Application of Information Hiding Technology Based on MATLAB in Military Information Security

Article Preview

Abstract:

As the improvement of the requirements of Military Information Security, information hiding technology will become an important method in defence of information security. Based on the basic definition and principles of information hiding technology, DCT transfer based on MATLAB is introduced to analyze the application of image hiding technology in military field. According to the simulation results, the need of information hiding technology in Military Information Security is analyzed. On the basis of the need, the application scope of information hiding technology in Military Information Security is illuminated and some issues that should be concerned in application are given at the end.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

395-400

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dengguo Feng: Information security at home and abroad the latest developments of science and technology, Network Security Technology & Application. p.34, January 2001(01).

Google Scholar

[2] Zhenhua Guo, Du Yang: Application of information hiding technology in command automation system, Electronic Warfare. p.15, June 2003(03).

Google Scholar

[3] Xiuhui Ge, Hao Tian, Lipu Guo, Tiwen Han: Information Hiding Principle And Application [M]. BeiJing: Tsinghua Publishing House, 2008. 10 First edition: 1-2.

Google Scholar

[4] WANG Shu-mei~(1; 2) ZHAO Wei-dong~1 WANG Zhi-cheng~1 WEN Fa-hui 1. CAD ResearchCenter; Tongji University; Shanghai 201804; China; 2. Computer Academy; Xuzhou Normal University; Xuzhou 221116; Title image digital watermarking based on discrete cosine transform, p.56.

Google Scholar

[5] Junliang Bai, Jinghua Qu, Baoguo Sun, Wei Zhang: Application Of Information Hiding Technology In Network Protection [J]. Air Force Engineering University(Military Science), 2010(6).

Google Scholar

[6] ZUO Wei-ming; QIN Jiao-hua (Department of Compute Sciences; Hunan City University; Yiyang; Hunan; 413049): Research of the Information Hiding Techniques.  Journal of Hunan City University(Natural Science), 2005(01).

DOI: 10.22438/jeb/42/3/mrn-1524

Google Scholar