RETRACTED: Application of Object-Oriented Languages and Private Principles of Steganography in Deconstructing Local-Area Networks

Retracted:

This paper has been retracted by publisher.
This paper was found to be in violation of the scope and quality criteria. The document is now considered retracted. Due to strong violation, necessary effort should be made to remove all further references to this paper.
We regret any inconvenience this publication might cause you.

Article Preview

Abstract:

Retracted paper: Object-oriented is an important feature of operating system, and it is not exclusive to its micro-kernel architecture but promoting it. Object-oriented technology embodies design and implementation, which makes idea and realization possible. Due to the openness of transmission medium, LAN communication requests higher and better steganography-keeping performance. Through the features of LAN network security, the LAN security framework and hierarchical network security technology are proposed. Based on the basic principles and common methods of steganography information and the commonly used methods, combined with steganography capacity and the distortion changes of statistical properties, the improved LSB steganography writing with anti-steganography is given. In conclusion, the method can write different amount of data in different regions.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 121-122)

Pages:

613-619

Online since:

June 2010

Authors:

Export:

Share:

Citation:

[1] ZHANG Jinjun, in: Design and implementation of a microkernel-based operating system by object-oriented techniques, edited by Beijing University of Technology, Beijing (2001).

Google Scholar

[2] LIU Lei, JIN Ying, and JIN Chengzhi: The Method and Implementation of Supporting Constraints in Object Oriented Languages, ACTA SCIENTIARUM NATURALIUM UNIVERSITATIS JILINENSIS, Vol. 4(2001), p.43 RETRACTED.

Google Scholar

[3] ZHANG Qian: The compositional synchronization control model for the concurrent object-oriented language, Mini-Micro Systems, Vol. 20(1999), p.199.

Google Scholar

[4] YU Yu, and DING Baokang: The Dissection for Object-Oriented Languages, Computer Engineering, Vol. 21(1995), p.70.

Google Scholar

[5] Neubauer C, and Herre J., in: Advanced Audio Watermarking and its Applications, 109th AES Convention, Audio Engineering Society, preprint 5176, Los Angeles (2000).

Google Scholar

[6] Westfeld A.: Detecting Low Embedding Rates, Lecture Notes in Computer Science, Vol. 1768 (2000), p.61.

Google Scholar

[7] Joe Abley, in: A Software Approach to Distributing Requests for DNS Service Using GNU Zebra, ISC BIND 9 and FreeBSD, USENIX Annual Technical Conference (2004).

Google Scholar

[8] Ritchie, D., and Anderson, H. O., in: On the investigation of the UNIVAC computer, the Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), (1999).

Google Scholar

[9] R. Tarjan: Controlling link-level acknowledgements using unstable symmetries, Journal of Classical, Certifiable Methodologies, Vol. 47 ( 2002), pp.20-24 RETRACTED.

Google Scholar