Font Size: a A A

Research On Information Hiding Technique Used In Configuration Software

Posted on:2011-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:A P DongFull Text:PDF
GTID:2178330332466028Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Traditional configuration software is widely used in energy, transportation, communication and chemical industries, etc. With improvement of production management and rapid development of internet technology, configuration software has changed from single mode to net mode, such as the internet of things, which threatens safe industrial production and people's living security, with following information security problems. Therefore, information security defense system must be introduced.Started from survey on application situation from home and abroad and development tendency of configuration software, the article analyzes frame diagram of technology development of configuration software, with examination of existing security hidden trouble of technology framework. In term of security problem of configuration software, the severest problem is alternative security of application layer data, which orientates direction of this article.With comparison of information security defense technology of application layer, information hiding technology is discovered more suitable for sensitive data transmission in configuration software. Therefore, assumption is put forward to introduce information hiding technology in application of configuration software, focusing on the application of information hiding technology, which used in configuration software.(1)To analyze and investigate features of alternative data; XML language is chosen to realize the alternative requirements of configuration data and figure; and information hiding in the configuration software were compared with the carrier selection.(2)Combined with theory of information hiding technology, the XML-based package carrier of information hiding, hidden information extraction, XML files and other data reduction was carried out technical analysis and algorithm design, and solves its obstacles in configuration software application. (3)Theory first, practice second research train of thought is used. Combining with the development instance of power supply system configuration software, practical test is carried out on research of this article, to prove that information hiding technique can be used successfully in configuration software, and can improve its security condition.Practical test proves that information hiding technology can be applied in configuration software and improve security condition, which will push web application of configuration software and internet development.
Keywords/Search Tags:Configuration Software, Information Hiding, XML, The Internet of things, Electric Power System, Research of Application
PDF Full Text Request
Related items