The Survey on Applications of Information Hiding Technology in E-Commerce Security

被引:1
作者
Cha, Yanmei [1 ]
Zhu, Suwen [1 ]
Han, Wenying [1 ]
机构
[1] Cent Univ Finance & Econ, Sch Informat, Beijing 100081, Peoples R China
来源
ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3 | 2013年 / 433-435卷
关键词
Information Hiding; E-commerce; Information Security; Information Protection; Survey; WATERMARKING; IMAGES; MODEL;
D O I
10.4028/www.scientific.net/AMM.433-435.1866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming e-commerce industry is suffering from serious information security problems. As a potential and effective security solution, information hiding technology has been widely applied in many fields and drawn unprecedented attention. Based on our research, this paper provides a survey on the current state of the art information hiding technology, mainly covering the fundamental concepts, basic model, the recent progress of information hiding methods and its applications in e-commerce security sector. At last, possible research and development trends of information hiding technology are discussed.
引用
收藏
页码:1866 / 1870
页数:5
相关论文
共 36 条
[1]  
Alam F.I., 2013, P INT C INF EL VIS I, P1, DOI [10.1109/ICIEV.2013.6572548, DOI 10.1109/ICIEV.2013.6572548]
[2]  
[Anonymous], P SPIE MULTIMEDIA SY
[3]  
Bailey K, 2006, MULTIMED TOOLS APPL, V30, P55, DOI 10.1007/s11042-006-0008-4
[4]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[5]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[6]   Reversible information hiding for VQ indices based on locally adaptive coding [J].
Chang, Chin-Chen ;
Kieu, The Duc ;
Chou, Yung-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2009, 20 (01) :57-64
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]   Application of the digital watermarking technique in 2-D barcode certificate anti-counterfeit systems [J].
Chen, MuSheng ;
Lin, ShunDa .
THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
[9]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307
[10]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687