| A large number of mechanical engineering files exchange exits between distributed manufacturing enterprises. These files include not only drawings, but also standard, NC program, contracts, and even includes software. At present, the enterprises generally use the inexpensive and fast computer network to carry on the information transmission. Because these manufacture information generally involves patent, commercial secrets, and sometimes is also deciding enterprise's destiny, an effective measures is needed to guarantee the safety of information transmission. At present, secure transmission of mechanical engineering files facing distributional manufacture has become one of the important research directions in information security transmission domain.This subject is funded by Science-Tech Key Project of Heilongjiang Province(Title: Digital & network design and manufacturing system based on numerical control equipment, ID: CC06A129), and is the result of overall and systematically collected and deeply studied the searched data at home and abroad about information security transfer technology of distributed manufacturing system and digital steganography technology. Found that existing Methods of file transfer program, as the absence of more choices, widely used encryption method to exchange information. Chaotic ciphertext easily lead to attention of unlawful attackers, exposed the confidentiality of communications, has serious security risks.In order to maximize water down the illegal attackers'consciousness, reduce the possibility of speculation and deciphering, this paper has studied and proposed a new method of information security transfer combination the advantages of cryptographic technology and digital steganography technology. On the basis of encryption protection, steganography provides a more layer of security protection, mechanical engineering files can be "disguised" in the carrier image, played a purpose of confused, deceiving illegal attacker. The main results achieved of this paper are as follows:This article identifies the overall program combination of Steganography and Cryptography technology, analysis the selection principles of carries files for Steganography, and take this as the basis, identifies this article's main research carriers are the index images and the BMP images. As index image, this article designed a new algorithm named optimal result assignment (ORA) algorithm to write secret information into index images. Comparison experiments show that the algorithm can guarantee the security, meanwhile gain a higher image quality than optimal parity assignment (OPA).As BMP images, studied and proposed a high-volume embedded security BMP Image Steganography Algorithm, the algorithm has higher embedding rate, has less affect of the image histogram in the course of embedding, and has higher security.Digital image scrambling technology was used to compensate the lack of non-key steganography technology. A digital image scrambling algorithm is designed based on hash function and chaotic. The algorithm has lower time complexity, high security, to meet the needs of practical application.Developed a steganography software for distributed manufacturing enterprises, achieved ORA, high-density BMP images steganography, scrambling algorithm of Chaos and hash function. After scrambling the carrier of the input file, called ORA or high-volume embedded BMP Image Steganography Algorithm according to the type of input image. Hidden the ciphertext into the scrambled carrier image, and then applied the inverse Scrambling algorithm, gained the carrier images hidden Mechanical engineering files, experiment between Mechanical Sciences in Heilongjiang Province and its partners shows that the system could provide mechanical engineering file transfer service for distributed manufacturing enterprises.Other information (such as:dialogue) passing between distributed enterprises can also be transmitted securely use this system if we can save these information into a file. With the deepening development of relevant technologies, the program is likely to become necessary technology to secure transmission of information for distributed manufacturing, and expand new fields of application. |