期刊文献+

利用插件嵌入水印防范电子文档泄密

Application of Digital Watermarking Using Plugins to Prevent Leaking of E-Documents from Internal Networks
在线阅读 下载PDF
导出
摘要 随着信息化的发展,大量机密文件以电子形式存储在计算机上,而互联网的普及使各种内部机密很容易泄漏出去,据调查高达90%的企业面临数据丢失的风险.本文提出在机密文件中嵌入数字水印的方案,用以防止网络环境下因过失而造成电子文件泄密的意外事件.该方案用Word插件实现水印嵌入,在局域网的网关上安装软件或部署专用设备检测水印,从而截获流出的机密文档. With the rapid development of information technology, a large number of confidential e-documents are stored in computers, which are prone to leakage due mainly to negligence. Surveys show that up to 90% of the companies face severe financial risks because of data loss. This paper proposes a scheme to prevent e-documents from accidental leaking. This is achieved by embedding watermarks into confidential e-documents. For Microsoft Word files, the watermarks are embedded using specially designed plugins. Confidential documents that carry watermarks are intercepted at the gateway by a watermark detector implemented either with software or hardware.
出处 《应用科学学报》 CAS CSCD 北大核心 2008年第6期602-605,共4页 Journal of Applied Sciences
关键词 电子文件 泄密 数字水印 electronic files, leaking, digital watermarking
  • 相关文献

参考文献10

  • 1IT Policy Compliance Group. Why Compliance pays: reputations and revenues at risk [ EB/OL ]. http ://www. itpolicycompliance, com/, July 2007.
  • 2柯行斌,王汝传,陈云芳.基于主机系统调用序列的实时入侵检测系统的模型研究[J].南京邮电学院学报(自然科学版),2005,25(1):72-75. 被引量:1
  • 3IT Policy Compliance Group. Taking action to protect sensitive data[EB/OL], http://www, itpolicycompliance. com/, March 2007.
  • 4刘亚杰,周学广.基于物理隔离技术数据安全转发的模型[J].计算机与数字工程,2006,34(11):164-166. 被引量:3
  • 5http ://bbs. 51 cto. com/archiver/tid-113595, html.
  • 6http://pcedu, pconline, com. cn/soft/virus/safe/0803/ 1239247. html.
  • 7CHEUNG S C, CHIU D K W. A watermarking infrastructure for enterprise document management [ C ] //Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003 : 105.2.
  • 8ANAN T, KURAKI K, NAKAGATA S. Watermarking technologies for security-enhanced printed documents, FUJITSU Scientific and Technical Journal, 2007,43 ( 2 ) : 197 - 203.
  • 9朱大立,陈晓苏.基于数字水印技术的电子政务安全模型[J].计算机应用,2005,25(B12):80-81. 被引量:12
  • 10TOPKARA M, RICCARDI G, HAKKANI T D, ATALLAH M. Natural language watermarking: challenges in building a practical system [ C ]//Proceedings of the SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, January, 2006, San Jose, CA.

二级参考文献14

  • 1吴立军,苏开乐.基于角色PMI的电子政务安全模型[J].计算机工程与应用,2004,40(31):117-119. 被引量:6
  • 2王彦,孙鹏,吕述望.一种企业机密文档分发机制[J].计算机工程,2004,30(22):27-29. 被引量:6
  • 3戴英侠 连一峰 王航.系统安全与入侵检测[M].北京:清华大学出版社,2003..
  • 4NORTHCUTT S,COOPER M,FEARNOW M,et al. Intrusion Signatures and Analysis[M].北京:中国电力出版社,2002.
  • 5WARRENDER C,FORREST S,PEARLMUTT B.Detecting Instrusions Using Sytem Calls:Alternative Data Model[A].IEEE Symposium on Security and Privacy[C].1999.133~145.
  • 6PETERSENR 陶华敏译.Linux技术大全[M].北京:机械工业出版社,2002..
  • 7STANGERJ PATRICKTL 钟日红译.Linux黑客防范--开放源代码安全指南[M].北京:机械工业出版社,2002..
  • 8SKOUDISE 宁科译.反击黑客[M].北京:机械工业出版社,2002..
  • 9CHEUNG SC, CUREEM H, CHIU DKW. A Watermarking Infrastructure for Enterprise Document Management[ A]. proceedings of the 36th Hawaii International Conference of System Science[ C], 2003.
  • 10COX I, MILLER M, BLOOM J. Digital Watermarking[ M]. Morgan Kaufmann Publishers, 2002.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部