Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Logistical Engineering University》 2004-02
Add to Favorite Get Latest Update

Theoretical Analysis of Information's Twice Hidden Technology Based on the DCT,DWT

WANG Sen - hua, LI Jian - ping ,LU Shao - xu, YAN Jie(International Center for Wavelet Analysis and Its Applications. , LEU, Chongqing 400016, China;Training Dept. , LEU,Chongqing 400016,China;The Branch of Firehouse inBaoding, Hebei Baoding 071000 ,China)  
Nowdays, the safety of the information transfer has become a hot - debated and important topic. How to transfer a large number of important information and make them more safe is a very valuable job. This paper proposes to use DCT,DWT to hide the information twice ,and provides the hidden method and the possible processes based on the correlative theory . Furthermore, this paper simply analyzes the possible shortages and provides a creative improving idea. As a result, twice hidden technology can be realized although it needs much improvement . Lastly , with the twice hidden technology development, it can be used particularly in the net safety field.
【Fund】: 国家高技术研究发展计划(863)项目(2003AA148040) 国家自然科学基金(69903012 60216263) 重庆市信息产业发展资金项目(200113012) 重庆市科技攻关重点项目(7220-B-13)
【CateGory Index】: TN918.6
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved