基于信息隐藏技术的电子文档密级标识的算法设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
目前,国家对保密工作越来越重视,并在相关测评指南中明确指出了密级标识的重要性。由此可见对密级标识的研究具有重要意义,但目前对于在电子文档中生成密级标识的算法仍在研究阶段,没有统一标准。本文提出一种基于信息隐藏技术的电子文档密级标识的算法,算法中提出安全可信的基种子集概念,并由基种子来产生工作种子来实现算法的安全性保证;通过将密级标识信息作为待隐藏信息,Word电子文档内容作为载体信息来隐藏密级标识信息。算法实现了在Word电子文档中安全有效地隐藏密级标识信息,并确保密级标识信息与载体文档不可分割。
     本文在第四章介绍了基于上述算法所设计的密级系统,并详尽地介绍了系统的功能设与实现。第五章介绍了密级系统的测试,验证了密级系统的正确性和算法的可行性。最后对本文进行了总结和展望。
At present, the national security work gets more and more attention, some assessment guide involving state secrets points out the importance of security classification marked and Measurements rules that security classification marked is a necessary item. So the research of security classification marked is very important, but the algorithm to generate security classification marked in the electricity document is in the study phase and has no standards. This paper proposes an algorithm to generate security classification marked in the Word document based on information hiding technology. The algorithm proposes the concept of safety credible Base seed set. The Base seed can generate Work seed and it can make sure the algorithm is secure. In the algorithm, the security classification marked is to be hidden information, the Word document is information carrier. The algorithm hides the security classification marked securely and effectively, and keeps the security classification marked and information carrier entirety.
     This paper's fourth part introduces the security system based on the algorithm and describes the design and implementation of security system. The fifth part introduces the test on the security system and proved the correctness of the security system and feasibility of the algorithm. The last part is summarizes and look into the distance of the author.
引文
[1]马永坤.重视秘密文件管理.德宏民族出版社.2009.
    [2]王军,吴滨,高远.密级标识在分级保护中的应用.第24次全国计算机安全学术交流会.中国云南丽江.2009.146-150.
    [3]张明天,王惠莅,杨晨,杨建军.美国国家标准和技术研究院信息安全标准化系列研究(四)FIPS 199《联邦信息和信息系统安全分类》标准解读.信息技术与标准化.2011.52-55.
    [4]A. Magar. S. Zeber (613) W7714-4-3115,991-1388,2005 Investigation of Technologies and Techniques for Labelling Information Objects to Support Access Management,18-20.
    [5]王炳锡,彭天强.信息隐藏技术.国防工出版社.2007.9.
    [6]王育民,张彤.信息隐藏-理论与技术.清华大学出版社.2006.1.
    [7]Sai Ho Kwok.Watermark-Based Copyright protection System Security.in:Communications of the ACM.Vol.46,No.10,Oct 2003,pp98-101.
    [8]JungHee Seo, HungBog Park. Data protection of multimedia contents using scalable digital watermarking. In:Computer and Information Science, Proceedings of Fourth Annual ACIS International Conference. New York:IEEE Press, 2005,pp376-380.
    [9]甘甜,梅廷会.信息隐藏模型与数字水印技术.情报科学.2004.107-109.
    [10]Ge xiuhui,Tian Hao.Research on Information Hiding Theoretic Model. Electronic Measurement and Instruments,2007. ICEMI'07.8th International Conference on.2007.2-227-2-232.
    [11]郑飞.软件版权信息的保护技术.计算机工程与应用.1992.58-66.
    [12]Xiaoqiao. Information Hiding Technology in Electronic Notes System. E-Business and E-Government (ICEE),2010 International Conference on.2010.1627-1630.
    [13]Mariam Haroutunian,Smbat Tonoyan,Oleksiy Koval,Svyatoslav Voloshynoskiy.On Reversible Information Hiding System.in:ISIT 2008,pp.940-944.
    [14]Junjun Gu,Gang Qu,Qiang Zhou. Information hiding for trusted system design. Design Automation Conference,2009. DAC '09. 46th ACM/IEEE.2009.698-701.
    [15]Jing Liu,Guang-ming Tang.The Provable Extracting Security of Information Hiding.[C],in:International Conference on Multimedia Information Networking and Security.2009,pp520-524.
    [16]Jaziar Radianti, Jose J. Gonzalez. Understanding Hidden Information Security Threats:The Vulnerability Black Market. On System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference .156c-156c.
    [17]舒后,杨潮,何微,杜娟.基于文本内容的数字水印算法的设计与实现.计算机工程与设计.2008.1299-1302.
    [18]陈青,周黎敏.基于Word文档的数字水印算法的研究.微计算机信息.2010.197-199.
    [19]王维虎,刘延中,王楷.一种基于Word文档的文本数字水印算法的研究.第二届和谐人机环境联合学术会议(HHME2006)——第15 届中国多媒体学术会议(NCMT'06)中国浙江2006.67-71.
    [20]吕伟,方勇,张野,邓远林,石稀林.基于中文字体的Word文档数字水印算法.信息与电子工程.2007.90-94.
    [21]斯琴,张力,廉德亮.基于文本特征的文本水印算法.计算机应用.2009.2348-2350.
    [22]Jena G, Baliarsingh R,Prasad G.M.V.Transformed Domain linear Equalisers using Discrete Gabor Transform. Advance Computing Conference, 2009.574-579.
    [23]Xiaolong Li,Bin Yang,Daofang Cheng,Tieyong Zeng.A Generalization of LSB Matching.Signal Processing Letters,IEEE.2009.69-72.
    [24]马越.基于内容数字版权加密保护技术的研究与应用.黑龙江科技信息.2010.
    [25]雷树梅USB Key身份认证技术及其在电子商务活动中的应用研究.电脑知识与技术.2007.74-75.
    [26]Dawei Zhang.Network Security Middleware Based on USB Key. On Embedded Computing, 2008. SEC '08. Fifth IEEE International Symposium.77-81.
    [27]蒋长根,黄明和.利用VBA扩展Microsoft Word功能的一个实例.-Microsoft Word学科插件.计算机应用于软件.2002.61-63.
    [28]Amit Dey.Writing an MS Word addin.in The Code Project.2003.
    [29]Xuelei Wu,Chen Jia,Bi Lan Rong.Research and Application on.NET and COM Integrated Technology.on Intelligent Information Technology Application Workshops, 2008. IITAW '08.1001-1004.
    [30]Eugene Olafsen,Kenn Scribner,K David White[著].王建华[译]MFC Visual C++6编程技术内幕.北京:机械工业出版社.2000.
    [31]周震震,王轶辰.软件测试性需求分析方法研究.微计算机信息.2010.97-98+107.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700