Font Size: a A A

Design Of Security Gateway Model Based On Stego-Label

Posted on:2011-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:H X WangFull Text:PDF
GTID:2178360308957238Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of network makes communication more convenient, most government sectors and enterprises held a large number of confidential information. If there is no protection implemented, huge losses would be caused. In this way, effective measures must be taken for protecting the safety of confidential information transmission.Recently, gateway has become one of the key technologies to maintain and protect information security, it is effective to filter, approve and encrypt the network information. To a certain extent, traditional gateway guarantees the security, but the message could possibly be visited illegally or stole in the process of transmission. Therefore, a more comprehensive security strategy to control the data flow and protect the information security is required.As a newly developed technology, steganography conceals confidential information into digital carrier by means of signal redundancy in order to protect the confidential information security during communication networks transmission. Because of its wide digital carrier range, for instance, text, digital picture, audio and video, the steganography usually is applied in confidential communication.Based on stego-label, this paper proposes the design of security gateway model, combines Security gateway Technology with steganographic Technology and Access Control, and solves data flow problem as well as the controllability problem. It marks corresponding security tags before the information transmission so that the data flow is available in settled area, by which that makes it imperceptible and therefore protect the sensitive information security.After research and analysis of security gateway, access control and steganographic technology, this paper proposes security gateway model based on the use of stego-label, and developed the network structure and the function of two important components (the stego-label server and security gateway based on stego-label). By analyzing the stags steganography and detection of text file and that of image file, and the role data flow control mechanism and methods, this paper studied deeply on security gateway of stego-label based on the stag steganorgraphy and detection as well as the role data flow control strategy. As the result of the research above, security gateway is designed based on stego-label. The feasibility and validity of the Gataway Model is testified.
Keywords/Search Tags:security gateway, steganography, stego-label, access control
PDF Full Text Request
Related items