首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境下网络内部信息隐藏算法研究
引用本文:叶卫,王桂兰,龚小刚. 云计算环境下网络内部信息隐藏算法研究[J]. 科学技术与工程, 2018, 18(7)
作者姓名:叶卫  王桂兰  龚小刚
作者单位:国网浙江省电力公司信通分公司,华北电力大学保定校区,国网浙江省电力公司信通分公司
基金项目:华北电力大学中央高校基本科研业务费专项基金资助项目:风电机组传动系统测点优化及故障预测(No.13MS103)
摘    要:针对目前信息隐藏算法安全性低、不可感知性差以及抗干扰性弱等特点,提出一种新的云计算环境下网络内部信息隐藏算法。介绍了云计算环境下网络内部信息嵌入载体过程,给出了嵌入过程流程图。阐述了DCT网络信息隐藏算法原理,通过DCT变换对云计算环境下网络内部信息进行处理,其主要包括离散余弦变换与离散余弦逆变换。分析了DCT算法隐藏容量,结合DCT算法自身特点,对不同类型信息设定出相应的量化参数,最大限度增加DCT算法的最大可嵌入信息容量。给出DCT算法具体信息隐藏过程和提取过程。实验结果表明,所提算法不可感知性、抗干扰性以及安全性强,载体的可嵌入信息容量大。

关 键 词:云计算;网络;内部信息;隐藏
收稿时间:2017-07-25
修稿时间:2017-07-25

Research on Network Information Hiding Algorithm in cloud computing environment
Ye Wei,Wang Guilan and Gong Xiaogang. Research on Network Information Hiding Algorithm in cloud computing environment[J]. Science Technology and Engineering, 2018, 18(7)
Authors:Ye Wei  Wang Guilan  Gong Xiaogang
Affiliation:Stat Grid Zhejiang Information & Telecommunication Branch,North China Electric Power University,Stat Grid Zhejiang Information & Telecommunication Branch
Abstract:In view of the fact that the current information hiding algorithms are low in security, poor in perception and weak in anti-jamming, a new information hiding algorithm in the cloud computing environment is proposed. This paper introduces the process of embedded information carrier in the cloud computing environment, and gives the flow chart of embedded process. This paper expounds the principle of DCT network information hiding algorithm, and deals with the internal information of the network in the cloud computing environment by the DCT transform, which mainly includes discrete cosine transform and discrete cosine inverse transform. The hidden capacity of DCT algorithm is analyzed, and the corresponding quantization parameters of different types of information are set up according to the characteristics of DCT algorithm. The maximum embedded information capacity of DCT algorithm is increased to the maximum. The specific information hiding process and extraction process of DCT algorithm are given. Experimental results show that the proposed algorithm is not sensitive, robust and robust, and the carrier can be embedded with large information capacity.
Keywords:Cloud computing   networks   internal information   hidden
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号