[1]左祥建,杨晓莉. 基于雅克比符号的文本信息隐藏[J].计算机技术与发展,2016,26(02):73-76.
 ZUO Xiang-jian,YANG Xiao-li. Text Information Hiding Based on Jacobi Symbol[J].,2016,26(02):73-76.
点击复制

 基于雅克比符号的文本信息隐藏()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年02期
页码:
73-76
栏目:
安全与防范
出版日期:
2016-02-10

文章信息/Info

Title:
 Text Information Hiding Based on Jacobi Symbol
文章编号:
1673-629X(2016)02-0073-04
作者:
 左祥建杨晓莉
 陕西师范大学 计算机科学学院
Author(s):
 ZUO Xiang-jianYANG Xiao-li
关键词:
 文本载体信息隐藏雅克比符号二次剩余秘密钥
Keywords:
 text carrierinformation hidingJacobi symbolquadratic residuesecret key
分类号:
TP301
文献标志码:
A
摘要:
 文本信息隐藏是版权维护的一种重要手段。通过轻微缩放字符大小比例来实现信息隐藏的方法鲁棒性差,不能抵抗格式攻击。结合密码学中大整数因子分解困难性假设,提出了基于雅克比符号的改进算法,通过用雅克比符号判断文本载体中的元素是否为二次剩余。若为二次剩余,即雅克比符号为“1”,将秘密信息每个字节的ASCII码值,分别替换该字符的缩放比例值;若为非二次剩余,则将文本载体元素的缩放比例保持标准型。该方法能将秘密信息分散到文本载体中。改进后的算法具有更好的隐藏性,提高了抵抗添加和删除攻击的能力,增强了文本信息隐藏的鲁棒性。与传统的文本信息隐藏算法相比具有更好的可靠性,而且算法的实现简单,具有灵活性,可以适用于各种不同语言文本。
Abstract:
 Text information hiding is an important way of copyright maintenance. Text information hiding algorithms that hide information through slightly zooming in or zooming out the characters are not robust,and nor can they resist reformat attacks. In this paper,based on the assumption that factoring a large integer is hard,propose an improved algorithm which hides or not hides text information by determi-ning whether a number is a quadratic residue module a big integer or not. Judging by Jacobi symbol text vector element is quadratic resi-due. If a quadratic residue,which Jacobi symbol is"1",the secret information of each byte ASCII code value,scaling values are replaced with the characters. If the non-quadratic residue,scaling text vector elements will keep the standard. This method can disperse into the text secret information carrier. The improved algorithm can better hide text information and can resist adding or deleting attack. It is simple and flexible,and can be applied to different language texts.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(02):47.

更新日期/Last Update: 2016-04-15