. Watermarking maps: hiding information in structured data[C]. In Symposium on Discrete Algorithms (SODA), 2000.
    [175] L. Libkin and L. Wong. On the power of aggregation in relational query languages[J]. In Database Programming Languages (DBPL'97), Springer LNCS 1369, pp:260-280, 1997.
    [176]高军,唐世渭,杨冬青,王腾蛟.半结构化数据查询重写[J].计算机研究与发展第39卷第2期,pp: 165-171,2002年2月.
    [177] Chung C,Min J,Shim K.APEX:An adaptive path index for XML data[C]//Frank1in M J,Moon B,Ailamaki A eds.Proceedings of the 2002 ACM SIGM OD Internationa1 Conference on Managem ent of Data.M adison,W isconsin,USA,2002:121-132.
    [178] A.Bonifati, S.Ceri. Comparative analysis of five XML query languages[J].SIGMOD Record,2000.29(1):68-79.
    [179]孙即祥等著.现代模式识别[M],长沙:国防科技大学出版社,2002年1月.
    [180] F. Neven and T. Schwentick. Query automata on finite trees[J]. Theoretical Computer Science, 275, pp: 633-674, 2002.
    [181] Y Lin, J. Mant, E. Wong, S. Low. Marking and Detection of Text Documents Using Transform-Domain Techniques[C]. IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, SPIE 1999, vol.3657, pp:317-327.
    [182]周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,第25卷第12期,pp:97-101,2004年12月.
    [183]罗纲,孙星明,刘玉玲.基于噪声检测的文本隐藏信息检测算法研究[J].湖南大学学报,第32卷第6期,pp:181-184,2005年12月.
    [184] A.Westfeld: Detection low embedding rates[C]. In: Proc.Information Hiding Workshop. Spinger LNCS 2578, pp: 324-339, 2005.
    [185] J.Fridrich, R.Du, and L.Meng, Steganalysis of LSB Encoding in Color Images[C].In: Proc.IEEE International Conference on Multimedia and Expo, New York, vol.3, pp: 1279-1282, July 2000.
    [186] J.Fridrich, M.Goljan,and R.Du, Detecting LSB Steganalysis in Color and Gray-Scale Images[J]. Magazine of IEEE Multimedia Special Issue on Security, 10:22-28, 2001.
    [187] J.Fridrich, M.Goljan, On Estimation of Secret Message Length in LSB Steganography in Spatial Domain[J]. Proc.EI SPIE, San Jose, CA, 2004.
    [188] Sorina Dumitrescu, Xiaolin Wu, and Zhe Wang, Detection of LSB Steganography via Sample Pair Analysis[J], IEEE Transaction on Signal Processing,vol.51, No.7,pp:1995-2007, July 2003. [ 189 ] N.Provos, Defending Against Statistical Steganalysis[C],10th USENIX Security Symposium, Washington.DC,pp:323-335,2001.
    [190] Westfeld A., Pfitzmann A., Attacks on steganographic systems[C], In: Pfitzmann A.ed.Proc. of 3rd International Workshop on Information Hiding, Lecture Notes on Computer Science 1768, Berlin:Springer-Verlag, pp:61-76,1999. [ 191 ] Neil F.Johnson,Sushil Jajodia, Steganalysis of Images Created Using Current Steganography Software[C], Proc. of 2nd Information Hiding Workshop, LNCS,Vol.1525,Springer-Verlag, 1998.
    [192] M.Jiang, X.Wu, E.K.Wong, and N.Memon, Steganalysis of boundary-based steganography using autoregressive model of digital boundaries[C], in IEEE ICME 2004, vol.2, pp:883-886, June 2004.
    [193] X.Yu,Y.Wang,and T.Tan, Steganalysis of Data Hiding in Binary Images[C], in IEEE ICPR 2004, vol.4, pp:877-880, August 2004.
    [194] Q.Mei,E.K.Wong,and N.Memon, Data hiding in binary text documents[C], SPIE Proc. Security and Watermarking of Multimedia Contents III, August 2001, pp:369-375.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700