Research on the security transmission framework based on wavelet analysis

被引:0
|
作者
Xiao Shucheng [1 ]
Li Qiyun
Qiu Shan [1 ]
Li Jianping
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing 400065, Peoples R China
关键词
information security; IPSec; wavelet analysis; information hiding;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The study on human visual system points out that modification on wavelet high frequency subband coefficients is hard to be perceived by human eyes. Network security technology is benefit to information security transmission. The paper put forward a security transmission framework that utilize discrete wavelet transform to transmit secrete data (such as password, etc) carried by common picture in application layer and utilize VPN gateway based on the IPSec tunnel protocol to encapsulate IP packet in network layer. It provides a kind of new choice for end-to-end security transmission.
引用
收藏
页码:57 / +
页数:2
相关论文
共 50 条
  • [31] The Analysis and Research of Lifting Scheme Based on Wavelet Transform
    Ding, Li
    Chen, Weiqing
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1377 - 1382
  • [32] Research on security of mobile communication information transmission based on heterogeneous network
    Chen, Jing
    Zhao, Feng
    Xing, Haiyan
    International Journal of Network Security, 2020, 22 (01): : 145 - 149
  • [33] The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research
    Luckham, Robin
    Kirk, Tom
    STABILITY-INTERNATIONAL JOURNAL OF SECURITY AND DEVELOPMENT, 2013, 2 (02):
  • [34] Wavelet analysis of shielded radiological material: The applicability of wavelet analysis for National Security
    Vaughan, K.
    Turner, R. L.
    Kendall, P.
    2014 IEEE NUCLEAR SCIENCE SYMPOSIUM AND MEDICAL IMAGING CONFERENCE (NSS/MIC), 2014,
  • [35] Research framework for food security and sustainability
    Papargyropoulou, Effie
    Ingram, John
    Poppy, Guy M.
    Quested, Tom
    Valente, Clara
    Jackson, Lee Ann
    Hogg, Tim
    Achterbosch, Thom
    Sicuro, Emanuele Paolo
    Bryngelsson, Susanne
    Guelinckx, Isabelle
    Van Dael, Peter
    Dye, Louise
    NPJ SCIENCE OF FOOD, 2025, 9 (01)
  • [36] Research on the framework of CORBA security models
    Hou, Di
    Huang, Chao-Yang
    Qi, Yong
    Shen, Jun-Yi
    Zhao, Ji-Zhong
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (10):
  • [37] Research on signal analysis method based wavelet analysis and grey theory
    Song, Lijun
    Qu, Hongxing
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8 (09) : 239 - 248
  • [38] Accelerated trip of power transmission line based on biorthogonal wavelet analysis
    Shi, TH
    Zhang, H
    Liu, P
    Zhang, DJ
    Wu, QH
    2000 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-4, 2000, : 1333 - 1337
  • [39] Security Analysis of the Dependability, Security Reconfigurability Framework
    Hartog, Tim
    Kleinhuis, Geert
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 93 - +
  • [40] Security Analysis of Content-Based Watermarking Authentication Framework
    Wang, Jinwei
    Liu, Guangjie
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +