期刊文献+

基于电子印章的公文安全认证系统 被引量:4

Document authentication system based on electronic seal
在线阅读 下载PDF
导出
摘要 针对电子公文在存储和传输中的安全认证需求,对电子印章系统设计中的关键问题进行了研究。综合数字签名技术和双重数字水印技术的优点,基于现有CA系统提出一种电子印章系统构建方案,实现了对电子公文的内容认证和盖章实体的身份认证,同时继承了传统印章的形象性和权威性。然后基于Word开发原型系统,并构造典型攻击进行实例测试。实验结果表明,该系统能够满足电子公文认证的安全需求。 To achieve safety certification for electronic documents in the process of storage and transmission,the key problem in the design of the electronic seal system is studied.Combined with the digital signature and dual digital watermarking technology,a new electronic seal system solution based on the CA system is proposed.This authentication mechanism can realize the content authentication and entity authentication,in the meanwhile inherit the visualization and authoritativeness from traditional seal.At last,a prototype of electronic seal system based on Word is implemented,and the simulation on the typical attack against the electronic document proves the validity of the model proposed.
作者 吝科 殷肖川
出处 《计算机工程与设计》 CSCD 北大核心 2010年第12期2784-2787,共4页 Computer Engineering and Design
关键词 电子公文 安全认证 电子印章 数字签名 数字水印 electronic documents security authentication electronic seal digital signature digital watermarking
  • 相关文献

参考文献7

二级参考文献17

  • 1Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 2Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 3Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 4Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 5Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 6Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 7Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.
  • 8Lou DC, Liu JLo Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46(1):31-39.
  • 9Deng H, Gong L, Lazer A, et al. Practical protocols for certified electronic mail. Journal of Network and System Management,1996.4(3 ):279-297.
  • 10Gray JW, Epsilon KF. Protocols for issuing public-key certificates over the Internet. In: Han YF, ed. Proceedings of the International Conference on Information and Communications Security. Beijing: Springer-Verlag, 1997.424--434.

共引文献67

同被引文献43

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部