English  |  正體中文  |  简体中文  |  Items with full text/Total items : 49199/83641 (59%)
Visitors : 7096271      Online Users : 31
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/21039


    Title: 中英文秘密文件的分享與隱藏
    Other Titles: A Bilingual Secret Document Sharing and Hiding Scheme
    Authors: 侯永昌;Hou, Young-chang;杜淑芬
    Contributors: 淡江大學資訊管理學系
    Keywords: 文件保護機制;秘密分享;資訊隱藏;Document Protection Scheme;Secret Sharing;Information Hiding
    Date: 2005-04-01
    Issue Date: 2009-11-30 13:11:30 (UTC+8)
    Publisher: 清華大學科技管理研究所
    Abstract: 1998年Lin et al.提出了一個新的文件保護機制,利用有具體內容的文件來傳送秘密訊息,其後亦陸續有學者針對此方法加以延伸與改進,但是這套文件保護的方法仍有許多待改進之處。本研究的目的便是針對此套文件保護的機制,提出一個改進的方法,將秘密文件位置索引表改成差值表,並且增加機密分享的機制。本研究與其它研究比較,具有以下幾項優點:(1)本研究可以取用任何文字做為欺敵訊息;(2)不同的秘密訊息可以共用相同的欺敵訊息;(3)本研究可以處理中英文夾雜的訊息;(4)本研究可以防止部份差值表遺失以效無法還原秘密的情況;(5)本研究可以達到機密控管,降低洩密的風險;(6)最後所傳送出去的檔案皆是有具體內容的文件,不容易引人懷疑。
    In 1998, Lin & Lee proposed a new document protection scheme which utilized a meaningful cheating document to protect the secret document from hackers. Afterward some researchers extended and improved their scheme. However, there are still lots of spaces for improvement. The purpose of our study is aimed at reforming their method via recording the code differences instead of recording the code indices, coupled with a secret sharing scheme. Compared with other studies, ours have the following advantages: 1. we can utilize any text as a cheating message; 2. different secrets can use the same cheating message in common; 3. we can handle a bilingual secret document easily without any special treatment; 4. we can recover the code difference table even if one of the share messages is lost; 5. we can decrease the risk of blabbing out the secret; 6. all the files delivered to the receivers are meaningful without giving rise to attentions of hackers.
    Relation: 資訊管理學報 12(2),頁 141-161
    Appears in Collections:[Graduate Institute & Department of Information Management] Journal Article

    Files in This Item:

    File SizeFormat
    0KbUnknown174View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback