Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Modern Electronics Technique》 2011-06
Add to Favorite Get Latest Update

Method Based on DCT transform to Resist Printing and Scanning Attack on Digital Seal

SHI Jing-xian,FAN Jiu-lun(School of Communication and Information Engineering,Xi'an University of Posts and Telecommunications,Xi'an 710121,China)  
A digital seal method which can resist printing and scanning process is proposed to solve the problem of insufficient repellency against printing and scanning attack on the existing digital seal.In combination with the existing electron signature system,the electronic signature is realized by a digital watermarking algorithm of resisting the printing and scanning attack after inserting the signed messages into the specific seal image.The proposed method is more effective to resist the printing and scanning attack on digital seal than the existing methods of digital seal.The experimental results show that the proposed method is feasible.
【Fund】: 陕西省社会发展科技攻关项目(2010K17-07)
【CateGory Index】: TP309.7
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 ZHANG Yan-ke LIAO Xiao-feng JIN Yuan-zhi ZHOU Qing (Department of Computer,Chongqing University.Chongqing 400044,China);Digital watermarking for print and scan process based on gray image[J];Microcomputer Information;2009-06
Chinese Journal Full-text Database 8 Hits
1 TIAN Wen-yan (Shenzhen senior Technical Institute,Shenzhen 518000,China);The Encryption Techniques of MD5 about User Accounts in ASP Web[J];Computer Knowledge and Technology(Academic Exchange);2007-01
2 GAO Fa-gui~1,GAO Lu~2,XU Kai-peng~1 (1.College of Information Engineering,Hubei Institute for Nationalities, Enshi 445000, China; 2.College of Computer Science, Wuhan University,Wuhan 430072, China);Design of Web MIS Security Framework Based on ASP[J];Journal of Hubei Institute For Nationalities;2005-01
3 LIN Ke-zheng,LI Dong-qin,LI Shao-hua(College of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China);Fragile image watermarking algorithm based on Hash functions[J];Journal of Harbin Engineering University;2008-01
4 WANG Chun-xing WAN Wen-bo FENG Chao SONG Xiu-mei;基于小波正交变换的图像数字信息隐写算法[J];Information Technology and Informatization;2009-02
5 XIAO You-an,LIU Jun-bo(School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China);New Type of Digital Seal Technique[J];Journal of Wuhan University of Technology;2009-13
6 ZHANG Xiao-Yan, FAN Bing-Bing (Dept.of Computer, South China Normal University, Guangzhou 510631, China);File Integrity Check on Mobile Platform Based on Merkle Tree[J];Computer Systems & Applications;2010-09
7 SUN Ling-yu1,LENG Ming1,ZHOU Yu2,XIA Jie-wu1(1 Computer Science Department,Jinggangshan University,Ji'an 343009,China;2 Network Information Center,Jinggangshan University,Ji'an 343009,China);File Integrity Checking System Based on Message Digest Function[J];Microelectronics & Computer;2010-10
8 SUN Weiguo,LI Haoran (Xinjiang Survey and Design Institute for Water Resources Hydropower No.19 Heilongjiang,Road,Urumqi,Xinjiang,830000,China);MD5 Algorithm in Data Security and Safety of the Application[J];Microcomputer Applications;2010-10
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 LU Yu-guang(School of Computer & Information Engineering, Changzhou Institute of Technology, Changzhou 213001, China);Electronic seal system based on digital watermark and its implementation[J];Journal of Chengdu University of Information Technology;2005-04
2 Liu Chunqing 1,2 Dai Yuewei 1 Wang Zhiquan 1 ( 1Department of Automation, Nanjing University of Science and Technology, Nanjing 210094, China) ( 2The Sixth Flight Academy of the Air Force);A novel information hiding method in binary images[J];Journal of Southeast University (Natural Science Edition);2003-S1
3 LIU Shidong1,YANG Lin2, HOU Bin2, WANG Jianxin2(1College of Communication Technology, PLA, Nanjing 210016,China;2.The Sixtyfirst Academy, General Staff, Beijing 100039,China);Design and Realization of the Secure CA-based Electronic Seal System[J];Journal of National University of Defense Technology;2003-01
4 ZHANG Xiao-dong~1, CHEN Feng~2,DU Kai~3 (1.Dept. of Physics and Electronic Information Engineering, Wansi Institute, Liu'an 237012, China; 2.Dept. of Automation, University of Science and Technology of China, Hefei 230027, China;3.Dept. of Physics,College of Harbin, Harbin 150086, China);A adaptive feature extraction algorithm of seal image[J];Journal of Harbin Institute of Technology;2004-08
5 CUI Shi-jun HUANG Wei2, TANG Shi-gang (1.College of Measure-control Technology & Communication Engineering, Harbin Univ. Sci. Tech., Harbin 150040, China; 2. Department of Automatization, Jiaotong University of North, Beijing 100044, Ch;Study of Multi Digital Signature Based on RSA Public Key System[J];Journal of Harbin University of Science and Technology;2001-05
6 Zhang Yongping Guo Baolong(Dept.of Measurement Control Engineering ,Xidia n University,Xi'an710071);Survey of Watermarking for Secure Image[J];Computer Engineering and Applications;2004-01
7 Xu Botong Guo Heqing Ou Yuyi(College of Computer Science and Engineering,South China University ofTechnology,Guangzhou 510641);A Document Exchange Scheme Based on New Digital Sealing[J];Computer Engineering and Applications;2005-10
8 ZHANG Jian(Guangdong Textile Polytechnic, Foshan University, Foshan 528041);An Encoding Algorithms Together Research Based on Zerotree Wavelet and Fractal Image[J];Computer Engineering;2004-19
9 LIU Jianxia1,2(1.Software Division,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080;2.Graduate School of Chinese Academy of Sciences,Beijing 100039);Design of A Chaotic Random Sequence and Its Application[J];Computer Engineering;2005-18
10 CAO Hua, ZHOU Jing-li, HU Yu-ping (School of Computer Science & Technology, Huazhong University of Science & Technology, Wuhan Hubei 430074, China;New image watermark embedding algorithm based on fractal transformation contrast factor[J];Computer Applications;2005-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved