高级检索
    孙星明 黄华军 王保卫 孙 光 黄俊伟. 一种基于等价标记的网页信息隐藏算法[J]. 计算机研究与发展, 2007, 44(5): 756-760.
    引用本文: 孙星明 黄华军 王保卫 孙 光 黄俊伟. 一种基于等价标记的网页信息隐藏算法[J]. 计算机研究与发展, 2007, 44(5): 756-760.
    Sun Xingming, Huang Huajun, Wang Baowei, Sun Guang, and Huang Junwei. An Algorithm of Webpage Information Hiding Based on Equal Tag[J]. Journal of Computer Research and Development, 2007, 44(5): 756-760.
    Citation: Sun Xingming, Huang Huajun, Wang Baowei, Sun Guang, and Huang Junwei. An Algorithm of Webpage Information Hiding Based on Equal Tag[J]. Journal of Computer Research and Development, 2007, 44(5): 756-760.

    一种基于等价标记的网页信息隐藏算法

    An Algorithm of Webpage Information Hiding Based on Equal Tag

    • 摘要: 针对现有网页信息隐藏技术存在的隐蔽性、抗机器过滤能力较差的缺点,改进了基于属性对顺序的网页信息隐藏技术隐藏信息量较少的缺陷,提出了一种基于等价标记的网页信息隐藏算法.该算法将待隐藏的秘密信息M转变为一个大整数N,按照嵌入规则,采用等价标记置换原标记的方法将大整数N隐藏在网页中.实验结果和分析表明,该算法没有增加网页文件的长度,能够隐藏较大的秘密信息,且具有较高的隐蔽性和安全性,可以应用于网页内容保护和隐秘通信.

       

      Abstract: Information hiding can hide secret messages inside of image, video, audio, text, and other digital objects. To a casual observer inspecting these, the messages are invisible. Information hiding has become a new research hotspot of information security and copyright protection of digital multimedia content recently. Webpage information hiding algorithm uses a webpage as cover-object. Based on equal tag, an algorithm of webpage information hiding is presented in this paper, which overcomes the shortcoming of the ability of imperceptibility and the ability of contradict with the machine filtration of traditional webpage information hiding algorithms, and improves the embedded capacity of the algorithm based on the order of attributes pair. According to the embedded rule, firstly a secret message M is changed to a large integer N, and then the large integer N is embedded into the cover webpage by changing the tag to its equal tag. The experimental results and analysis show that the algorithm does not length the size of cover-webpage, and has good imperceptibility and perfect security than the traditional algorithm. The embedded capacity of the algorithm gets better increase than the algorithm based on the order of attributes pair. So the algorithm could be used to protect the content of a webpage and covert communication.

       

    /

    返回文章
    返回