earticle

논문검색

Monoecism Algorithm in the Application of E-commerce Information Security

초록

영어

With the development of e-commerce industry, the security of business information has attracted a lot of attention. The paper [1] puts forward the monoecism watermarking algorithm. The algorithm divides image into two parts: ROI (Region of interest) and RONI (Region Of Non Interest), and respectively deal with the two parts. Female watermark and male watermark are embedded into the RONI at the same time, and generate embedding watermark of the image. As is known to all, the integrity of ROI is also very important in e-commerce. This paper tries to apply the monoecism watermarking algorithm to e-commerce information security. The author gives six applications of the algorithm in electronic commerce that is graphical physical paper, electronic paper anti-counterfeiting, electronic seal, copyright protection, digital fingerprint generation, secure communication protection. This author introduced the embedding watermark and extracting watermark process and detection process of monoecism watermark algorithm. Through the analysis of simulation experiment of six application fields of monoecism watermark algorithm in the e-commerce information security, the simulation experiment has verified the validity of the algorithm. In a word, this paper has discussed the general rules of selecting ROI and the specific rules of selecting ROI in e-commerce applications. The simulation results are given, and the satisfactory results have been achieved.

목차

Abstract
 1. Introduction
 2. Monoecism Watermarking Algorithm
  2.1. Conceptual Framework
  2.2. Watermark Embedded Algorithm
  2.3. Watermark Extraction Algorithm
  2.4. Validity Check
 3. Applicability of Monoecism Algorithm in E-commerce Information Security
  3.1. Characteristics of Monoecism Algorithm
  3.2. Applicability
  3.3. Application Fields
 4. Rules of Selecting ROI
  4.1. General Rules
  4.2. Specific Rules
 5. Simulation and Evaluation
  5.1. Simulation Settings
  5.2. Experimentation
  5.3. Experimental Results
  5.4. Experimental Results Analysis
 6. Superiority
  6.1. Highlight Safety Protection of Important Information
  6.2. Improve Security
  6.3. Expand the Watermark Capacity
  6.4. Improve the Efficiency of Extraction and Detection
 7. Summary
 ACKNOWLEDGEMENTS
 References

저자정보

  • Qingjie Zhang School of Information Central University of Finance and Economics Beijing, P. R. China 100081
  • Jianming Zhu School of Information Central University of Finance and Economics Beijing, P. R. China 100081
  • Xiaoxu Wang School of Information Central University of Finance and Economics Beijing, P. R. China 100081
  • Yapan Li School of Information Central University of Finance and Economics Beijing, P. R. China 100081

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.